Secure by Demand: Your Guide to Dodging Cyber Catastrophes in Operational Tech!

CISA’s new guidance, Secure by Demand, helps OT owners dodge cyber calamities by choosing products from manufacturers who prioritize security. Because who wants their infrastructure to be the next cyber horror story? Choose wisely, and remember: if it ain’t secure by design, it ain’t worth your dime!

Pro Dashboard

Hot Take:

Just when you thought your operational technology (OT) was safe, CISA slides in with a guide that’s basically the cybersecurity equivalent of “Stop! Hammer time.” It seems that OT manufacturers might need to consider a new business model: Secure by Design, or as I like to call it, “Secure by Divine Intervention.” Because honestly, divine intervention might be the only thing that saves us from these cyber baddies targeting our critical infrastructure.

Key Points:

  • CISA has released new guidance for OT owners and operators as part of their Secure by Demand series.
  • This guidance emphasizes the importance of selecting products from manufacturers who prioritize security.
  • OT systems are more vulnerable because they are not always designed with security in mind.
  • Threat actors often target specific OT products rather than organizations.
  • The guidance includes questions to ask during procurement to drive secure technology ecosystems.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?