Brian Jones, Steven Martano, Ebenezer Arumai, Ellen Boehm and Albert Rooyakkers discuss using purchasing power to demand contractual security requirements and translating security initiatives into business language like uptime and revenue.
OT systems were historically secure by design through isolation, but 99% of modern attacks target the Windows network layer where Dell, Microsoft and IT vendors now dominate component supply. Traditional OEMs profit from monitoring services that address vulnerabilities they created, while manufacturers lack contractual leverage to demand embedded security requirements. Connected devices installed at customer sites remain manufacturer responsibility despite zero ownership control.
In this insightful discussion, the panel of experts discuss:
- Why manufacturers must use purchasing power to demand contractual security requirements rather than paying OEMs for services addressing vendor-created vulnerabilities;
- Translation methods that present security initiatives in business language - uptime, reliability and revenue impact rather than CVE scores;
- Competitive advantages when security compliance enables marketing differentiation and preferred vendor status in regulated markets.
Here is the course outline:
Shifting Supplier Mindsets: Driving Security-by-Design in OEMs and ICS Manufacturers |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
