Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016

The study provides information on cybersecurity and the initiatives taken by governments and private organizations in Southeast Asia (SEA) and Australia & New Zealand (ANZ) to improve security in an industrial setting. It also considers the developments in the manufacturing space and technologies that will affect cybersecurity, besides focusing on the importance of security in the future. Key Target Audience Industrial automation and process control systems suppliers such as Honeywell, Rockwell Automation, Yokogawa, Siemens A.G, Schneider Electric Cybersecurity solutions providers such as IBM, Cisco, Belden Organizations offering niche services/solutions pertaining to cybersecurity
Published: 31 Jul 2017

Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016

Risks from Cybersecurity are Significantly Higher and Call for Collaboration between Governments and Private Sector

The study provides information on cybersecurity and the initiatives taken by governments and private organizations in Southeast Asia (SEA) and Australia & New Zealand (ANZ) to improve security in an industrial setting. It also considers the developments in the manufacturing space and technologies that will affect cybersecurity, besides focusing on the importance of security in the future.

Key Target Audience

• Industrial automation and process control systems suppliers such as Honeywell, Rockwell Automation, Yokogawa, Siemens A.G, Schneider Electric

• Cybersecurity solutions providers such as IBM, Cisco, Belden

• Organizations offering niche services/solutions pertaining to cybersecurity

Research Scope

The study provides information on the initiatives taken by respective governments across Asia-Pacific to promote cybersecurity in a manufacturing environment that has been undergoing digitization. As there is a growing incidence of malware across critical installations, it is necessary to realize the level of vulnerability as it varies with each industry. This study discusses various end users targeted by malware based on the recent trends and the latest offerings from private participants. It also provides detailed information on critical errors in design and implementation of security and how companies must approach cybersecurity in the current scenario. These also help end users while approaching companies for cybersecurity solutions.

As Industrial Internet of Things (IIoT) is seen as a major contributor to efficiency and optimization, it is likely that related technologies will be adopted by the manufacturing industry. However, the risks associated also grow correspondingly, making it important for all stakeholders to understand the implications of a breach. The study also identifies the spending on key industries that are vital to IIoT deployment as well as those that are targeted by cyber attacks. Cloud security, being a major development in the way data is managed, has also been discussed.

Major drivers and restraints in the cybersecurity industry and the prevailing mindset toward foolproof security have also been discussed. As IIoT is closely tied to developments in security, the spending on IIoT will influence opportunities for cybersecurity in the region. It is also expected that investments in cybersecurity in the coming years will also influence, in part, the rate at which Southeast Asian countries move toward digitization. The study also calls for a collaborative approach between public/government bodies and the providers of cybersecurity solutions in the private sector, besides identifying why such measures are becoming important. The base year considered for the study is 2016.

Key Questions This Study Will Answer

1. Which countries in the SEA and ANZ region are keen on adopting technologies that will be of interest to cybersecurity solutions providers?

2. Who are the major market participants (both public and private) and what are the initiatives taken to ensure cybersecurity?

3. Which end users in SEA and ANZ will be more vulnerable to cyber attacks?

4. What are the major drivers and restraints in the IIoT and automation industry that will impact the adoption of cybersecurity?

5. What are the typical errors committed while implementing a cybersecurity strategy and what should be the steps to ensure a successful implementation?

Features of this Research

Help Desk

Full list of offices


For more information and general enquiries, contact Frost & Sullivan near you.

North America
tel: +1.877.463.7678

Select a location near you..