--===============6989093684433911276==
Content-Type: multipart/alternative; boundary="===============1157559565375597535=="
MIME-Version: 1.0
--===============1157559565375597535==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Cybersecurity and Infrastructure Security Agency (CISA)
You are subscribed to Cybersecurity Advisories for Cybersecurity and Infras= tructure Security Agency. This information has recently been updated and is=
now available.
CISA Helps Johnny Secure Operational Technology: New Guidance Addresses Cyb=
er Risks from Legacy Protocols [
https://www.cisa.gov/resources-tools/resou= rces/barriers-secure-ot-communication-why-johnny-cant-authenticate ] 02/10/= 2026 02:30 PM EST=20
Today, CISA released the guidance Barriers to Secure OT Communication: Why = Johnny Can=E2=80=99t Authenticate [
https://www.cisa.gov/resources-tools/re= sources/barriers-secure-ot-communication-why-johnny-cant-authenticate ]. Th=
is guidance highlights the known issues with insecure-by-design legacy indu= strial protocols and seeks to understand why the technology to secure these=
protocols is not widely adopted. CISA developed this guidance in partnersh=
ip with operational technology (OT) equipment manufacturers and standard de= velopment organizations, by interviewing OT asset owners and operators to u= nderstand:
* What motivates owners and operators to secure communication, and=20
* What barriers prevent successful adoption from design through deploymen=
t and operations.=20
Legacy OT protocols lack strong protections against data alteration, device=
impersonation, and unauthorized access, making critical infrastructure vul= nerable to cyber threats. Securing these protocols requires solutions that = are practical for current operators as well as cyber experts. Based on the = research conducted, CISA provides recommendations for how owners and operat= ors can avoid the negative experiences of their peers, as well as recommend= ations to OT manufacturers to drive sustainable, more usable capabilities.
*For OT Owners and Operators:*
* Learn why message signing is the foundation for secure OT communication=
and when encryption is essential.=20
* Discover practical strategies for phased adoption of secure protocols t=
o minimize operational risk.=20
* Identify which OT communications should be prioritized for enhanced sec= urity and resilience.=20
* Explore ways to simplify secure workflows and key management for easier=
implementation.=20
*For Manufacturers:*
* Gain insights from customer research to reduce customer friction and de= liver more usable, secure products.=20
* Explore actionable recommendations to address cost and complexity barri= ers to secure communication.=20
* Learn how usability metrics like deployment time and ease of integratio=
n can differentiate your solutions and accelerate adoption.=20
CISA encourages critical infrastructure organizations and OT manufacturers =
to review and implement the recommendations in this guidance. For further d= etails, read the full guidance here [
https://www.cisa.gov/resources-tools/= resources/barriers-secure-ot-communication-why-johnny-cant-authenticate ].
Please share your thoughts with us through this this anonymous survey [ htt= ps://cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?Source=3DGov= Delivery
https://www.cisa.gov/resources-tools/resources/barriers-secure-ot-c= ommunication-why-johnny-cant-authenticate ]. We appreciate your feedback!
This product is provided subject to this=C2=A0Notification [
https://www.ci= sa.gov/notification ]=C2=A0and this=C2=A0Privacy & Use [
https://www.cisa.g= ov/privacy-policy ]=C2=A0policy.
body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight=
: normal; font-style: normal; color: #333333; }=20
Having trouble viewing this message?=C2=A0View it as a webpage [
https://co= ntent.govdelivery.com/accounts/USDHSCISA/bulletins/40907ff ].=C2=A0 [ https= ://content.govdelivery.com/accounts/USDHS/bulletins/292141e ]
You are subscribed to updates from the Cybersecurity and Infrastructure Sec= urity Agency [
https://www.cisa.gov ] (CISA)
Manage Subscriptions [
https://public.govdelivery.com/accounts/USDHSCISA/su= bscriber/edit?preferences=3Dtrue#tab1 ]=C2=A0=C2=A0|=C2=A0=C2=A0Privacy Pol= icy [
https://www.cisa.gov/privacy-policy ]=C2=A0=C2=A0|=C2=A0 Help [ https= ://subscriberhelp.granicus.com/s/article/Subscriber-Help-Center ] [ https:/= /insights.govdelivery.com/Communications/Subscriber_Help_Center ]
Connect with CISA:=20
Facebook [
https://www.facebook.com/CISA ]=C2=A0 |=C2=A0 Twitter [
https://= twitter.com/CISAgov ]=C2=A0 |=C2=A0 Instagram [
https://Instagram.com/cisag=
ov ]=C2=A0 |=C2=A0 LinkedIn [
https://www.linkedin.com/company/cybersecurit= y-and-infrastructure-security-agency ]=C2=A0 |=C2=A0=C2=A0 YouTube [ https:= //www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A ]
________________________________________________________________________
This email was sent to
cisa@toolazy.synchro.net using GovDelivery Communica= tions Cloud, on behalf of: Cybersecurity and Infrastructure Security Agency=
=C2=B7 707 17th St, Suite 4000 =C2=B7 Denver, CO 80202 GovDelivery logo [ =
https://subscriberhelp.granicus.com/ ]=20
body .abe-column-block { min-height: 5px; } table.gd_combo_table img {margi= n-left:10px; margin-right:10px;} table.gd_combo_table div.govd_image_displa=
y img, table.gd_combo_table td.gd_combo_image_cell img {margin-left:0px; ma= rgin-right:0px;}
--===============1157559565375597535==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns=3D"
http://www.w3.org/1999/xhtml" xml:lang=3D"en" lang=3D"en"> <head>
<title> CISA Helps Johnny Secure Operational Technology: New Guidance Ad= dresses Cyber Risks from Legacy Protocols
</title>
</head>
<body style=3D"">
<table width=3D"700" border=3D"0" cellspacing=3D"0" cellpadding=3D"0"=
align=3D"center">
<tr>
<td>
<!--[if (gte mso 9)|(IE)]>
<table style=3D"display:none"><tr><td><a name=3D"gd_top" id=3D"gd_top"></= a></td></tr></table>
<![endif]-->
<a name=3D"gd_top" id=3D"gd_top"></a>
=20
<p><img src=3D"
https://content.govdelivery.com/attachments/fancy_images/U= SDHSCISA/2020/06/3486054/05152023-gov-delivery-banner-copy_original.png" al= t=3D"Cybersecurity and Infrastructure Security Agency (CISA)" title=3D"" wi= dth=3D"600" height=3D"100"></p>
<p>You are subscribed to Cybersecurity Advisories for Cybersecurity and I= nfrastructure Security Agency. This information has recently been updated a=
nd is now available.</p>
<div class=3D"rss_item" style=3D"margin-bottom: 2em;">
<div class=3D"rss_title" style=3D"font-weight: bold; font-size: 120%; margi=
n: 0 0 0.3em; padding: 0;"><a href=3D"
https://www.cisa.gov/resources-tools/= resources/barriers-secure-ot-communication-why-johnny-cant-authenticate" ta= rget=3D"_blank" title=3D"CISA Helps Johnny Secure Operational Technology: N=
ew Guidance Addresses Cyber Risks from Legacy Protocols" rel=3D"noopener">C= ISA Helps Johnny Secure Operational Technology: New Guidance Addresses Cybe=
r Risks from Legacy Protocols</a></div>
<div class=3D"rss_pub_date" style=3D"font-size: 90%; font-style: italic; co= lor: #666666; margin: 0 0 0.3em; padding: 0;">02/10/2026 02:30 PM EST</div> <div class=3D"l-page-section l-page-section--rich-text csaf-imported">
<div class=3D"l-constrain">
<div class=3D"l-page-section__content">
<p>Today, CISA released the guidance <a href=3D"
https://www.cisa.gov/resour= ces-tools/resources/barriers-secure-ot-communication-why-johnny-cant-authen= ticate" target=3D"_blank" title=3D"Barriers to Secure OT Communication: Why=
Johnny Can=E2=80=99t Authenticate" rel=3D"noopener">Barriers to Secure OT = Communication: Why Johnny Can=E2=80=99t Authenticate</a>. This guidance hig= hlights the known issues with insecure-by-design legacy industrial protocol=
s and seeks to understand why the technology to secure these protocols is n=
ot widely adopted. CISA developed this guidance in partnership with operati= onal technology (OT) equipment manufacturers and standard development organ= izations, by interviewing OT asset owners and operators to understand:</p>
<li>What motivates owners and operators to secure communication, and</li> <li>What barriers prevent successful adoption from design through deploymen=
t and operations.</li>
</ol>
<p>Legacy OT protocols lack strong protections against data alteration, dev= ice impersonation, and unauthorized access, making critical infrastructure = vulnerable to cyber threats. Securing these protocols requires solutions th=
at are practical for current operators as well as cyber experts. Based on t=
he research conducted, CISA provides recommendations for how owners and ope= rators can avoid the negative experiences of their peers, as well as recomm= endations to OT manufacturers to drive sustainable, more usable capabilitie= s.</p>
<p><strong>For OT Owners and Operators:</strong></p>
<li>Learn why message signing is the foundation for secure OT communication=
and when encryption is essential.</li>
<li>Discover practical strategies for phased adoption of secure protocols t=
o minimize operational risk.</li>
<li>Identify which OT communications should be prioritized for enhanced sec= urity and resilience.</li>
<li>Explore ways to simplify secure workflows and key management for easier=
implementation.</li>
</ul>
<p><strong>For Manufacturers:</strong></p>
<li>Gain insights from customer research to reduce customer friction and de= liver more usable, secure products.</li>
<li>Explore actionable recommendations to address cost and complexity barri= ers to secure communication.</li>
<li>Learn how usability metrics like deployment time and ease of integratio=
n can differentiate your solutions and accelerate adoption.</li>
</ul>
<p>CISA encourages critical infrastructure organizations and OT manufacture=
rs to review and implement the recommendations in this guidance. For furthe=
r details, read the <a href=3D"
https://www.cisa.gov/resources-tools/resourc= es/barriers-secure-ot-communication-why-johnny-cant-authenticate" target=3D= "_blank" title=3D"full guidance here" rel=3D"noopener">full guidance here</= a>.</p>
<p>Please share your thoughts with us through this this <a href=3D"
https://= cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?Source=3DGovDeliv= ery
https://www.cisa.gov/resources-tools/resources/barriers-secure-ot-commun= ication-why-johnny-cant-authenticate" target=3D"_blank" title=3D"anonymous = survey" rel=3D"noopener">anonymous survey</a>. We appreciate your feedback!=
</div>
</div>
</div>
<div class=3D"l-constrain l-page-section--rich-text">
<div class=3D"l-page-section__content">
<div class=3D"c-field c-field--name-body c-field--type-text-with-summary c-= field--label-hidden">
<div class=3D"c-field__content">
<p>This product is provided subject to this=C2=A0<a href=3D"
https://www.cis= a.gov/notification" target=3D"_blank" title=3D"Notification" rel=3D"noopene= r">Notification</a>=C2=A0and this=C2=A0<a href=3D"
https://www.cisa.gov/priv= acy-policy" target=3D"_blank" title=3D"Privacy & Use" rel=3D"noopener">= Privacy & Use</a>=C2=A0policy.</p>
</div>
</div>
</div>
</div>
</div>
<style>body {
font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: norma=
l; font-style: normal; color: #333333;
}
</style>
=20
<div id=3D"mail_footer">
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; colo=
r: #757575;">Having trouble viewing this message?=C2=A0</span><a href=3D"ht= tps://content.govdelivery.com/accounts/USDHSCISA/bulletins/40907ff" target= =3D"_blank" rel=3D"noopener">View it as a webpage</a>.=C2=A0<a href=3D"http= s://content.govdelivery.com/accounts/USDHS/bulletins/292141e" target=3D"_bl= ank" rel=3D"noopener"></a><span style=3D"font-size: 10.0pt; color: #757575;= "></span></p>
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; color: #= 757575;">You are subscribed to updates from the </span><a href=3D"
https://w= ww.cisa.gov"><span style=3D"font-size: 10.0pt;">Cybersecurity and Infrastru= cture Security Agency</span></a><span style=3D"font-size: 10.0pt; color: #7= 57575;"> (CISA)<br></span><a href=3D"
https://public.govdelivery.com/account= s/USDHSCISA/subscriber/edit?preferences=3Dtrue#tab1" target=3D"_blank" rel= =3D"noopener"><span style=3D"font-size: 10.0pt; color: #00568c;">Manage Sub= scriptions</span></a>=C2=A0=C2=A0<span style=3D"font-size: 10.0pt; color: #= 757575;">|=C2=A0=C2=A0</span><a href=3D"
https://www.cisa.gov/privacy-policy=
" target=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; colo=
r: #00568c;">Privacy Policy</span></a><span style=3D"font-size: 10.0pt; col= or: #757575;">=C2=A0=C2=A0|=C2=A0 <a href=3D"
https://subscriberhelp.granicu= s.com/s/article/Subscriber-Help-Center" target=3D"_blank" rel=3D"noopener">= Help</a><a href=3D"
https://insights.govdelivery.com/Communications/Subscrib= er_Help_Center" target=3D"_blank" rel=3D"noopener"></a></span><span style= =3D"font-size: 10.0pt; color: #757575;"></span></p>
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; color: #= 757575;">Connect with CISA: <br></span><a href=3D"
https://www.facebook.com/= CISA" target=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; = color: #00568c;">Facebook</span></a><span style=3D"font-size: 10.0pt; color=
: #757575;">=C2=A0 |=C2=A0 </span><a href=3D"
https://twitter.com/CISAgov" t= arget=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; color: = #00568c;">Twitter</span></a><span style=3D"font-size: 10.0pt; color: #75757= 5;">=C2=A0 |=C2=A0 </span><a href=3D"
https://Instagram.com/cisagov" target= =3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; color: #0056= 8c;">Instagram</span></a><span style=3D"font-size: 10.0pt; color: #757575;"= >=C2=A0 |=C2=A0 </span><a href=3D"
https://www.linkedin.com/company/cybersec= urity-and-infrastructure-security-agency" target=3D"_blank" rel=3D"noopener= "><span style=3D"font-size: 10.0pt; color: #00568c;">LinkedIn</span></a><sp=
an style=3D"font-size: 10.0pt; color: #757575;">=C2=A0 |=C2=A0=C2=A0 </span= ><a href=3D"
https://www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A" targe= t=3D"_self"><span style=3D"font-size: 10.0pt; color: #00568c;">YouTube</spa= n></a><span style=3D"font-size: 10.0pt; color: #757575;"></span></p>
</div>
<div id=3D"tagline">
<hr>
<table style=3D"width: 100%;" border=3D"0" cellspacing=3D"0" cellpadding=3D=
<tbody>
<td style=3D"color: #757575; font-size: 10px; font-family: Arial;" width=3D= "89%">This email was sent to
cisa@toolazy.synchro.net using GovDelivery Com= munications Cloud, on behalf of: Cybersecurity and Infrastructure Security = Agency =C2=B7 707 17th St, Suite 4000 =C2=B7 Denver, CO 80202</td>
<td align=3D"right" width=3D"11%"><a href=3D"
https://subscriberhelp.granicu= s.com/" target=3D"_blank" rel=3D"noopener"><img src=3D"
https://content.govd= elivery.com/images/govd-logo-dark.png" border=3D"0" alt=3D"GovDelivery logo=
" width=3D"115"></a></td>
</tr>
</tbody>
</table>
<style type=3D"text/css">body .abe-column-block { min-height: 5px; } table.= gd_combo_table img {margin-left:10px; margin-right:10px;} table.gd_combo_ta= ble div.govd_image_display img, table.gd_combo_table td.gd_combo_image_cell=
img {margin-left:0px; margin-right:0px;}</style>
</div>
</td>
</tr>
</table>
<img alt=3D"" src=3D"
https://links-2.govdelivery.com/CI0/0101019c4911ab20-d= 7e1e863-0f8e-4930-b830-317e847cc16d-000000/ciAcfyX1F6iOD1Ribr824PaoFfbhNOsj= Rnt6_ro_CtM=3D443" style=3D"display: none; width: 1px; height: 1px;">
</body>
</html>
--===============1157559565375597535==--
--===============6989093684433911276==--