• Home
  • About
    • Mission and Approach
    • Why Join the CISC?
    • Membership Fees
    • Board of Directors
    • Organizational Tools
  • Initiatives
    • Artificial Intelligence
    • Product Security
    • Workforce Development
  • Events
    • Virtual Monthly Meetings
    • In Person Events
    • Volunteer Opportunities
  • Resources
    • Press Releases
  • More
    • Home
    • About
      • Mission and Approach
      • Why Join the CISC?
      • Membership Fees
      • Board of Directors
      • Organizational Tools
    • Initiatives
      • Artificial Intelligence
      • Product Security
      • Workforce Development
    • Events
      • Virtual Monthly Meetings
      • In Person Events
      • Volunteer Opportunities
    • Resources
      • Press Releases
  • Home
  • About
    • Mission and Approach
    • Why Join the CISC?
    • Membership Fees
    • Board of Directors
    • Organizational Tools
  • Initiatives
    • Artificial Intelligence
    • Product Security
    • Workforce Development
  • Events
    • Virtual Monthly Meetings
    • In Person Events
    • Volunteer Opportunities
  • Resources
    • Press Releases

Product Security Working Group

Explore and socialize tools to mitigate potential risks introduced by vendors and products

CISC members are working collaboratively to maintain the integrity and security of the entire supply chain.  In interconnected supply chains, the cyber security of one product can impact the security of others. By understanding bills of materials, manufacturing origins, and component information, infrastructure owners can procure with confidence. 

2025 Focuses

Software Security

Software Security

Software Security

Provide best practices to review software applications and systems to protect against threats, vulnerabilities, and attacks that could compromise their integrity, availability, and confidentiality. 


It involves implementing measures throughout the software development lifecycle (SDLC) to ensure that software behaves as intended and is resistant to malicious activities.


 This includes the operationalization of Software Bills of Materials. 

Hardware Security

Software Security

Software Security

 Provide best practices to review  the hardware components of computer systems from threats and vulnerabilities that can lead to unauthorized access, tampering, or malicious use. 


We'll focus on ensuring that hardware systems remain functional, reliable, and protected against attacks that could compromise their integrity, confidentiality, or availability. 


This includes the identification of components and their country of origin as well as the operationalization of Hardware Bills of Materials.

Critical Minerals

Software Security

Critical Minerals

Minerals are vital to the energy industry because they are essential for producing the technologies and systems needed for energy generation, storage, and transmission. 


As the global economy transitions towards cleaner and more sustainable energy solutions, the demand for certain minerals has surged. These minerals are integral to many renewable energy technologies, energy storage systems, and other infrastructure that supports the energy transition. 


This includes understand the specific minerals required for devices and ensuring their production levels stay constant. 

Copyright © 2025 Critical Infrastructure Security Consortium  - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept