• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • SCB YouTube
  • Login
  • Subscribe
  • Logout
  • My Profile
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management (Big Data/IoT/Blockchain)
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Supply Chains in Crisis
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • THINK TANK
  • WEBINARS
    • On-Demand Webinars
    • Upcoming Webinars
    • Webinar Library
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Blogs » Think Tank » The Risks and Rewards of Automating Agriculture

Think Tank
Think Tank RSS FeedRSS

The Risks and Rewards of Automating Agriculture

Beef Cattle
Photo: Bloomberg
April 25, 2022
Audra Simons

In recent years, farmers and other food suppliers have recognized the need for technology modernization. But they’ve been slower to recognize the importance of cybersecurity.

As agriculture becomes increasingly digitized and operational in the cloud, its exposure to threat actors increases. Given that the U.S. has only minimal cybersecurity laws in place for the industry, not much is officially required to be done to adapt to the new security risks that come with the new technology. Last year for example, JBS, the world’s largest beef supplier, suffered a ransomware attack that halted one-fifth of its American production. In the end, JBS paid the hacking group REvil a whopping $11 million to recover files that had been compromised.

JBS supplies roughly a quarter of all beef consumed in the U.S., putting it and other major suppliers squarely in the category of critical infrastructure. Although the agricultural industry isn’t held to the same standards as gas pipelines or the electricity grid, this attack illustrated how food systems are just as susceptible to cyberattacks as what we traditionally consider critical infrastructure. Hackers aren’t just exploiting big names, either. Smaller players, such as a Wisconsin milk plant and an Iowa grain cooperative, have been hit by ransomware attacks too.

There’s tremendous upside to technology adoption in the world of food and agriculture, including the ability to get more done with far less manual labor. From smart tractors to robotic milking to fruit-picking drones, farming is being fundamentally transformed. But most agricultural automation is managed through consumer smart devices like mobile phones or iPads, many of which have been built with ease-of-use and efficiency in mind — not security.

The Cybersecurity Basics

Automating processes without increasing cybersecurity leaves the door open for bad actors to wreak havoc. And the cost of cyber vulnerabilities goes beyond a steep ransom payment. Attacks can lead to everything from higher grocery prices to contaminated foods. While the U.K. has put out some cyber recommendations for farmers, cybersecurity advice and mandates are largely lacking for food and agriculture companies in the U.S.

A recent hacking conference highlighted an abundance of vulnerabilities in John Deere and Case New Holland’s systems. To address these risks and better their security postures, farmers and agriculture companies must establish and maintain good cyber hygiene. This includes keeping devices up to date, replacing old machines, using strong passwords encryption, and two-factor authentication. Additionally, it’s crucial to have an offline backup plan prepared; data should be backed up regularly and stored off devices. This degree of separation will make a huge difference in the event of a ransomware attack, during which access to the network may be completely restricted. Any data, from invoices to inventory, needs to be accessible offline as well.

While these are seemingly simple recommendations, the agriculture industry still lacks federal oversight on its cybersecurity practices, despite years of warnings about the potential consequences. In fact, there’s far more guidance on animal welfare than cybersecurity vulnerabilities.

The Role of Zero Trust

While automation may lead to new vulnerabilities for the food supply chain, the good news is that automation can also be deployed to counteract them. These days, it’s not a matter of if a breach will happen, but rather when. That’s why zero-trust security needs to become the new normal. In simplest terms, zero trust is a security paradigm that moves beyond simply gatekeeping users. In addition to strict identity verification and explicit permission to access systems and files, automated monitoring can detect dangerous activity on the network. By quickly flagging and responding to unusual activity, modern security tools can stop a single compromised account from turning into a wholly disrupted supply chain.

While zero-trust principles have been mandated for government agencies by the current U.S. Administration, this approach is just as urgent in the world of agriculture. As awareness about the threat of cyberattacks targeting critical infrastructure continues to grow, farmers and agriculture companies need to be prepared to face these challenges. While automation is a great tool for maximizing efficiency, we must also ensure that security is at the forefront of all modernization initiatives to protect our nation’s agricultural supply chain.

Audra Simons is senior director of global products, global governments and critical infrastructure with Forcepoint.

Supply Chain Visibility Regulation & Compliance Supply Chain Security & Risk Mgmt Food & Beverage

RELATED CONTENT

RELATED VIDEOS

Subscribe to our Daily Newsletter!

Timely, incisive articles delivered directly to your inbox.

Popular Stories

  • A HAND TURNS A LARGE, LIGHTED DIAL WITH THE WORD RISK ON IT iStock-NicoElNino-1364371014.jpg

    Measuring KPIs and KRIs for Comprehensive Supplier Performance Management

    Technology
  • A COMPLEX SERIES OF ROADWAYS AND RAMPS, SEEN FROM HIGH ABOVE, IS PARTLY SHROUDED BY CLOUD

    Supply Chain Visibility Isn’t Just a Catchphrase; It’s an Imperative

    Logistics
  • A WOMAN IN HER LIVING ROOM GESTURES IN DISMAY ON THE PHONE OVER AN OPEN SHIPPING BOX

    Retailers – Quit Bellyaching and Differentiate Yourself on Returns

    Reverse Logistics
  • A Mid Adult Male Truck Driver Doing Exercises Before Road Trip by the side of a truck

    Podcast | Yoga for Truck Drivers? It’s a Mother Trucker!

    LTL/Truckload Services
  • A STORE WINDOW DISPLAYS AN ARRAY OF DESIGNER PURSES

    Can AI Turn the Tide Against Product Counterfeiters?

    Sourcing/Procurement/SRM

Digital Edition

Scb q1 2023 cover

2023 Supply Chain Management Resource Guide: Packing for a Difficult Year

VIEW THE LATEST ISSUE

Case Studies

  • New Revenue for Cloud-Based TMS that Embeds Orderful’s Modern EDI Platform

  • Convenience Store Client Maximizes Profit and Improves Customer Service

  • A Digitally Native Footwear Brand Finds Rapid Fulfillment

  • Expanding Apparel Brand Scales Seamlessly with E-Commerce Technology

  • How a Global LSP Scaled its Security Program and Won More Business

Visit Our Sponsors

Orderful Yang Ming Alithya
Barcoding Blue Yonder BNSF Logistics
CoEnterprise Data Capture Deposco
E2open GAINSystems Generix
Geodis GEP GreyOrange
Here Honeywell Intelligrated IFM
Infor Inmar Keelvar
Kinaxis Korber Lean Solutions Group 2H
Liberty SBF Locus Robotics Logility
LogistiVIEW Lucas Systems MCA Connect
MPO Nvidia Old Dominion
OpenText ORTEC Overhaul
Parsyl PMMI QIMA
Redwood Logistics Ryder E-commerce by Whiplash Saddle Creek Logistics
Schneider Dedicated Setlog Holding AG Ship4WD
Shipwell Tecsys TGW Systems
Thomson Reuters Tive Trailer Bridge
Vecna Robotics Verity
Verusen
  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • On-Demand Webinars
    • Upcoming Webinars
  • Digital Offerings
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • Newsletters
  • Resources
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
    • 100 Great Partners Form
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us
    • Data Sharing Opt-Out

All content copyright ©2023 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing