NCSC releases 'Secure by Demand': new guidelines for operational technology security ahead of CYBERUK 2025
Cyber Security • March 12, 2025 • Written by: Gareth Jones • Read time: 1 min

As CYBERUK 2025 approaches, with its focus on "Building a Resilient Digital Future", the spotlight rightly falls on the resilience of our Operational Technology (OT) systems. These are the lifelines of the UK – from our energy grids to our water supply and transport networks.
The challenge is clear: OT systems are prime targets for cyber attacks, and the burden of securing them often falls disproportionately on UK operators. We need a fundamental shift.
The National Cyber Security Centre (NCSC) and its partners have published the vital "Secure by Demand: Priority Considerations for Operational Technology Owners and Operators" document, urging us to demand security from manufacturers.
Key considerations include:
• Configuration Management: Ensuring integrity and control
• Open Standards: Promoting interoperability and reducing vendor lock-in
• Secure by Default: Building security into products from the outset
• Threat Modelling: Understanding and mitigating UK-specific threats
• Strong Authentication: Protecting against unauthorised access.
Methods, an NCSC Assured Consultancy Company, are committed to supporting UK organisations in enhancing their OT resilience. With deep expertise in sectors critical to the UK economy, we provide tailored solutions to meet your specific needs.
Let's collaborate to strengthen the UK's digital defences.
Join us at CYBERUK 2025 and be part of this crucial conversation. Hope to see you there!