UL introduces the new UL Cybersecurity Assurance Program (UL CAP). Based on the UL 2900 series of standards, UL CAP offers testable cybersecurity criteria for network-connectable products and systems to:

  • Assess software vulnerabilities and weaknesses
  • Minimize exploitation
  • Address known malware
  • Review security controls
  • Increase security awareness

Cyber-attacks are more sophisticated and harder to protect against, and unfortunately, they’re also more costly than ever. So security precautions are critical to your business. By 2020, there will be between 21 and 50 billion connected devices, and by 2018, it’s predicted that 66% of networks will have an Internet of Things (IoT) security breach.

UL CAP can help protect your brand and your business from these attacks. We developed the program with input from major stakeholders representing the U.S. Federal government, academia, and industry to elevate the security measures deployed in the critical infrastructure supply chain.

The purpose of UL CAP is to help manufacturers, purchasers, and end users identify and then mitigate cybersecurity risks through methodical risk assessments and evaluations. We work with a wide variety of industry functions, including industrial control systems, medical devices, automotive, HVAC, lighting, smart home appliances, alarm systems, fire systems, building automation, smart meters, network equipment, and consumer electronics.

Early adoption of the UL CAP provides a competitive advantage in the marketplace and will assist with mitigating risk including:

  • Unplanned downtime and loss of production
  • Costly harm to assets
  • Reputational damage

Recently UL hosted a webinar to discuss UL CAP, UL 2900 series of standards which is the foundation of UL CAP, and how manufacturers and vendors can benefit from the program. Ken Modeste, the Principal Engineer and UL Cybersecurity Technical Lead, took participants through the current state of cybersecurity risk, the fundamentals of developing products with security in mind, and how to develop a robust methodology for identifying risks in a manufacturer’s software supply chain. View the webinar (recorded).

For more information: