Secure by Demand: Your Guide to Dodging Cyber Catastrophes in Operational Tech!
CISA’s new guidance, Secure by Demand, helps OT owners dodge cyber calamities by choosing products from manufacturers who prioritize security. Because who wants their infrastructure to be the next cyber horror story? Choose wisely, and remember: if it ain’t secure by design, it ain’t worth your dime!

Hot Take:
Just when you thought your operational technology (OT) was safe, CISA slides in with a guide that’s basically the cybersecurity equivalent of “Stop! Hammer time.” It seems that OT manufacturers might need to consider a new business model: Secure by Design, or as I like to call it, “Secure by Divine Intervention.” Because honestly, divine intervention might be the only thing that saves us from these cyber baddies targeting our critical infrastructure.
Key Points:
- CISA has released new guidance for OT owners and operators as part of their Secure by Demand series.
- This guidance emphasizes the importance of selecting products from manufacturers who prioritize security.
- OT systems are more vulnerable because they are not always designed with security in mind.
- Threat actors often target specific OT products rather than organizations.
- The guidance includes questions to ask during procurement to drive secure technology ecosystems.