{"id":54479,"date":"2023-11-10T18:23:10","date_gmt":"2023-11-10T18:23:10","guid":{"rendered":"https:\/\/www.darkreading.com\/ics-ot\/shields-ready-initiative-inevitable-cyberattacks"},"modified":"2023-11-10T18:23:10","modified_gmt":"2023-11-10T18:23:10","slug":"shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/","title":{"rendered":"&#8216;Shields Ready&#8217; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The US government has issued a series of prescriptions for preparing critical infrastructure operators for disasters, physical attacks, and cyberattacks, with an emphasis on the ability to recover from disruptions in the future.<\/p>\n<p>The initiative, dubbed &#8220;Shields Ready,&#8221; aims to convince 16 identified critical infrastructure sectors to invest in hardening their systems and services against any disruption, no matter the source. The effort, spearheaded by both the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA), assumes that attacks and disasters will happen and calls on critical infrastructure operators to prepare to keep services running.<\/p>\n<p>The interconnectedness of the 16 critical infrastructure sectors, and the supply chain on which they rely, means preparedness is critical, said Jen Easterly, director of CISA.<\/p>\n<p>&#8220;Our nation&#8217;s critical infrastructure entities \u2014 from schools to hospitals to water facilities \u2014 must have the tools and resources to respond to and recover from disruption,&#8221; she <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/dhs-unveils-new-shields-ready-campaign-promote-critical-infrastructure-security-and-resilience\" target=\"_blank\" rel=\"noopener\">said in a statement<\/a>. &#8220;By taking steps today to prepare for incidents, critical infrastructure, communities and individuals can be better prepared to recover from the impact of the threats of tomorrow, and into the future.&#8221;<\/p>\n<p>The dangers to critical infrastructure have increased in recent years, with disruptions caused by severe disasters \u2014 such as the wildfires in California and the coronavirus pandemic \u2014 and cyberattacks. In the past five years, for example, pharmaceutical firm Merck <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/court-rejects-merck-insurers-attempts-to-refuse-coverage-for-notpetya-damages\" target=\"_blank\" rel=\"noopener\">suffered a major outage<\/a> because of the NotPetya cyberattack in 2017, while this year competitor Pfizer <a href=\"https:\/\/www.nytimes.com\/2023\/07\/25\/health\/pfizer-warehouse-tornado-drug-shortages.html\" target=\"_blank\" rel=\"noopener\">suffered a tornado strike<\/a> on a major warehouse that caused disruptions to the supply of certain drugs. And famously, in May 2021, US pipeline operator Colonial Pipeline <a href=\"https:\/\/www.darkreading.com\/ics-ot\/tsa-official-feds-improved-cybersecurity-response-post-colonial-pipeline\" target=\"_blank\" rel=\"noopener\">suffered a ransomware attack<\/a>, shutting down its services for a week, which led to gas shortages throughout the southeast United States.<\/p>\n<p>A previous campaign, known as &#8220;Shields Up,&#8221; focused on convincing critical infrastructure organizations to take defensive actions in reaction to specific threat intelligence. Shields Ready is all about preparing for the worst across the board, says Michael Hamilton, co-founder and CISO of Critical Insight, a cybersecurity consultancy.<\/p>\n<p>&#8220;The hidden message here is, it&#8217;s coming, and looking around the world, it&#8217;s not that hard to predict,&#8221; he says, pointing to regular FBI and CISA warnings to industrial control and critical infrastructure providers. &#8220;It&#8217;s not hard to put two and two together and say, you know the threat level has gone up for infrastructure disruption.&#8221;<\/p>\n<h2 class=\"regular-text\">Policy Initiatives for Shields Ready<\/h2>\n<p>A problem for the initiative is that many of the current recommendations are voluntary and informational. Since November has been designated &#8220;Critical Infrastructure Security and Resilience Month,&#8221; CISA <a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/critical-infrastructure-security-and-resilience-month-toolkit\" target=\"_blank\" rel=\"noopener\">published a toolkit<\/a> for critical infrastructure providers, a 15-page document covering specific threats, security challenges, and self-assessment exercises. The agency also <a href=\"https:\/\/www.cisa.gov\/shields-ready\" target=\"_blank\" rel=\"noopener\">published<\/a> the Infrastructure Resilience Planning Framework (IRPF) and guides on how to develop a resilient supply chain and how to respond to a cyberattack.<\/p>\n<p>Still, the effort lacks regulatory teeth, says Tom Guarente, vice president of government affairs at Armis, an operational technology (OT) security firm.<\/p>\n<p>&#8220;What it appears to really be about is building resilience in terms of starting with situational awareness, talking about the importance of sharing information between public and private sector entities,&#8221; he says. &#8220;They say there&#8217;s a toolkit, and but the toolkit appears to be made up mostly of guidelines \u2014 you know, PDF documents. So the short answer is, I don&#8217;t know what will come out of the Shields Ready campaign.&#8221;<\/p>\n<p>Yet coming up with general guidelines under the umbrella of Shields Ready for all 16 critical infrastructure sectors is likely impossible, so it is unsurprising that the initial effort lacks details, says Danielle Jablanski, OT cybersecurity strategist at Nozomi Networks, a provider of cybersecurity for OT networks. Each critical infrastructure sector has a <a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/sector-risk-management-agencies\" target=\"_blank\" rel=\"noopener\">Sector Risk Management Agency<\/a> \u2014 typically the Department of Homeland Security, but in some cases the Department of Energy, Defense, Health and Human Services, or Transportation is the designated SRMA \u2014 that will make sector-specific guidelines and requirements.<\/p>\n<p>&#8220;I think the government is more in an audit mode today,&#8221; she says. &#8220;It\u2019s important to remember that critical infrastructure is not monolithic, there\u2019s no one-size-fits-all security plan, program, or set of controls that benefits all 16 sectors the same.&#8221;<\/p>\n<h2 class=\"regular-text\">Encouraging Critical Infrastructure Safety: Carrot or Stick?<\/h2>\n<p>Those efforts, for the most part, appear to take a light touch toward getting industry executives on board. Because security continues to be a cost center \u2014 the tax of doing business \u2014 companies naturally want to minimize those expenditures, which is why punitive action will likely be necessary to get many of the recommendations implemented, says Critical Insight&#8217;s Hamilton.<\/p>\n<p>Holding executives liable for their company&#8217;s performance during a disaster or a cyberattack \u2014 such as <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/sec-charges-against-solarwinds-ciso-send-shockwaves-through-security-ranks\" target=\"_blank\" rel=\"noopener\">the charges against the CISO of SolarWinds<\/a> \u2014 has already been a rude awakening for the industry, he says.<\/p>\n<p>&#8220;Having briefed senators, generals, and governors, I&#8217;ve found that you can talk about scary Russians, supply chains, buffer overflows, and SQL injection all you want, and you&#8217;re just gonna get eye-rolling,&#8221; Hamilton says. &#8220;But as soon as you say &#8216;executive negligence,&#8217; you have an audience. That&#8217;s exactly what the government is doing \u2014 they are going to hold executive leadership as negligent and that&#8217;s getting everybody&#8217;s attention.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/ics-ot\/shields-ready-initiative-inevitable-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyberattack is coming, disasters are certain, and the US government wants critical infrastructure firms ready to handle any disruption. Welcome to Shields Ready.Read More <a href=\"https:\/\/www.darkreading.com\/ics-ot\/shields-ready-initiative-inevitable-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-54479","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&#039;Shields Ready&#039; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;Shields Ready&#039; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-10T18:23:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"&#8216;Shields Ready&#8217; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks\",\"datePublished\":\"2023-11-10T18:23:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/\"},\"wordCount\":874,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7cb5bd776136638f\\\/648b5c99ea0cf07c3d7283a7\\\/critical_infrastructure-Lyroky_-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/\",\"name\":\"'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable Cyberattacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7cb5bd776136638f\\\/648b5c99ea0cf07c3d7283a7\\\/critical_infrastructure-Lyroky_-alamy.jpg\",\"datePublished\":\"2023-11-10T18:23:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7cb5bd776136638f\\\/648b5c99ea0cf07c3d7283a7\\\/critical_infrastructure-Lyroky_-alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7cb5bd776136638f\\\/648b5c99ea0cf07c3d7283a7\\\/critical_infrastructure-Lyroky_-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8216;Shields Ready&#8217; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable Cyberattacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable Cyberattacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-11-10T18:23:10+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"&#8216;Shields Ready&#8217; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks","datePublished":"2023-11-10T18:23:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/"},"wordCount":874,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/","url":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/","name":"'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable Cyberattacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg","datePublished":"2023-11-10T18:23:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7cb5bd776136638f\/648b5c99ea0cf07c3d7283a7\/critical_infrastructure-Lyroky_-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/shields-ready-critical-infrastructure-initiative-addresses-inevitable-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"&#8216;Shields Ready&#8217; Critical Infrastructure Initiative Addresses Inevitable Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54479"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54479\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}