HomeCyber SecurityNavigating OT Safety Challenges Throughout Asia’s Manufacturing Landscapes – Cyber Tech
Navigating OT Safety Challenges Throughout Asia’s Manufacturing Landscapes – Cyber Tech
March 4, 2026
Digital transformation continues to be the theme for a lot of of Asia’s enterprises, that are straddled with legacy methods, processes, and infrastructure, and, in lots of instances, cultures resistant to vary. Web of Issues (IoT) is not any exception, and arguably, one of many final remaining strongholds of the Seventies idiom: “If it ain’t broke, do not repair it!”
I say “few remaining” could also be as a result of it’s tough to make an entire stock of how a lot non-IT know-how is out within the wild, solely to be found. In spite of everything, it broke, or is scheduled for improve or substitute.
Projections point out the Asia-Pacific IoT market will surge to US$355 billion by 2029, pushed by industrial automation, good cities, and 5G adoption. In China alone, over 3 billion lively IoT units had been reported in 2023, underscoring the area’s dominance in information era and its anticipated seize of 58% of worldwide IIoT information by 2025.
Nonetheless, this connectivity growth brings documented dangers, together with escalating cyber threats and provide chain vulnerabilities, alongside alternatives for enhanced effectivity and resilience.
Mapping and validating safety controls
A core problem in Asia’s linked panorama is making certain safety throughout sprawling information pathways. Many organisations overlook precise information flows, focusing as an alternative on theoretical designs.
“Most organisations strategy this as a management stock train, however this usually misses the true concern: few groups have an entire image of how their information really strikes,” notes Wai Package Cheah, APAC CISO & Linked Ecosystem chief at Lumen Applied sciences. “In follow, most groups do not, and that is the place safety breaks down.”
This hole is acute in industrial IoT (IIoT), the place legacy units and provider entry exacerbate dangers. Throughout APAC, key weaknesses embody unpatchable units and fragmented monitoring, with failures usually occurring at cloud handoffs.
Satisfactory validation should prioritise operational realities over audits, as cyber incidents ranked as the highest world threat in 2026, cited by 42% of respondents within the Allianz Threat Barometer.
Balancing reliability, latency, and safety
Connectivity methods in Asia should adapt to numerous terrains, from city hubs to distant websites. City areas face complicated networks that amplify assault surfaces, whereas distant operations compromise safety to take care of uptime.
“City and distant environments are inclined to fail in numerous methods,” Cheah explains. “In dense, regulated markets, connectivity is usually secure however extremely complicated. In distinction, distant areas usually function with restricted bandwidth and better latency, and a bent to calm down safety controls merely to maintain operations operating.”
Classifying property by criticality and testing failover situations is important. Alternatives come up in 5G’s large machine-type communications, which assist as much as 1,000,000 units per sq. kilometre and allow large-scale IIoT in logistics and manufacturing. In ASEAN, provide chain progress integrates AI for predictive analytics, decreasing failures and enhancing monitoring.
Implementing community segmentation and tenant isolation
Stopping lateral motion post-breach calls for identity-based controls past bodily layouts. “Efficient segmentation and tenant isolation require controls that function independently of the community’s bodily format,” states Cheah, advocating identity-tied insurance policies, default-deny guidelines, and separated planes.
Wai Package Cheah
“Enforcement is then validated by simulating a compromised system or tenant and confirming that lateral motion is blocked by design, not merely detected after the actual fact.” Wai Package Cheah
Validation via breach simulations is essential. In Asia, the place OT/IoT convergence ranks as a prime concern (49% in WEF surveys), fragmented approaches hinder resilience.
“In 2026, ASEAN nations and enterprises should start a transition away from the present fragmented strategy and in the direction of a unified, interoperable and data-centric regional ecosystem,” warns an skilled from Wi-fi Logic.
Mandating encryption for information in transit
Encryption stays non-negotiable amid rising transit dangers. “All IoT information in transit needs to be protected utilizing end-to-end encryption (E2EE), no matter location or community sorts,” Cheah advises, highlighting TLS for functions and IPsec for carriers.
Handoffs as zero-trust boundaries forestall decryption vulnerabilities. He argues that information ought to stay encrypted till it reaches a tightly managed enterprise or cloud atmosphere.
“Architectures that decrypt site visitors contained in the community introduce pointless threat and develop the potential blast radius of a compromise,” feedback the linked ecosystem chief at Lumen Applied sciences.
With IoT assaults surging 400% in 2025, Asia’s cellular and IoT exposures outpace defences, per Zscaler studies. Alternatives embody AIoT for safe, real-time healthcare monitoring, projected to drive market progress at 15% CAGR via 2030.
