{"id":129332,"date":"2025-02-18T05:36:36","date_gmt":"2025-02-18T11:36:36","guid":{"rendered":"https:\/\/www.controleng.com\/?p=129332"},"modified":"2025-02-18T05:36:37","modified_gmt":"2025-02-18T11:36:37","slug":"these-three-priorities-are-critical-for-data-security","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/","title":{"rendered":"These three priorities are critical for data security\u00a0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Cybersecurity insights<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comprehensive data security is more important than ever as hybrid cloud, generative AI and quantum computing emerge.<\/li>\n\n\n\n<li>Securing data is important since technicians, machines, edge devices and IoT tools have varying degrees of access to data across multiple clouds.\u00a0\u00a0<\/li>\n\n\n\n<li>To mitigate data security risks, industrial engineers need \u201ccrypto agility,\u201d the ability to quickly switch between different encryption mechanisms that protect sensitive data.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<p>Factory floors, plant control rooms and other industrial engineering settings are growing smarter each day, highlighting the need for more intensive data security. Industrial engineers are eager to enhance their control systems and operational technology with the latest digital capabilities, like generative AI.<\/p>\n\n\n\n<p>Smarter settings mean more efficiency, insights and control \u2014 all enabled by more <em>data<\/em>. But as industrial settings grow more data rich, critical data is often left unprotected. For the third year in a row, the <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\">IBM X-Force Threat Intelligence Report<\/a> ranked manufacturing as the most-attacked industry by cybercriminals.<\/p>\n\n\n\n<p>And cyberattacks are just one issue: There\u2019s also the possibility of insider threats, human error and compliance failures. These carry a significant price tag. Industrial organizations see some of the highest data breach costs \u2014 an average of $5.6 million \u2014 according to IBM\u2019s annual <a href=\"https:\/\/newsroom.ibm.com\/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs\">Cost of a Data Breach Report<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"622\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure1-1024x622.png\" alt=\"Figure 1: Data breaches in the industrial sector are among the most expensive. Courtesy: \u201cCost of a Data Breach Report 2024,\u201d IBM.\" class=\"wp-image-129333\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure1-1024x622.png 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure1-300x182.png 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure1-768x467.png 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure1.png 1432w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 1: Data breaches in the industrial sector are among the most expensive. Courtesy: \u201cCost of a Data Breach Report 2024,\u201d IBM.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Data security in a sensitive sector<\/h2>\n\n\n\n<p>This shouldn\u2019t be surprising. The industrial sector has always been an attractive target for bad actors due to its coveted IP like proprietary designs and sensitivity to downtime. For example, automakers <a href=\"https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/02\/22\/unplanned-downtime-costs-more-than-you-think\/\">can lose<\/a> over $20,000 <em>per minute<\/em> of unplanned downtime.<\/p>\n\n\n\n<p>Nor should these trends be a reason to eschew emerging technologies. Innovation has always been the lifeblood of industrial engineering.<\/p>\n\n\n\n<p>However, these trends make clear the importance of data security in industrial engineering. Especially at this moment in time, as compliance grows more complex and as three major digital transformations \u2014 <a href=\"https:\/\/www.controleng.com\/software-and-data-security-compliance-responsibility-in-the-cloud\/\">hybrid cloud, generative AI and quantum computing<\/a> \u2014 upend the traditional data security paradigm.<\/p>\n\n\n\n<p>Amid these rapid changes, cybersecurity professionals in the industrial sector should approach data security with three key priorities: laying a strong foundation; meeting emerging risks; and preparing for future risks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2-1024x538.png\" alt=\"Figure 2: Data security in the generative AI era needs to span the entire AI pipeline: the data, the models and the usage. Courtesy: IBM\" class=\"wp-image-129334\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2-1024x538.png 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2-300x158.png 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2-768x404.png 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png 1298w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 2: Data security in the generative AI era needs to span the entire AI pipeline: the data, the models and the usage. Courtesy: IBM<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Laying a strong foundation: data security basics<\/h2>\n\n\n\n<p>While the data security paradigm is transforming, there are still long-standing best practices that security professionals should always employ. These are the nuts-and-bolts of data security that date back to the days when data was only stored in mainframes on-premises.<\/p>\n\n\n\n<p>Data security professionals should have robust answers to a few important questions: Do you know where your most sensitive data is stored? Is that data being actively monitored? Do you have a plan in place \u2014 e.g. containment, notification, improvement \u2014 for when a data breach occurs? It\u2019s <em>when <\/em>a breach occurs, not <em>if.<\/em> The industrial sector should anticipate the worst-case scenario. The IBM X-Force Threat Intelligence Report also found data theft and data leakage to be the most common incidents.<\/p>\n\n\n\n<p>Protecting data throughout its full lifecycle \u2014 from collection to storage and processing to disposal \u2013 is fundamental. This means being diligent about discovering and protecting data and then analyzing and responding to risks and threats in real time.<\/p>\n\n\n\n<p>Comprehensive <a href=\"https:\/\/www.ibm.com\/services\/identity-access-management\">Identity and Access Management<\/a> (IAM) is also a requirement. Determining who or what can access your systems \u2014 and data \u2014 is especially important in the industrial sector, where a vast array of technicians, machines, edge devices and IoT tools have varying degrees of access to data across multiple clouds.