Navigating NIS2 - Accelerating IT/OT Security in Manufacturing with Splunk, Claroty and AWS

Security Ewald Munz , Sahil Gupta

Authors:

Manufacturers in 2026 are facing a rapidly evolving landscape where cybersecurity, regulation, and digital transformation intersect. The implementation of NIS2, rising cyber threats, and the growing convergence of IT and OT systems are reshaping how factories operate and protect their assets. Understanding these key challenges is essential for manufacturers aiming to stay compliant, resilient, and competitive in an increasingly connected world.

Three Key Manufacturing Challenges 2026: NIS2 Implementation, Cyber Risks, Growing IT/OT Convergence

Challenge No. 1: NIS2 Implementation

The NIS2 Directive is the EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU.

The new directive applies to many manufacturing organizations, not only sectors of high criticality. Key points include the following:

However, many manufacturing companies have delayed tackling this regulation and struggle, also due to the inconsist implementation status by countries. As of now, 21 out of 27 EU Member States have transposed the NIS2 Directive into national law.

NIS2 Implementation Status by Country

Sources: OpenKritis, Ecs-Org

Challenge No. 2: Cyber Risks

Manufacturing is the most attacked industry – five years in a row. The manufacturing sector represented 28% of all cyberattacks in 2025 — the highest percentage of all industries, according to IBM X-Force’s 2026 report.

Exploitation of public-facing applications was the most common way that attackers breached manufacturing systems, accounting for 32% of all observed cases. 16% used valid accounts, and 11% used external remote services, reflecting attackers’ reliance on “exploiting misconfigured or insufficiently secured access points.”

Like the threat landscape itself, the CISO’s role is getting bigger. According to the Splunk CISO Report 2026 - From Risk to Resilience in the AI Era the CISO’s biggest obstacles include sophistication of threat actor capabilities and pace of technology and AI advancements. 78% are concerned about their own liability for security incidents.

Highlighting increasing cyber risks, the World Economic Forum - Global Cybersecurity Outlook 2026 explores how accelerating AI adoption, geopolitical fragmentation and widening cyber inequity are reshaping the global risk landscape. As attacks grow faster, more complex and more unevenly distributed, organizations and governments face rising pressure to adapt amid persistent sovereignty challenges and widening capability gaps.

Source: WEF, Global Cybersecurity Outlook 2026

Challenge No. 3: Growing IT/OT Convergence

Industrial organizations are in the midst of an unprecedented transformation. Smart factories, connected energy grids, water treatment facilities, and logistics networks now depend on a deeply interconnected fabric of Operational Technology (OT), Industrial IoT (IIoT), and enterprise IT infrastructure. This convergence has unlocked remarkable gains in efficiency, automation, and data-driven decision-making.

But there's a flip side.

Every connected PLC, SCADA system, DCS controller, and smart sensor represents a potential entry point for cyber threats. The attack surface has expanded exponentially, and traditional IT-centric security tools were simply never designed to understand the unique protocols, behaviors, and safety requirements of OT environments. The result? Dangerous blind spots at the very intersection where IT meets OT—exactly where adversaries are now focusing their efforts.

The Need for a Risk Reduction Journey

Taking these challenges into account, many manufacturers are worried NIS2 compliance will intervene with their operations by introducing requirements to reduce risk. However, the business cannot pause for compliance – it requires mid-air transformation. A dedicated five step risk reduction journey can leverage modernization as the catalyst to comply with NIS2.

Why a Tri-Party Approach? Why Now?

No single vendor can solve this problem alone. Effective IT/OT cybersecurity and NIS2 compliance demands a combination of deep industrial asset visibility, advanced security analytics, orchestration & automation, and scalable, resilient cloud infrastructure. That's why the collaboration between Splunk, Claroty, and AWS is so powerful—and so timely.

Each partner brings a distinct, best-in-class capability to the table. Together, they form an integrated ecosystem on the abovementioned risk reduction journey.

Claroty — The Eyes and Ears of the Industrial Environment

Claroty xDome is a modular, SaaS-powered industrial cybersecurity platform that provides the foundational OT Security layer required before manufacturers move data from the shopfloor to the cloud.

Within modernization frameworks such as Manufacturing Applications & Technology Modernization (MATM) highlighted below, this layer is non-negotiable because secure visibility, segmentation, and monitoring must exist before enabling cloud connectivity or advanced analytics. xDome focuses on delivering continuous asset visibility, threat detection, and risk reduction across industrial networks, helping organizations meet strict regulatory requirements such as the NIS2 Directive while enabling safe digital transformation.

