HomeIntelligenceBrief
🔓 BREACH BRIEF⚪ Informational📋 Advisory

Thought Leadership: “Secure by Demand” Model Calls for Incentive Shift to Close Software Risk Gap

At RSAC 2026, security expert Lauren Zabierek highlighted how market incentives favor speed over safety, widening a risk gap in software supply chains. She proposes a “secure‑by‑demand” framework where buyers drive security requirements, urging TPRM teams to embed secure‑by‑design criteria into vendor assessments.

🛡️ LiveThreat™ Intelligence · 📅 March 25, 2026· 📰 databreachtoday.com
Severity
Informational
📋
Type
Advisory
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
databreachtoday.com

Thought Leadership: “Secure by Demand” Model Calls for Incentive Shift to Close Software Risk Gap

What Happened – At RSAC 2026, Lauren Zabierek (CAS Strategies, Institute for Security and Technology) argued that current market incentives reward speed and feature‑rich releases over security, creating a widening “risk gap” for critical software. She proposed a “secure‑by‑demand” approach where buyers explicitly require security guarantees, and policymakers create incentives for vendors to adopt secure‑by‑design practices.

Why It Matters for TPRM

  • Vendors that prioritize rapid feature delivery may ship insecure components, exposing third‑party ecosystems to supply‑chain risk.
  • Lack of market pressure for security can lead to hidden vulnerabilities that later surface as data breaches or service disruptions.
  • TPRM programs must incorporate security‑by‑design criteria into vendor assessments and contract clauses to mitigate these systemic risks.

Who Is Affected – All industries that rely on third‑party software, especially technology/SaaS, financial services, healthcare, and critical infrastructure providers.

Recommended Actions

  • Update vendor questionnaires to include secure‑by‑design certifications and evidence of security‑by‑demand commitments.
  • Require contractual security requirements (e.g., minimum CVSS scores, regular code‑review processes).
  • Monitor regulatory developments that may mandate security incentives for software suppliers.

Technical Notes – The discussion focuses on policy and incentive structures rather than a specific vulnerability or exploit. No CVEs, malware, or attack vectors are cited. The core risk is the systemic exposure caused by insecure software defaults and insufficient buyer demand for security. Source: DataBreachToday – How “Secure by Demand” Can Reset Cybersecurity

📰 Original Source
https://www.databreachtoday.com/how-secure-by-demand-reset-cybersecurity-a-31146

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.