\u00a0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hybrid cloud adoption and generative AI proliferation<\/h2>\n\n\n\n<p>Once industrial engineers have a strong data security foundation to build upon, they can expand their work to address newer risks and threats. Right now, those surfaces are hybrid cloud and AI \u2014 particularly generative AI.<\/p>\n\n\n\n<p>The days of data being stored solely on premises are gone due to hybrid cloud and AI transformations. Industrial engineers\u2019 data now lives across multiple clouds and within large language models. This has major upsides, empowering engineers to optimize supply chains, predict asset maintenance needs and enhance quality control.<\/p>\n\n\n\n<p>These upsides also come with risks, however. It\u2019s easier than ever to lose sight of where data is stored, who has access and how it is protected. \u201cShadow data\u201d like this significantly escalates the likelihood of a breach. Likewise, the use of generative AI introduces more potential attack surfaces: the training data, the model and the model\u2019s usage. Generative AI like large language models also presents entirely novel vulnerabilities, like prompt engineering, jailbreaks and \u201cshadow AI.\u201d Shadow AI are unsanctioned models operating within a business\u2019s digital ecosystem, often introduced by negligent staff, that elude governance. Recent <a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/report\/securing-generative-ai\">research<\/a> by IBM revealed that only 24% of current generative AI projects are being secured. If industrial engineers are using generative AI, they must protect the <em>entire<\/em> AI pipeline: secure the data, secure the models and secure the usage.<\/p>\n\n\n\n<p>How should security professionals in the industrial sector pursue this type of comprehensive protection? The <em>wrong <\/em>way to go about this is with a patchwork of isolated point solutions: one piece of software for this surface area, another piece of software for that surface area. A fragmented approach inevitably leads to silos, limited visibility and breaches. Instead, security professionals need unified controls that grant visibility across teams and surface areas. The need for this unified experience was a guiding force behind IBM&#8217;s <a href=\"https:\/\/newsroom.ibm.com\/2024-10-22-ibm-advances-secure-ai-quantum-safe-technology-with-ibm-guardium-data-security-center\">newest data security software<\/a>. We heard repeatedly from security professionals in the industrial sector and others that they need a single package with multiple capabilities: data monitoring and compliance, data and AI security posture management, data detection and response and cryptography management.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"527\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure3-1024x527.png\" alt=\"Figure 3: Data security professionals need unified controls, not a patchwork of point solutions. Courtesy: IBM Guardium Data Security Center\" class=\"wp-image-129335\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure3-1024x527.png 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure3-300x154.png 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure3-768x395.png 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure3.png 1264w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 3: Data security professionals need unified controls, not a patchwork of point solutions. Courtesy: IBM Guardium Data Security Center<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Preparing for future risks: quantum-safe cryptography<\/h2>\n\n\n\n<p>While cybersecurity professionals acclimate to hybrid cloud and generative AI impacts on data security, another technological transformation is just over the horizon: quantum computing.<\/p>\n\n\n\n<p>Quantum computing carries immense potential in industrial engineering, like discovering new materials and tackling other complex problems that classical computers struggle with. But bad actors with quantum-powered technology may one day be able to break today\u2019s encryption. Experts predict that quantum computing could challenge present-day encryption by the end of the current decade.<\/p>\n\n\n\n<p>This scenario presents current dangers, too. The notion of \u201charvest now, decrypt later\u201d can place industrial organizations\u2019 IP and other sensitive data at risk right now. Bad actors could potentially harvest encrypted data now and years later decrypt it using cryptographically relevant quantum-powered attacks. This can pose a real problem in industrial engineering, where proprietary designs and trade secrets have long shelf lives.<\/p>\n\n\n\n<p>To mitigate these risks, industrial engineers need \u201ccrypto agility,\u201d the ability to quickly switch between different encryption mechanisms that protect sensitive data. This requires visibility into all encrypted assets and also the ability to transition from traditional encryption techniques to newer, post-quantum cryptography like the standards <a href=\"https:\/\/newsroom.ibm.com\/2024-08-13-ibm-developed-algorithms-announced-as-worlds-first-post-quantum-cryptography-standards#:~:text=The%20standards%20include%20three%20post,several%20industry%20and%20academic%20partners.\">recently set by NIST<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prioritizing data security in industrial networks<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.controleng.com\/network-security-is-not-enough-for-ot-data\/\">Data security should always be a top priority<\/a>, especially in industrial engineering. The field\u2019s innate qualities \u2014 like its complexity and its importance \u2014 mean security professionals need a comprehensive and proactive approach to the data security trade. By laying a strong foundation, expanding to protect emerging risks and then finally preparing for risks on the horizon, security professionals in industrial engineering can ensure their critical work and innovations remain safe.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Akiba Saeedi<\/strong> is the vice president of product management data security and cloud\/service providers with IBM. Edited by <strong>Sheri Kasprzak<\/strong>, managing editor, Automation &amp; Controls, WTWH Media, <a href=\"mailto:skasprzak@wtwhmedia.com\">skasprzak@wtwhmedia.