Implementing egress filtering and permit itemizing
Controlling outbound communications curbs exfiltration. “Sure, supplied enforcement is constant and centrally ruled,” Cheah confirms. “A default-deny strategy ensures IoT units are solely allowed to speak with explicitly accepted endpoints, with all different outbound site visitors blocked.”
“Any exceptions needs to be time-bound, auditable, and reviewed repeatedly, so short-term entry does not change into everlasting publicity,” provides Cheah.
In cloud-heavy Asia, IP fragility calls for identity-anchored controls. DDoS and malware threats (49% of IoT dangers) underscore this, with laws such because the EU Cyber Resilience Act shaping APAC requirements.
Controlling privileged entry
Least privilege minimises insider threats. “Least privilege entry hinges on limiting who can entry methods, what they’ll do, and the way lengthy that entry lasts,” Cheah elaborates, recommending function separation, short-term permissions, and audits.
“Common audits are important to determine unused privileges, standing exceptions, or entry that not aligns with operational roles. If permissions usually are not routinely reviewed, the least privilege exists solely on paper.” Wai Package Cheah
Expertise shortages (56% barrier in WEF information) amplify dangers, however AI-driven monitoring affords alternatives for automation in manufacturing environments.
Evaluating supplier certifications
Certifications like ISO 27001 present baselines however usually fail to handle ecosystem gaps.
“Certifications corresponding to ISO 27001 or SOC 2 attestation are essential, however they not often cowl all the IoT ecosystem,” Cheah cautions. “These certifications needs to be assessed alongside contractual and operational duty fashions.”
In Asia, the place provide chain assaults rose sharply, 65% of enormous corporations cite third-party vulnerabilities as their prime problem. “Cybersecurity threat in 2026 is accelerating, fuelled by advances in AI, deepening geopolitical fragmentation and the complexity of provide chains,” observe Jeremy Jurgens and Paolo Dal Cin from the World Financial Discussion board.
Authenticating system identification and verifying information integrity
Spoofing prevention begins at transmission. “Every system needs to be handled as a novel safety principal, not a generic endpoint. Each system is issued a definite identification, supported by certificates or hardware-rooted credentials, and should authenticate earlier than any information is accepted,” Cheah stresses.
He stresses the significance of those controls utilized on the level of transmission, including: “If identification or integrity checks are deferred upstream, malicious or spoofed information has already infiltrated the atmosphere. Common credential rotation and strict rejection of unauthenticated site visitors full the management mannequin.”
Credential rotation is significant. Asia’s IoT growth, with Northeast Asia holding 70% of worldwide mobile connections by 2025, heightens these wants, however edge AI allows real-time verification, boosting predictive upkeep in manufacturing.
Constructing resilience to region-specific dangers
Asia’s diverse dangers—from outages to disasters—demand designed-in failover. “Resilience to region-specific dangers depends upon whether or not failure has been explicitly designed into the system,” Cheah notes.
He additionally warns that: “If resilience solely works below excellent circumstances, it can fail throughout actual disruptions corresponding to pure disasters, fibre cuts, or regional regulatory shifts.”
Native continuity and examined backups are essential. Alternatives in good grids and environmental monitoring align with sustainability targets, with low-power IoT decreasing prices.
Making certain compliance with evolving laws
Information sovereignty evolves quickly. Cheah reminds us that making certain compliance begins with visibility and consistency. “This implies figuring out the place information is created, processed, and saved throughout units, networks, and platforms,” he continues.
“Core safety and privateness controls corresponding to encryption, entry management, logging, and retention needs to be utilized uniformly by default, with jurisdiction-specific necessities layered on prime of a standard structure, reasonably than carried out as separate nation designs.” Wai Package Cheah
He concludes the dialogue advising that clear possession throughout all the information lifecycle is important to make sure accountability and to handle gaps as laws evolve.
In Asia, frameworks like Singapore’s digital belief initiatives assist this, fostering innovation amid geopolitical tensions.
Asia’s IoT trajectory affords immense alternatives, from 30% reductions in manufacturing unit downtime to AIoT-optimised provide chains. But, with AI vulnerabilities rising quickest (87% in WEF surveys), proactive safety is crucial. By addressing these traits, enterprises can harness connectivity for resilient progress.
Azeem Rajpoot, the author behind This Blog, is a passionate tech enthusiast with a keen interest in exploring and sharing insights about the rapidly evolving world of technology.
With a background in Blogging, Azeem Rajpoot brings a unique perspective to the blog, offering in-depth analyses, reviews, and thought-provoking articles. Committed to making technology accessible to all, Azeem strives to deliver content that not only keeps readers informed about the latest trends but also sparks curiosity and discussions.
Follow Azeem on this exciting tech journey to stay updated and inspired.