Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016

Cybersecurity Initiatives in IIoT in Asia-Pacific, 2016

Risks from Cybersecurity are Significantly Higher and Call for Collaboration between Governments and Private Sector

RELEASE DATE
31-Jul-2017
REGION
Asia Pacific
Research Code: P958-01-00-00-00
SKU: IA01410-AP-MR_20498
AvailableYesPDF Download
$4,950.00
In stock
SKU
IA01410-AP-MR_20498
$4,950.00
DownloadLink
ENQUIRE NOW

Description

The study provides information on cybersecurity and the initiatives taken by governments and private organizations in Southeast Asia (SEA) and Australia & New Zealand (ANZ) to improve security in an industrial setting. It also considers the developments in the manufacturing space and technologies that will affect cybersecurity, besides focusing on the importance of security in the future.

Key Target Audience

Industrial automation and process control systems suppliers such as Honeywell, Rockwell Automation, Yokogawa, Siemens A.G, Schneider Electric
Cybersecurity solutions providers such as IBM, Cisco, Belden
Organizations offering niche services/solutions pertaining to cybersecurity

Research Scope

The study provides information on the initiatives taken by respective governments across Asia-Pacific to promote cybersecurity in a manufacturing environment that has been undergoing digitization. As there is a growing incidence of malware across critical installations, it is necessary to realize the level of vulnerability as it varies with each industry. This study discusses various end users targeted by malware based on the recent trends and the latest offerings from private participants. It also provides detailed information on critical errors in design and implementation of security and how companies must approach cybersecurity in the current scenario. These also help end users while approaching companies for cybersecurity solutions. 

As Industrial Internet of Things (IIoT) is seen as a major contributor to efficiency and optimization, it is likely that related technologies will be adopted by the manufacturing industry. However, the risks associated also grow correspondingly, making it important for all stakeholders to understand the implications of a breach. The study also identifies the spending on key industries that are vital to IIoT deployment as well as those that are targeted by cyber attacks. Cloud security, being a major development in the way data is managed, has also been discussed.

Major drivers and restraints in the cybersecurity industry and the prevailing mindset toward foolproof security have also been discussed. As IIoT is closely tied to developments in security, the spending on IIoT will influence opportunities for cybersecurity in the region. It is also expected that investments in cybersecurity in the coming years will also influence, in part, the rate at which Southeast Asian countries move toward digitization. The study also calls for a collaborative approach between public/government bodies and the providers of cybersecurity solutions in the private sector, besides identifying why such measures are becoming important. The base year considered for the study is 2016.

Key issues addressed?:

  1. Which countries in the SEA and ANZ region are keen on adopting technologies that will be of interest to cybersecurity solutions providers?
  2. Who are the major market participants (both public and private) and what are the initiatives taken to ensure cybersecurity?
  3. Which end users in SEA and ANZ will be more vulnerable to cyber attacks?
  4. What are the major drivers and restraints in the IIoT and automation industry that will impact the adoption of cybersecurity?
  5. What are the typical errors committed while implementing a cybersecurity strategy and what should be the steps to ensure a successful implementation?

RESEARCH: INFOGRAPHIC

This infographic presents a brief overview of the research, and highlights the key topics discussed in it.
Click image to view it in full size

Table of Contents

Executive Summary—Key Findings

Executive Summary—Market Engineering Measurements

Executive Summary—CEO’s Perspective

Cybersecurity in Asia-Pacific

Market Overview—Research Scope, Study Period, and Regions

Market Overview—Definitions

Market Overview—Distribution Channels

Market Drivers

Market Restraints

Market Engineering Measurements

Total Spending on IIoT—SEA and ANZ

Major Stakeholders of Cybersecurity in Asia-Pacific—Australia

Cybersecurity Initiatives—Australia

Spending on IIoT—Australia

Major Stakeholders of Cybersecurity in Asia-Pacific—New Zealand

Cybersecurity Initiatives—New Zealand

Spending on IIoT—New Zealand

Major Stakeholders of Cybersecurity in Asia-Pacific— Singapore

Cybersecurity Initiatives—Singapore

Spending on IIoT—Singapore

Major Stakeholders of Cybersecurity in Asia-Pacific— Malaysia

Cybersecurity Initiatives—Malaysia

Spending on IIoT—Malaysia

Major Stakeholders of Cybersecurity in Asia-Pacific—Thailand and Indonesia

Cybersecurity Initiatives—Thailand

Spending on IIoT—Thailand

Cybersecurity Initiatives—Indonesia

Spending on IIoT—Indonesia

Major Stakeholders of Cybersecurity in Asia-Pacific—Vietnam and the Philippines

Cybersecurity Initiatives—Vietnam

Cybersecurity Initiatives—The Philippines

Spending on IIoT—The Philippines

Major Suppliers of Industrial Cybersecurity Solutions

Key End-user Targets for Advanced Persistent Threat (APT) Groups

Cybersecurity in Other End Users

Common Techniques Deployed by Cyber Attackers

Critical Errors in Design and Implementation

Vulnerabilities and Implications of a Cyber Attack in an Industrial Setting

Holistic Cybersecurity Solutions for IIoT

Steps to Ensure Robust Cybersecurity in an Industrial Setting

Transformation in Industrial Cybersecurity Ecosystem

Growth Opportunity 1—Security in a Digital World

Growth Opportunity 2—ASEAN Economic Community

Strategic Imperatives for Success and Growth

Cloud Security in IIoT Ecosystem

The Last Word—Predictions

Legal Disclaimer

List of Market Participants

Learn More—Next Steps

List of Figures
  • 1. Total Cybersecurity Initiatives Market: Key Market Drivers, Asia-Pacific, 2017–2021
  • 2. Total Cybersecurity Initiatives Market: Key Market Restraints, Asia-Pacific, 2017–2021
  • 3. Total Cybersecurity Initiatives Market: Market Engineering Measurements, Asia-Pacific, 2016
  • 4. Total Cybersecurity Initiatives Market: Key Stakeholders, Singapore, 2016
  • 5. Total Cybersecurity Initiatives Market: Key Stakeholders, Malaysia, 2016
  • 6. Total Cybersecurity Initiatives Market: Key Stakeholders, Thailand and Indonesia, 2016
  • 7. Total Cybersecurity Initiatives Market: Key Stakeholders, Vietnam and the Philippines, 2016
  • 8. Total Cybersecurity Initiatives Market: Key Suppliers of Cybersecurity Solutions, Asia-Pacific, 2016
  • 9. Total Cybersecurity Initiatives Market: Vulnerabilities and Implications, Asia-Pacific, 2016
List of Charts
  • 1. Total Cybersecurity Initiatives Market: Market Engineering Measurements, Asia-Pacific, 2016
  • 2. Total Cybersecurity Initiatives Market: Distribution Channel Analysis, Asia-Pacific, 2016
  • 3. Total Cybersecurity Initiatives Market: Spending toward IIoT by Industry, SEA and ANZ, 2016
  • 4. IIoT Market: Spending toward IIoT by Industry, Australia, 2016
  • 5. IIoT Market: Spending toward IIoT by Industry, New Zealand, 2016
  • 6. IIoT Market: Spending toward IIoT by Industry, Singapore, 2016
  • 7. IIoT Market: Spending toward IoT by Industry, Malaysia, 2016
  • 8. IIoT Market: Spending toward IoT by Industry, Thailand, 2016
  • 9. IIoT Market: Spending toward IIoT by Industry, Indonesia, 2016
  • 10. IIoT Market: Spending toward IoT by Industry, The Philippines, 2016
The study provides information on cybersecurity and the initiatives taken by governments and private organizations in Southeast Asia (SEA) and Australia & New Zealand (ANZ) to improve security in an industrial setting. It also considers the developments in the manufacturing space and technologies that will affect cybersecurity, besides focusing on the importance of security in the future. Key Target Audience • Industrial automation and process control systems suppliers such as Honeywell, Rockwell Automation, Yokogawa, Siemens A.G, Schneider Electric • Cybersecurity solutions providers such as IBM, Cisco, Belden • Organizations offering niche services/solutions pertaining to cybersecurity Research Scope The study provides information on the initiatives taken by respective governments across Asia-Pacific to promote cybersecurity in a manufacturing environment that has been undergoing digitization. As there is a growing incidence of malware across critical installations, it is necessary to realize the level of vulnerability as it varies with each industry. This study discusses various end users targeted by malware based on the recent trends and the latest offerings from private participants. It also provides detailed information on critical errors in design and implementation of security and how companies must approach cybersecurity in the current scenario. These also help end users while approaching companies for cybersecurity solutions. As Industrial Internet of Things (IIoT) is seen as a major contributor to efficiency and optimization, it is likely that related technologies will be adopted by the manufacturing industry. However, the risks associated also grow correspondingly, making it important for all stakeholders to understand the implications of a breach. The study also identifies the spending on key industries that are vital to IIoT deployment as well as those that are targeted by cyber attacks. Cloud security, being a major development in the way data is