Source: Claroty 

Visibility & Insights forms the foundation, providing comprehensive asset and network discovery enriched with operational context. Building on this base, three core capabilities—Threat Detection, Exposure Management, and Network Protection—work together to systematically reduce operational risk. At the top, Reporting transforms complex technical security data into clear, business-level risk insights for leadership, enabling auditable compliance and informed decision-making. Collectively, these capabilities strengthen regulatory readiness, particularly in meeting NIS2 requirements.

Overall, Claroty xDome serves as the security backbone for industrial environments—protecting critical operations, reducing risk exposure, and ensuring that data moving from the edge to the cloud does so securely, reliably, and in a fully compliant, auditable manner.

AWS — The Cloud-Based Modernization Engine to Drive Manufacturing Applications & Technology Modernization (MATM)

The MATM framework is a layered approach to modernizing manufacturing environments, starting with secure OT foundations, followed by application modernization, data unification, and finally AI-driven business outcomes.

It emphasizes that modernization must occur in sequence, beginning with foundational security and moving upward because legacy, siloed systems cannot support scalable analytics, AI workloads, or regulatory requirements such as NIS2. Ultimately, MATM enables manufacturers to transform isolated OT and IT environments into integrated, cloud-enabled, data-driven operations.

Source: AWS Manufacturing

AWS offers comprehensive MATM solutions designed to transition legacy industrial systems into smart, cloud-native environments. AWS supports application modernization through migration strategies like re-host, re-platform, and re-factor, it enables the Industrial Data Fabric with scalable storage, analytics, and AI services, and it delivers the compute and automation required to drive predictive maintenance, quality analytics, and autonomous operations. In this architecture, AWS acts as the scalable cloud backbone that allows manufacturing data to move securely from the edge to the cloud once prerequisite OT security foundations are in place.

Specifically, how do AWS, Claroty, and Splunk work together to enable this entire MATM stack?

Together, they enable the entire MATM stack from secure foundation through to business outcomes.

Splunk — The Agentic SOC for Unified Resilience

Splunk has been named a Leader in the Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM) for 11 consecutive years (2015–2025), confirming its sustained leadership in threat detection, investigation, and incident response.

Powering the agentic SOC for unified resilience, Splunk unifies security data, analytics, tools, and AI to automate routine tasks, orchestrate workflows, surface complex insights, and proactively mitigate risk.

Splunk redefines security operations by integrating an open data fabric, powerful analytics, cohesive tools, and human-in-the-loop AI into a unified platform. With Splunk, you can:

As part of this unified resilience, Splunk helps manufacturing organizations build a powerful, next-generation security concept for their factories with the help of a dedicated OT Security Add On. The Splunk Add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments. It reaches across both carpeted (IT) and concrete (OT) environments to better apply Splunk Enterprise Security to improve threat detection, incident investigation and response.

Existing specialized OT Security vendors such as Claroty are ingested as data sources to allow for holistic visibility across IT and OT environments. Claroty’s OT Security solution xDome works hand in hand with Splunk’s OT Security solution via the integration app  on Splunkbase.

Meet the Team at Hannover Messe 2026

Meet the Claroty, AWS and Splunk team at Hannover Messe to learn more about the risk reduction journey and how we can help with your specific setting.

Claroty booth on the AWS booth -Hall 15 / Stand D76 

Fireside Chat | April 20 | 14.30 - 14.45 | AWS Stage

Forecasting Future Fortifications:
Industrial Insights on OT Resilience and NIS2 in 2026

The session moves beyond the compliance checkbox, showing how industrial organizations use regulatory mandates as a catalyst to reduce O&M costs, protect brand equity, and turn  "secure-by-design" into a measurable competitive advantage.

Speakers:

Read On

Related Articles

Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR
Security
6 Minute Read

Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR

Box is the market leader for Cloud Content Management. Read on for more in this Q&A with Box's Kyle Bailey, Manager, Threat Operations.
Observability Meets Security: Build a Baseline To Climb the PEAK
Security
8 Minute Read

Observability Meets Security: Build a Baseline To Climb the PEAK

Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.
Assigning Role Based Permissions in Splunk Enterprise Security
Security
2 Minute Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it