Why Secure Industrial Communication Depends on Deployment as well as Protocols

The Industrial Security Harmonization Group (ISHG) will present these insights during its session at Hannover Messe 2026, offering guidance to industry stakeholders on how to effectively secure industrial communication systems in practice. Registration to take part in the event, live at the HANNOVER MESSE or online is open.

  • April 14, 2026
  • 663 views
  • Why Secure Industrial Communication Depends on Deployment as well as Protocols
    Why Secure Industrial Communication Depends on Deployment as well as Protocols

The Industrial Security Harmonization Group (ISHG) has released a joint industry perspective highlighting a critical truth in industrial cybersecurity: secure communication is not determined by protocols alone, but by how they are deployed and managed in real-world environments.

The ISHG—comprising leading industry organizations including the FieldComm Group, ODVA, OPC Foundation, and PROFIBUS & PROFINET International—collaborates regularly to align security concepts across Ethernet and non-Ethernet communication protocol technologies. Their shared mission is to reduce complexity for end users and promote consistent, effective cybersecurity practices in industrial automation systems.

Industrial communication protocols serve as the backbone of modern automation, enabling seamless connectivity between devices, systems, and applications across both process and factory environments. However, many widely used protocols were originally developed without cybersecurity as a primary design consideration.

The ISHG’s joint work challenges the simplistic binary classification of protocols as “secure” or “insecure.” Instead, it emphasizes a more practical and realistic approach:

  •  Security is context-dependent — It relies on how protocols are configured, where they are deployed, and the surrounding operational environment. 
  • Built-in security features are not sufficient alone — Even advanced protocols require correct implementation and maintenance. 
  • Compensating controls are essential — Network architecture, segmentation (zones and conduits), monitoring, and physical safeguards play a critical role, especially for legacy and non-Ethernet systems. 
  • This deployment-focused perspective aligns closely with emerging regulatory expectations, including those outlined in the EU Cyber Resilience Act (CRA) for hardware and software products and NIS2 for entities and organizations for operations.


The ISHG will present these insights during its session at Hannover Messe 2026, offering guidance to industry stakeholders on how to effectively secure industrial communication systems in practice.

Please note: This is a hybrid event, and online participation is also available. Find details here: https://www.profibus.com/trainingevents/hmi26-conference-ishg-security 

Disclaimer: Content published by TIM Global Media, including text, images, and videos, is either created in-house or provided by Suppliers/Manufacturers with their approval. Suppliers/Manufactures warrant that their materials do not infringe third-party rights and agree to indemnify and hold TIM Global Media harmless from any related claims.

Share with: