Connect with us

Hi, what are you looking for?



DHS Launches New Critical Infrastructure Security and Resilience Campaign

DHS launches Shields Ready, a new campaign promoting security and resilience for critical infrastructure organizations.

The DHS and two of its agencies, CISA and FEMA, on Tuesday announced the launch of a new campaign whose goal is to help critical infrastructure organizations become more secure and resilient. 

The new campaign, called Shields Ready, complements an existing campaign named Shields Up, which focuses on providing recommendations and other resources that can help critical infrastructure organizations reduce risk in response to specific threat intelligence.

Both Shields Up and Shields Ready cover not only cyberattacks but also physical security threats such as terrorism and targeted violence, and natural disasters such as hurricanes, wildfires and earthquakes. 

The goal of the Shields Ready initiative is to encourage organizations to strengthen resilience and be prepared for potential disruptions. 

The list of recommended practices includes identifying critical assets and systems and understanding their dependencies, assessing risks, developing strategic risk management plans, and exercising incident response and recovery plans and continuously improving them.

As part of the cybersecurity aspect of Shields Ready, CISA is offering many resources, including newly released guidance to help emergency managers plan for and respond to cyber incidents. 

CISA is also offering a service for evaluating operational resilience and cybersecurity practices, and aid for conducting tabletop exercises.

“Our nation’s critical infrastructure entities—from schools to hospitals to water facilities—must have the tools and resources to respond to and recover from disruption,” said CISA Director Jen Easterly. “By taking steps today to prepare for incidents, critical infrastructure, communities and individuals can be better prepared to recover from the impact of the threats of tomorrow, and into the future.” 

Advertisement. Scroll to continue reading.

Related: Federal Push for Secure-by-Design: What It Means for Developers

Related: CISA, HHS Release Cybersecurity Healthcare Toolkit

Related: CISA Now Flagging Vulnerabilities, Misconfigurations Exploited by Ransomware

Related: Government Shutdown Could Bench 80% of CISA Staff

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to and Exchange Online.