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity insights Factory floors, plant control rooms and other industrial engineering settings are growing smarter each day, highlighting the need for more intensive data security. Industrial engineers are eager to enhance their control systems and operational technology with the latest digital capabilities, like generative AI. Smarter settings mean more efficiency, insights and control \u2014 all [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":129334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104076],"tags":[109866,109870,109341,109340,109809,109871,109867,109869,109868,109872],"tracking-metrics":[],"display-location":[109353],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>These three priorities are critical for data security\u00a0 - Control Engineering<\/title>\n<meta name=\"description\" content=\"Industrial sectors are targeted by cybercriminals and shoulder high costs from data breaches. Comprehensive data security is critical.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These three priorities are critical for data security\u00a0 - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"Industrial sectors are targeted by cybercriminals and shoulder high costs from data breaches. Comprehensive data security is critical.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-18T11:36:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-18T11:36:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1298\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sheri Kasprzak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sheri Kasprzak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\"},\"author\":{\"name\":\"Sheri Kasprzak\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/95b2a8682c46f4ae90c170b265b9f5f8\"},\"headline\":\"These three priorities are critical for data security\u00a0\",\"datePublished\":\"2025-02-18T11:36:36+00:00\",\"dateModified\":\"2025-02-18T11:36:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\"},\"wordCount\":1286,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png\",\"keywords\":[\"artificial intelligence\",\"cloud computing\",\"control engineer\",\"control engineering\",\"cybersecurity\",\"data\",\"data security\",\"generative AI\",\"industrial networks\",\"quantum computing\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\",\"url\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\",\"name\":\"These three priorities are critical for data security\u00a0 - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png\",\"datePublished\":\"2025-02-18T11:36:36+00:00\",\"dateModified\":\"2025-02-18T11:36:37+00:00\",\"description\":\"Industrial sectors are targeted by cybercriminals and shoulder high costs from data breaches. Comprehensive data security is critical.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png\",\"width\":1298,\"height\":682,\"caption\":\"Figure 2: Data security in the generative AI era needs to span the entire AI pipeline: the data, the models and the usage. Courtesy: IBM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"These three priorities are critical for data security\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/95b2a8682c46f4ae90c170b265b9f5f8\",\"name\":\"Sheri Kasprzak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f6306210094147bb5c7004260197732685a63f208a811b2a6ad548e4152a5e2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f6306210094147bb5c7004260197732685a63f208a811b2a6ad548e4152a5e2?s=96&d=mm&r=g\",\"caption\":\"Sheri Kasprzak\"},\"url\":\"https:\/\/www.controleng.com\/author\/sheri-kasprzak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These three priorities are critical for data security\u00a0 - Control Engineering","description":"Industrial sectors are targeted by cybercriminals and shoulder high costs from data breaches. Comprehensive data security is critical.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/","og_locale":"en_US","og_type":"article","og_title":"These three priorities are critical for data security\u00a0 - Control Engineering","og_description":"Industrial sectors are targeted by cybercriminals and shoulder high costs from data breaches. Comprehensive data security is critical.","og_url":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-02-18T11:36:36+00:00","article_modified_time":"2025-02-18T11:36:37+00:00","og_image":[{"width":1298,"height":682,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png","type":"image\/png"}],"author":"Sheri Kasprzak","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Sheri Kasprzak","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/"},"author":{"name":"Sheri Kasprzak","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/95b2a8682c46f4ae90c170b265b9f5f8"},"headline":"These three priorities are critical for data security\u00a0","datePublished":"2025-02-18T11:36:36+00:00","dateModified":"2025-02-18T11:36:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/"},"wordCount":1286,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png","keywords":["artificial intelligence","cloud computing","control engineer","control engineering","cybersecurity","data","data security","generative AI","industrial networks","quantum computing"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/","url":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/","name":"These three priorities are critical for data security\u00a0 - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png","datePublished":"2025-02-18T11:36:36+00:00","dateModified":"2025-02-18T11:36:37+00:00","description":"Industrial sectors are targeted by cybercriminals and shoulder high costs from data breaches. Comprehensive data security is critical.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/02\/CTL2504_MAG_CYBERSECURITY_IBM_Figure2.png","width":1298,"height":682,"caption":"Figure 2: Data security in the generative AI era needs to span the entire AI pipeline: the data, the models and the usage. Courtesy: IBM"},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/these-three-priorities-are-critical-for-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"These three priorities are critical for data security\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/95b2a8682c46f4ae90c170b265b9f5f8","name":"Sheri Kasprzak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f6306210094147bb5c7004260197732685a63f208a811b2a6ad548e4152a5e2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f6306210094147bb5c7004260197732685a63f208a811b2a6ad548e4152a5e2?s=96&d=mm&r=g","caption":"Sheri Kasprzak"},"url":"https:\/\/www.controleng.com\/author\/sheri-kasprzak\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=129332"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/129334"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=129332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=129332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=129332"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=129332"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=129332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}