Exploring the stakes behind insider threats and how to cut down on operational risk.
by Orion Czarnecki
When manufacturers consider the key threats they face, the discussion often centers on ransomware gangs or state-sponsored hackers targeting legacy systems. Yet some of the most serious risks originate inside the organization’s own four walls.
The good news is that you can build stronger insider-threat programs anchored in recognized frameworks, practical safeguards, and a culture of transparency.
For manufacturers — especially those in critical‑infrastructure sectors — the stakes are high. A single insider incident can trigger operational downtime, financial losses, intellectual‑property (IP) theft, safety issues, and regulatory or legal exposure.
Insider threats typically fall into three categories:
Understanding these categories is important because each requires a distinct response. In mature programs, equal attention goes to pathways — identity and access, portable media, remote/vendor access, data egress, and change control — because that’s where prevention is engineered.
Cybersecurity frameworks provide a reliable starting point for building or maturing your program. One that is particularly relevant in manufacturing is the Insider Risk Mitigation Program Evaluation (IRMPE). Developed with support from the Cybersecurity and Infrastructure Security Agency (CISA) and Carnegie Mellon University’s Software Engineering Institute (SEI), IRMPE offers a structured way to assess the maturity of your insider‑risk program and pinpoint operational gaps.
With manufacturing being a top infrastructure priority for CISA and an area covered by the EU’s NIS2 Directive, aligning with recognized frameworks helps ensure your controls withstand scrutiny from regulators, insurers, and customers – even when compliance is not mandatory.
Frameworks like IRMPE help you assess gaps. The next step is to apply practical controls to reduce the likelihood and impact of insider incidents. Start with these five tactics:
Most insider incidents involve compromised or overly broad access. Enforce least privilege and segregation of duties, require multi-factor authentication, and regularly review access to remove unused rights and deactivate stale accounts. In converged IT/OT environments, segment networks and tightly manage access to PLCs, HMIs, historians, and engineering workstations. Where feasible, use named accounts, just‑in‑time (JIT) elevation for privileged tasks, and recorded vendor sessions through bastions. Monitor for anomalous behavior (e.g., unusual file access, privilege escalation, or data egress).
General security training isn’t enough. Add specialized Insider Threat modules that:
Managers and leaders at every level should actively know and support their teams while watching for early risk indicators — without stigmatizing anyone.
Practical steps include:
When done well, personnel control is a low-cost, high-impact preventive measure that reduces the surface area for insider threats.
Run cross‑functional tabletop exercises (HR, Legal, Security, IT/OT, Operations, and executives) that explicitly include insider‑threat scenarios. Examples: A maintenance engineer modifies PLC logic, a clerk exfiltrates CAD/BOM files, and a supervisor manipulates procurement or payroll. Use these exercises to clarify roles, expose gaps, validate monitoring and escalation paths, and refine communications.
The strongest programs make employees partners in defense. Encourage “see something, say something” reporting, host informal Q&A sessions, and demonstrate a fair and consistent handling of reports. Align policies and make them accessible so employees know exactly how to report concerns and what happens next. Involve HR, Legal, and Operations stakeholders early to ensure buy‑in and a clear communication plan.
Failing to address insider threats can lead to direct financial loss, reputational damage, legal liability, and data exposure. Insurers may deny claims if weak controls contributed to the incident. Just as critical is trust. Customers, suppliers, and partners expect their goods, services, data, and IP to be protected. High-value products and components — especially those that embody proprietary designs or trade secrets — are prime targets for insiders. One breach can undo years of relationship‑building.
Operationally, insider incidents can halt production, degrade product quality or data integrity, delay shipments, and ripple across the supply chain, triggering contractual penalties, regulatory action, and other consequences.
Today’s manufacturing environments are more interconnected than ever, with the convergence of IT and OT increasing the potential impact. Adversaries are becoming increasingly targeted in their approaches and are utilizing AI to craft convincing lures and exploit known insider vulnerabilities. People will always be a significant variable in security outcomes.
For these reasons, manufacturers cannot afford to postpone implementing a reliable Insider-Threat Program (if one doesn’t already exist) or strengthening the program they currently have.
A few practical steps to take to begin this process include:
Insider threats pose significant risks across every part of a manufacturing operation. It’s not too late to implement safeguards that reduce those risks and protect operations from the inside out — recognizing that a malicious actor on the inside can think much like one on the outside. With the proper framework, controls, training, and culture, manufacturers can significantly reduce insider risk while fostering a safe and productive workplace.
Adopt this single design constraint and measure progress against it: No single identity — employee, contractor, or vendor — can, acting alone and unobserved, modify production logic or remove crown‑jewel data.
Make this your standard. Engineer toward it with least privilege, segregation of duties, network segmentation, JIT privileged access, recorded vendor sessions, and egress guardrails. With that north star, insider events become manageable interruptions, not crises that halt operations.
About the Author:
Orion Czarnecki, head of cybersecurity at Stefanini Group, is a forward-thinking strategist dedicated to crafting digital solutions that foster business agility and modernization. He brings over a decade of experience in data analytics, cloud computing, and AI-driven strategies, consistently aligning technology initiatives with client objectives. Known for his analytical approach to problem-solving, Orion plays a key role at Stefanini by guiding teams toward impactful digital transformations, ensuring clients remain competitive and innovative within their industries.
Read more from the author:
How AI is Transforming Cybersecurity for Manufacturers | November 2024
Jeff White, leader of Robinson+Cole’s Manufacturing Law and Aerospace Supply Chain teams, and one of the most respected voices in the manufacturing world today, discusses the implications of tariffs becoming a permanent fixture, supply chains under constant stress, and technology transforming how companies operate. Jeff works with clients around the globe helping them navigate market access, growth, and disruption. He shares candid insights on how manufacturers can adapt to workforce shifts, embrace innovation, and stay competitive in a rapidly changing landscape. 🎧 Tune in to learn how to not just survive—but thrive—in today’s era of disruption.