top of page

AKMSecure joins the Operational Technology Cybersecurity Coalition

  • 15 hours ago
  • 2 min read

The OT Cyber Coalition is pleased to welcome AKMSecure as its newest member, joining the growing and diverse group of cybersecurity stakeholders united in their commitment to improving the security of operational technology environments.


As threats to critical infrastructure continue to evolve, the coalition is stronger with organizations like AKMSecure contributing expertise and perspective to the shared challenge of securing operational technology systems.


We asked the AKMSecure team to share more about their technology, why they joined the coalition, and what they see as the most pressing cybersecurity challenges facing critical infrastructure today.


 OTCC: What does AKMSecure bring to critical infrastructure and OT? 


AKMSecure: AKMSecure offers organizations that depend on OT a simple, safe and secure cryptographic solution that can eliminate key compromise breaches by automating key management and replacing PKI.   


OTCC: How so? 


AKMSecure: The key is Autonomous Key Management (AKM), a zero trust, quantum-secure framework that performs at sub-millisecond speeds, is always available, works on any device and is air-gapped and DDIL resilient. These are capabilities OT operators have needed for a long time.  


OTCC: Why join a coalition that includes other cybersecurity providers, including potential competitors? 


AKMSecure: Rigorous OT security demands industry-wide collaboration, not isolated solutions. By joining the OT Cyber Coalition, we hope to advance shared best practices, influence policy, and ensure organizations have access to truly interoperable tools that protect critical assets. Together, we are all stronger.  


OTCC: In your view, what stands out as the most pressing cybersecurity challenge for OT and endpoint security right now? 


AKMSecure: Current OT environments are not encrypted because they require extremely high levels of availability that PKI cannot accommodate. AKMSecure offers encryption without downtime, with security that is autonomous. Every communication frame proves identity, assures device integrity, and guarantees data authenticity mathematically before acceptance. Organizations get true Zero Trust: no more waiting for detection and response; protection is embedded from the start.  OTCC: Please tell us more about your company and your background. 


AKMSecure: The AKMSecure team eliminated a problem the cybersecurity industry had accepted as unsolvable: embedding Zero Trust into a quantum-secure foundation without relying on aging Public Key Infrastructure. The founding AKMSecure team has worked with GDIT, Alstom Rail, Airbus and Boeing and contributed to international Cybersecurity standards such as IEC 62443 and CENELEC TS-50701. 


OTCC: What do you believe the federal government should prioritize to help organizations modernize endpoint cybersecurity while reducing costs? And what should federal agencies with their own systems do internally? 


AKMSecure: These are critical issues. The federal government should accelerate recognition and promotion of post-PKI cryptographic frameworks with true quantum security, zero-downtime availability, and reduced human dependency — especially critical infrastructure. Harmonizing guidance across agencies to encourage adoption of lightweight, autonomous solutions aligned with CNSA 2.0,  NIST and IEC 62443 would cut through confusion, speed deployment and reduce costs. For federal agencies, whether in defense, energy, or transportation, the most critical step is auditing legacy PKI dependencies and piloting autonomous alternatives that eliminate manual overhead and central vulnerabilities. Agencies can lead by example, demonstrating how decentralized, self-healing key management secures air-gapped and tactical edge systems while maintaining compliance and slashing long-term costs. Strong public-sector adoption would signal to industry that the time to move beyond PKI has arrived. 


For more information on AKMSecure and Autonomous Key Management, please visit: https://www.akmsecure.com/ 


For more updates from the OT Cyber Coalition, please follow on LinkedIn or X @OT_Coalition. 


 
 
 

Comments


bottom of page