{"id":23052,"date":"2020-02-04T10:47:52","date_gmt":"2020-02-04T09:47:52","guid":{"rendered":"https:\/\/www.weyer-gruppe.com\/cyber-security-in-plant-security\/"},"modified":"2026-04-10T12:31:49","modified_gmt":"2026-04-10T10:31:49","slug":"cyber-security-in-plant-security","status":"publish","type":"page","link":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/","title":{"rendered":"Cyber security of production facilities"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_column_text]IT and the networking of a wide variety of systems with each other &#8211; the Internet of Things &#8211; is one of the central topics of our time &#8211; not only from a developer&#8217;s point of view, but also with regard to IT security or the cyber security of production facilities. However, in addition to the many positive effects of the new achievements in digitalisation, the negative developments are also becoming clearer: hacker attacks on networked systems are occurring again and again, so that the legislator has now also included cyber security in some laws relevant to operators and manufacturers.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1597240098976{padding-right: 20px !important;}&#8221;][vc_empty_space height=&#8221;16px&#8221;]<h3 class=\"grve-element grve-align-left grve-title-no-line grve-h3\" style=\"\"><span>Overview of the legal basis for the analysis<\/span><\/h3>[vc_column_text]A variety of guidelines and recommendations can be consulted as a legal basis for analysing the cyber security of a production facility, machine or production site. In the following, we present those approaches that we frequently use in our work.[\/vc_column_text][vc_tta_accordion c_icon=&#8221;&#8221; active_section=&#8221;&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section i_icon_fontawesome=&#8221;fas fa-exclamation-triangle&#8221; add_icon=&#8221;true&#8221; title=&#8221;Major Accidents Ordinance \/ 12th BImSchV&#8221; tab_id=&#8221;1595835511822-dbf009c1-f740&#8243;][vc_column_text]For operational areas that fall under the Hazardous Incident Ordinance, \u00a7 3 (General Operator Obligations) of the <a href=\"https:\/\/www.gesetze-im-internet.de\/bimschv_12_2000\/\">12th BImSchV<\/a> also requires a consideration of IT security. The focus here is on process control and instrumentation and control equipment. The environmental administrations of the individual federal states are responsible for implementation. For NRW, the <a href=\"https:\/\/www.lanuv.nrw.de\/themen\/industrieanlagen\/anlagensicherheit\/sicherheitsbericht\" target=\"_blank\" rel=\"noopener\">LANUV<\/a>has specified the requirements for the presentation of IT security in the safety report and in the licensing documents for plant safety in an <a href=\"https:\/\/www.lanuv.nrw.de\/fileadmin\/lanuv\/anlagen\/pdf\/Orientierungspapier_IT_im_SIB_04-2021.pdf\" target=\"_blank\" rel=\"noopener\">orientation paper<\/a>.<\/p>\n<p>It can be assumed that authorities in NRW will from now on use the orientation paper as a template when assessing safety reports and licensing documents. The orientation paper explicitly mentions the following topics that must be presented in the safety report:<\/p>\n<ul>\n<li>Network architecture and zone models<\/li>\n<li>Asset lists<\/li>\n<li>IT risk analysis \/ IT risk assessment<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-wifi&#8221; add_icon=&#8221;true&#8221; title=&#8221;IT Security Act&#8221; tab_id=&#8221;1595835511840-0eb21d9f-b7ac&#8221;][vc_column_text]The <a href=\"http:\/\/www.gesetze-im-internet.de\/bsig_2009\/\">IT Security Act<\/a>, for which the Federal Ministry of the Interior is responsible, focuses primarily on protecting the security of supply and so-called critical infrastructures. The law only applies to &#8220;facilities&#8221; that serve at least 500,000 people. The BSI-KritisV is a holistic approach for companies and thus includes all company divisions.[\/vc_column_text][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-clipboard&#8221; add_icon=&#8221;true&#8221; title=&#8221;KAS-51&#8243; tab_id=&#8221;1595836224751-c998a28b-0f88&#8243;][vc_column_text]The Commission for Plant Safety (KAS) is an independent body advising the German Federal Government or the responsible Federal Ministry on issues relating to the safety of plants within the meaning of the Federal Immission Control Act (BImSchG). The guideline KAS-51 &#8220;Measures against tampering by unauthorised persons&#8221;, specifies basic measures, among other things. This includes, for example, the definition of responsibilities as well as access management and access monitoring. The security analysis required by the KAS-51 guideline consists of the threat analysis, the hazard analysis and the IT risk assessment. The latter can be carried out according to IEC 62443, DIN ISO\/IEC 27001 or NA 163, among others. Annex 2 of the guide KAS-51 deals with protection against cyber-physical attacks and covers topics such as IT security as a management task and responding to new vulnerabilities and threats. All topics listed in Appendix 2 are implemented through control questions. The review by the authority ultimately focuses on the security analysis and the quality of implementation. If sufficient protection is determined, a separate safety review pursuant to \u00a7 10a of the Ordinance on Safety Reviews (Sicherheits\u00fcberpr\u00fcfungsfeststellungsverordnung, S\u00dcFV) is not required. The safety report serves as proof of legal certainty for the plant operator.[\/vc_column_text][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-paperclip&#8221; add_icon=&#8221;true&#8221; title=&#8221;VDI\/VDE 2180&#8243; tab_id=&#8221;1595836908447-459f5026-be76&#8243;][vc_column_text]As a result of the concretisation of the IEC 61508 and IEC 61511 standards, VDI\/VDE 2180, the guideline for functional safety in the process industry, was renewed in April 2019. Cyber security is a new focus: &#8220;In the management of functional safety, IT security aspects must be taken into account in planning, procurement, validation, operation, modifications and decommissioning.&#8221; The new version goes on to say: &#8220;Through the use of IT-based technologies and the increasing networking of systems, automation systems including the associated programming and configuration devices can become the target of cyber threats. [&#8230;] An IT risk assessment must be carried out in order to assess the risk potential and determine suitable countermeasures.&#8221; (Sheet 1, p. 38 ff.) The IT security assessment for PLT security devices can be carried out independently or together with the general IT risk assessment. Components that are affected are hardware, software, data, connections, processes and people. VDI\/VDE 2180 also states on the following pages that NA 163 contains methods for carrying out an IT risk analysis as well as a catalogue of measures which, together with VDI\/VDE 2180, can lead to a suitable IT security concept.[\/vc_column_text][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-folder-open&#8221; add_icon=&#8221;true&#8221; title=&#8221;NA 163&#8243; tab_id=&#8221;1595837871706-e3781b3a-7225&#8243;][vc_column_text]Since the above-mentioned approaches to an IT risk analysis are often very time-consuming and personnel-intensive, NAMUR worksheet 163 is intended to help ensure compliance with laws and regulations even if the security analysis is carried out by non-IT specialists (e.g. PCT engineer). The time requirement should be limited by the worksheet to a maximum of one day per system. In NA 163, it is recommended to write the IT risk assessment according to IEC 62443. The basic parameters are generally valid: SIL 1 to 3, a low requirement rate and a zoned structure of the network. The IT risk assessment of PLT safety installations according to NA 163 is ultimately carried out in five steps:<\/p>\n<ol>\n<li>Identification of the system under consideration<\/li>\n<li>High-level IT risk assessment<\/li>\n<li>Division of the system under consideration into zones and connections<\/li>\n<li>Detailed IT risk assessment<\/li>\n<li>Documentation<\/li>\n<\/ol>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;25px&#8221;]<h5 class=\"grve-element grve-align-left grve-title-no-line grve-h5\" style=\"\"><span>Take advantage of our free initial consultation. Make an appointment now:<\/span><\/h5>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f26126-o1\" lang=\"de-DE\" dir=\"ltr\" data-wpcf7-id=\"26126\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/23052#wpcf7-f26126-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Kontaktformular\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"26126\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"de_DE\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f26126-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p><label> Unternehmen<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"unternehmen\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"unternehmen\" \/><\/span> <\/label><br \/>\n<label> Anrede (Pflichtfeld)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"anrede\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"anrede\"><option value=\"\">&#8211; Bitte ausw\u00e4hlen &#8211;<\/option><option value=\"Herr\">Herr<\/option><option value=\"Frau\">Frau<\/option><option value=\"sonstiges\">sonstiges<\/option><\/select><\/span> <\/label><br \/>\n<label> Name (Pflichtfeld)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label><br \/>\n<label> E-Mail-Adresse (Pflichtfeld)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label><br \/>\n<label> Telefonnummer<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Telefon\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"Telefon\" \/><\/span> <\/label><br \/>\n<label> Datum <span class=\"wpcf7-form-control-wrap\" data-name=\"datum\"><input class=\"wpcf7-form-control wpcf7-date wpcf7-validates-as-required wpcf7-validates-as-date\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"date\" name=\"datum\" \/><\/span> <\/label><br \/>\n<label> Wie sind Sie auf uns aufmerksam geworden (Pflichtfeld) <span class=\"wpcf7-form-control-wrap\" data-name=\"WiesindSieaufunsaufmerksamgeworden\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"WiesindSieaufunsaufmerksamgeworden\"><option value=\"\"><\/option><option value=\"Bestandskunde\">Bestandskunde<\/option><option value=\"Suchmaschinensuche (Google, Bing)\">Suchmaschinensuche (Google, Bing)<\/option><option value=\"Suchmaschinenwerbung\">Suchmaschinenwerbung<\/option><option value=\"Social Media\">Social Media<\/option><option value=\"Weiterempfehlung\">Weiterempfehlung<\/option><option value=\"Printmedien\">Printmedien<\/option><option value=\"Pressebericht\">Pressebericht<\/option><option value=\"Veranstaltung\">Veranstaltung<\/option><option value=\"sonstiges\">sonstiges<\/option><\/select><\/span> <\/label>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"Datenschutzerklaerung\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first last\"><input type=\"checkbox\" name=\"Datenschutzerklaerung[]\" value=\"Ich habe die Datenschutzerkl\u00e4rung gelesen und erkl\u00e4re mich damit einverstanden.\" \/><span class=\"wpcf7-list-item-label\">Ich habe die Datenschutzerkl\u00e4rung gelesen und erkl\u00e4re mich damit einverstanden.<\/span><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Newsletter\"><span class=\"wpcf7-form-control wpcf7-checkbox\"><span class=\"wpcf7-list-item first last\"><input type=\"checkbox\" name=\"Newsletter[]\" value=\"Ich m\u00f6chte Informationen zu kommenden Veranstaltungen und Neuigkeiten in der Branche erhalten\" \/><span class=\"wpcf7-list-item-label\">Ich m\u00f6chte Informationen zu kommenden Veranstaltungen und Neuigkeiten in der Branche erhalten<\/span><\/span><\/span><\/span><br \/>\n<br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Termin vereinbaren\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[vc_column_text][borlabs-cookie id=&#8221;recaptcha&#8221; type=&#8221;content-blocker&#8221;]&#8230;block this&#8230;[\/borlabs-cookie][\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;16px&#8221;]<h3 class=\"grve-element grve-align-left grve-title-no-line grve-h3\" style=\"\"><span>Services<\/span><\/h3>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Thanks to the many years of experience of the weyer gruppe in process engineering and functional safety, as well as the versatile industry knowledge of Dipl.-Ing. Thomas K\u00e4fer, M.Sc. (sworn expert for information processing systems and applications), we can offer you an interdisciplinary team as support in the field of cyber security of production plants for operating areas of plants relevant to incidents.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]\n<ul class=\"arrow-gray\">\n<li>Recording and division of the operating areas \/ facilities into manageable units (<strong>sectioning<\/strong>) for analysis of the necessary measures<\/li>\n<li><strong>IT risk assessment<\/strong> (e.g. according to NA 163 \/ IEC 62443 \/ DIN ISO 27001)<\/li>\n<li>Derivation and <strong>prioritisation<\/strong>of measures<\/li>\n<li>Support with the <strong>implementation<\/strong>of measures<\/li>\n<li><strong>Incorporation into the overall safety concept of the facility:<\/strong> connection to classic process safety or functional safety with the requirements and measures resulting from the IT assessment<\/li>\n<li><strong>Advice to equipment manufacturers<\/strong>on cyber security<\/li>\n<li><strong>Penetration test, or pentest(ing) for short:<\/strong> We undertake a comprehensive security check of all system components and applications of a network (computers, machines, production facilities, etc.) using the methods that an attacker or hacker would use to penetrate a system.<\/li>\n<li><strong>Digital forensics or IT forensics:<\/strong> According to the BSI, IT forensics is &#8220;the strictly methodical analysis of data on data carriers and in computer networks for the [gerichtlichen] clarification of incidents, including the possibilities of strategic preparation, especially from the perspective of the system operator of an IT system&#8221;. Since data and system states cannot be viewed directly within court proceedings, the court usually falls back on the expert opinion of an expert or the report of an expert witness. In this area, we work closely with <a href=\"https:\/\/www.kaeferlive.de\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>Thomas K\u00e4fer<\/u><\/a>.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row bg_type=&#8221;color&#8221; bg_color=&#8221;#e6e6e6&#8243;][vc_column][vc_empty_space height=&#8221;45px&#8221;]<div class=\"grve-element grve-box-icon grve-align-left\" style=\"\"><a href=\"https:\/\/www.weyer-gruppe.com\/anmeldung-kolloquium\/\" target=\"_self\">  <div class=\"grve-icon grve-large grve-simple grve-no-shape grve-color-primary-1 fa fa-youtube-play\"><\/div><\/a>  <div class=\"grve-box-content\"><a href=\"https:\/\/www.weyer-gruppe.com\/anmeldung-kolloquium\/\" target=\"_self\"><h5 class=\"grve-box-title\"><span>Kolloquium 2020 - Cybersecurity<\/span><\/h5><\/a>    <p class=\"\">The topic of the first digital colloquium was &#8220;Cyber Security for Production Facilities&#8221;. The expert speakers deal with the topic from different angles. You will learn from an entrepreneur what it means to be hacked and what the consequences are for his business. A hacker will show you the weak points of the systems and together we will clarify how this can be prevented. In addition, the speakers will explain what damage is covered by cyber security insurance and what the authorities see as necessary. Watch the recording of the lectures here.<\/p>  <\/div><\/div><div class=\"grve-element grve-align-right\"><a class=\"grve-btn grve-btn-medium grve-square grve-bg-primary-1\" href=\"https:\/\/www.weyer-gruppe.com\/anmeldung-kolloquium\/\" target=\"_self\" style=\"\"><span>Watch videos now<\/span><\/a><\/div>[vc_empty_space height=&#8221;16px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;16px&#8221;]<h3 class=\"grve-element grve-align-left grve-title-no-line grve-h3\" style=\"\"><span>Our Team<\/span><\/h3>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243; tablet_sm_width=&#8221;1-2&#8243;]\r\n\t\t<div class=\"grve-team grve-element\" style=\"\">\r\n\t\t\t<figure class=\"grve-image-hover grve-style-1 grve-zoom-in\">\r\n\t\t\t\t<div class=\"grve-team-person grve-media grve-dark-overlay grve-opacity-60\">\r\n\t\t\t\t\t<img decoding=\"async\" width=\"560\" height=\"560\" src=\"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-560x560.png\" class=\"attachment-grve-image-small-square size-grve-image-small-square\" alt=\"\" srcset=\"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-560x560.png 560w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-300x300.png 300w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-1024x1024.png 1024w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-150x150.png 150w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-768x769.png 768w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-1536x1536.png 1536w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-80x80.png 80w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-1120x1120.png 1120w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2024\/09\/c.gunbay-min-1-1918x1920.png 1918w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t<\/div>\r\n\t\t\t\t<figcaption>\r\n\t\t\t\t\t<div class=\"grve-team-description\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"grve-team-name grve-dark grve-h4\">Cihangir G\u00fcnbay<\/h4>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<small class=\"grve-team-identity grve-dark\">horst weyer und partner<\/small>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/figcaption>\r\n\t\t\t<\/figure>\r\n\t\t<\/div>\r\n\r\n\t\t[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]IT and the networking of a wide variety of systems with each other &#8211; the Internet of Things &#8211; is one of the central topics of our time &#8211; not only from a developer&#8217;s point of view, but also with regard to IT security or the cyber security of production facilities. However, in addition to [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":23837,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-23052","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber security of production facilities &#8211; weyer gruppe<\/title>\n<meta name=\"description\" content=\"Cyber security of production facilities has recently also been given more attention by the legislator and new regulations are being implemented.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security of production facilities\" \/>\n<meta property=\"og:description\" content=\"Cyber security of production facilities has recently also been given more attention by the legislator and new regulations are being implemented.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/\" \/>\n<meta property=\"og:site_name\" content=\"weyer gruppe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weyergruppe\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T10:31:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/plant-operators-and-investors\\\/cyber-security-in-plant-security\\\/\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/plant-operators-and-investors\\\/cyber-security-in-plant-security\\\/\",\"name\":\"Cyber security of production facilities &#8211; weyer gruppe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#website\"},\"datePublished\":\"2020-02-04T09:47:52+00:00\",\"dateModified\":\"2026-04-10T10:31:49+00:00\",\"description\":\"Cyber security of production facilities has recently also been given more attention by the legislator and new regulations are being implemented.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/plant-operators-and-investors\\\/cyber-security-in-plant-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/plant-operators-and-investors\\\/cyber-security-in-plant-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/plant-operators-and-investors\\\/cyber-security-in-plant-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"HOME\",\"item\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Plant operators and investors\",\"item\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/plant-operators-and-investors\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber security of production facilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/\",\"name\":\"weyer gruppe\",\"description\":\"komplett. durchdacht.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#organization\",\"name\":\"weyer gruppe\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/logo-weyer-gruppe-de.png\",\"contentUrl\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/logo-weyer-gruppe-de.png\",\"width\":532,\"height\":513,\"caption\":\"weyer gruppe\"},\"image\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/weyergruppe\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/weyer-gruppe\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCmZItECuW56Ih_p501_Bq8A\"],\"description\":\"Die weyer gruppe ist seit 1976 Ihr Partner f\u00fcr verfahrenstechnische Anlagenplanung und Anlagensicherheit. Mit einem erfahrenen Team von \u00fcber 190 Mitarbeitern in Deutschland, \u00d6sterreich, Polen und der Schweiz realisieren wir j\u00e4hrlich \u00fcber 1.000 Kundenprojekte. Unsere Expertise erstreckt sich \u00fcber verschiedene Branchen wie Chemie, Pharma, Mineral\u00f6l sowie Ver- und Entsorgung. Vertrauen Sie auf die weyer Gruppe f\u00fcr ma\u00dfgeschneiderte Engineering- und Consulting-L\u00f6sungen, die Ihre Anforderungen in puncto Sicherheit und Effizienz erf\u00fcllen.\",\"email\":\"info@weyer-gruppe.com\",\"telephone\":\"+49 (0) 24 21 \u2013 69 09 1 \u2013 0\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber security of production facilities &#8211; weyer gruppe","description":"Cyber security of production facilities has recently also been given more attention by the legislator and new regulations are being implemented.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber security of production facilities","og_description":"Cyber security of production facilities has recently also been given more attention by the legislator and new regulations are being implemented.","og_url":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/","og_site_name":"weyer gruppe","article_publisher":"https:\/\/www.facebook.com\/weyergruppe","article_modified_time":"2026-04-10T10:31:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/","url":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/","name":"Cyber security of production facilities &#8211; weyer gruppe","isPartOf":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#website"},"datePublished":"2020-02-04T09:47:52+00:00","dateModified":"2026-04-10T10:31:49+00:00","description":"Cyber security of production facilities has recently also been given more attention by the legislator and new regulations are being implemented.","breadcrumb":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/cyber-security-in-plant-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"HOME","item":"https:\/\/www.weyer-gruppe.com\/en\/"},{"@type":"ListItem","position":2,"name":"Plant operators and investors","item":"https:\/\/www.weyer-gruppe.com\/en\/plant-operators-and-investors\/"},{"@type":"ListItem","position":3,"name":"Cyber security of production facilities"}]},{"@type":"WebSite","@id":"https:\/\/www.weyer-gruppe.com\/en\/#website","url":"https:\/\/www.weyer-gruppe.com\/en\/","name":"weyer gruppe","description":"komplett. durchdacht.","publisher":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.weyer-gruppe.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.weyer-gruppe.com\/en\/#organization","name":"weyer gruppe","url":"https:\/\/www.weyer-gruppe.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weyer-gruppe.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2019\/07\/logo-weyer-gruppe-de.png","contentUrl":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2019\/07\/logo-weyer-gruppe-de.png","width":532,"height":513,"caption":"weyer gruppe"},"image":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weyergruppe","https:\/\/de.linkedin.com\/company\/weyer-gruppe","https:\/\/www.youtube.com\/channel\/UCmZItECuW56Ih_p501_Bq8A"],"description":"Die weyer gruppe ist seit 1976 Ihr Partner f\u00fcr verfahrenstechnische Anlagenplanung und Anlagensicherheit. Mit einem erfahrenen Team von \u00fcber 190 Mitarbeitern in Deutschland, \u00d6sterreich, Polen und der Schweiz realisieren wir j\u00e4hrlich \u00fcber 1.000 Kundenprojekte. Unsere Expertise erstreckt sich \u00fcber verschiedene Branchen wie Chemie, Pharma, Mineral\u00f6l sowie Ver- und Entsorgung. Vertrauen Sie auf die weyer Gruppe f\u00fcr ma\u00dfgeschneiderte Engineering- und Consulting-L\u00f6sungen, die Ihre Anforderungen in puncto Sicherheit und Effizienz erf\u00fcllen.","email":"info@weyer-gruppe.com","telephone":"+49 (0) 24 21 \u2013 69 09 1 \u2013 0","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}}]}},"_links":{"self":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/pages\/23052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/comments?post=23052"}],"version-history":[{"count":5,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/pages\/23052\/revisions"}],"predecessor-version":[{"id":238246,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/pages\/23052\/revisions\/238246"}],"up":[{"embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/pages\/23837"}],"wp:attachment":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/media?parent=23052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}