More Information
No Index No
Podcast No
Table of Contents | Executive Summary~ || Executive Summary—Key Findings~ || Executive Summary—Market Engineering Measurements~ || Executive Summary—CEO’s Perspective~ | Market Overview~ || Cybersecurity in Asia-Pacific~ || Market Overview—Research Scope, Study Period, and Regions~ || Market Overview—Definitions~ || Market Overview—Distribution Channels~ | External Challenges—Drivers and Restraints~ || Market Drivers~ || Market Restraints~ | Cybersecurity Market Trends and IIoT Spending~ || Market Engineering Measurements~ || Total Spending on IIoT—SEA and ANZ~ | Major Stakeholders of Cybersecurity and Initiatives by Country—Australia~ || Major Stakeholders of Cybersecurity in Asia-Pacific—Australia~ || Cybersecurity Initiatives—Australia~ || Spending on IIoT—Australia~ | New Zealand~ || Major Stakeholders of Cybersecurity in Asia-Pacific—New Zealand~ || Cybersecurity Initiatives—New Zealand~ || Spending on IIoT—New Zealand~ | Singapore~ || Major Stakeholders of Cybersecurity in Asia-Pacific— Singapore~ || Cybersecurity Initiatives—Singapore~ || Spending on IIoT—Singapore~ | Malaysia~ || Major Stakeholders of Cybersecurity in Asia-Pacific— Malaysia~ || Cybersecurity Initiatives—Malaysia~ || Spending on IIoT—Malaysia~ | Thailand and Indonesia~ || Major Stakeholders of Cybersecurity in Asia-Pacific—Thailand and Indonesia~ || Cybersecurity Initiatives—Thailand ~ || Spending on IIoT—Thailand~ || Cybersecurity Initiatives—Indonesia~ || Spending on IIoT—Indonesia~ | Vietnam and the Philippines~ || Major Stakeholders of Cybersecurity in Asia-Pacific—Vietnam and the Philippines~ || Cybersecurity Initiatives—Vietnam~ || Cybersecurity Initiatives—The Philippines~ || Spending on IIoT—The Philippines~ | Major Suppliers of Cybersecurity Solutions in Asia-Pacific~ || Major Suppliers of Industrial Cybersecurity Solutions~ | Key End-user Targets in Asia-Pacific~ || Key End-user Targets for Advanced Persistent Threat (APT) Groups~ || Cybersecurity in Other End Users~ | Common Techniques Deployed by Cyber Attackers~ || Common Techniques Deployed by Cyber Attackers~ | Critical Errors in Design and Implementation of Cybersecurity Measures~ || Critical Errors in Design and Implementation~ || Vulnerabilities and Implications of a Cyber Attack in an Industrial Setting~ || Holistic Cybersecurity Solutions for IIoT~ | Steps to a Robust Cybersecurity Strategy in an Industrial Setting~ || Steps to Ensure Robust Cybersecurity in an Industrial Setting~ | Growth Opportunities and Companies to Action~ || Transformation in Industrial Cybersecurity Ecosystem~ || Growth Opportunity 1—Security in a Digital World~ || Growth Opportunity 2—ASEAN Economic Community~ || Strategic Imperatives for Success and Growth~ | Cloud Security in IIoT Ecosystem~ || Cloud Security in IIoT Ecosystem~ | The Last Word~ || The Last Word—Predictions~ || Legal Disclaimer~ | Appendix~ || List of Market Participants~ || Learn More—Next Steps~
List of Charts and Figures 1. Total Cybersecurity Initiatives Market: Key Market Drivers, Asia-Pacific, 2017–2021~ 2. Total Cybersecurity Initiatives Market: Key Market Restraints, Asia-Pacific, 2017–2021~ 3. Total Cybersecurity Initiatives Market: Market Engineering Measurements, Asia-Pacific, 2016~ 4. Total Cybersecurity Initiatives Market: Key Stakeholders, Singapore, 2016~ 5. Total Cybersecurity Initiatives Market: Key Stakeholders, Malaysia, 2016~ 6. Total Cybersecurity Initiatives Market: Key Stakeholders, Thailand and Indonesia, 2016~ 7. Total Cybersecurity Initiatives Market: Key Stakeholders, Vietnam and the Philippines, 2016~ 8. Total Cybersecurity Initiatives Market: Key Suppliers of Cybersecurity Solutions, Asia-Pacific, 2016~ 9. Total Cybersecurity Initiatives Market: Vulnerabilities and Implications, Asia-Pacific, 2016~| 1. Total Cybersecurity Initiatives Market: Market Engineering Measurements, Asia-Pacific, 2016~ 2. Total Cybersecurity Initiatives Market: Distribution Channel Analysis, Asia-Pacific, 2016~ 3. Total Cybersecurity Initiatives Market: Spending toward IIoT by Industry, SEA and ANZ, 2016~ 4. IIoT Market: Spending toward IIoT by Industry, Australia, 2016~ 5. IIoT Market: Spending toward IIoT by Industry, New Zealand, 2016~ 6. IIoT Market: Spending toward IIoT by Industry, Singapore, 2016~ 7. IIoT Market: Spending toward IoT by Industry, Malaysia, 2016~ 8. IIoT Market: Spending toward IoT by Industry, Thailand, 2016~ 9. IIoT Market: Spending toward IIoT by Industry, Indonesia, 2016~ 10. IIoT Market: Spending toward IoT by Industry, The Philippines, 2016~
Author Krishnan Ramanathan
Industries Industrial Automation
WIP Number P958-01-00-00-00
Is Prebook No