When a keystroke can kill, a partner website can reveal a billion dollars worth of research, or millions of patient records can be compromised, the stakes are as high as they can get in industry. What are life sciences companies to do?Fortunately they\u2019ve started taking a page from their adversaries\u2019 manuals, where attackers commonly use tools from one group, privileged information from another and delivery systems from yet a third. These adversaries rent giant botnets, made of millions of personal computers, and aim that wrath at a single website, sometimes simply to distract, while they launch a more damaging attack from another vector. \u00a02014 is the year that life science companies are starting to work together in three key areas to better defend themselves from these ever increasing threats.First, agreeing \u201cnot to compete on security\u201d is life sciences companies\u2019 newest weapon in their arsenal. It\u2019s also a tough concept for a board of directors to approve as they are used to competing on every angle. With boards now recognizing cybersecurity\u2019s risks \u2014 and understanding that cybersecurity has become a business issue, not just an IT issue \u2014 life sciences CSOs are becoming empowered to share threat and countermeasure data with their peers, partners and law enforcement.The U.S. Information Sharing and Analysis Centers (ISACs), which are available to each critical component of our economy, and specifically, the National Health\u2019s ISAC are all growing quickly. Member life sciences companies now provide specific direction to the NH\/ISAC. It also has added life sciences security executives from Amgen, J&J, McKesson and Merck to its board,\u00a0and it has begun to deliver vital information sharing services, both between members, and between members and law enforcement.This collaboration shows the same real successes that the Financial Services ISAC has been delivering to its members for more than a decade. Additional benefits, including spotting and stopping threats before they cause damage, are coming through collaborative work with the security sector and law enforcement.Second is the attention to eco-system security. Supply-chain security has become a new and formidable challenge to tier-one life sciences companies, and one that is best addressed by their purchasing departments, not their IT departments. The Target thieves didn\u2019t attack Target directly, but rather attacked the company by first attacking one of its suppliers. Criminals are routinely using supply chains to attack tier-one companies. "At this point, life sciences companies need to employ what I call \u201cindustrial strength\u201d cybersecurity,\u201d says Dr. Robert Wah, CSC Global Chief Medical Officer. Dr Wah is also President of the American Medical Association (AMA). \u201cWe can learn lessons from other industries.\u201dLife sciences companies\u2019 purchasing and M&A departments are now paying vital attention to cybersecurity, including requiring proven security capabilities prior to selection and integration. No one remembers the name of the air conditioning company that attackers first breached to get to Target\u2019s systems, but everyone remembers that the breech lost Target billions as well as ended C-suite careers.Third a growing understanding that medical devices, from pacemakers to phone apps, are this industries\u2019 industrial control systems (ICS). While ICS security is usually associated with the energy sector, the same principles apply with medical devices, and therefore the same threats and vulnerabilities exist. ICS systems work differently from traditional compute and communicate enterprise systems. With the latest FDA guidance\u00a0, life science companies are starting to leverage work and standards from other sectors to get a jump on protecting their own systems. Leveraging the years of learning that security experts have already accomplished towards securing these types of systems is critical to success. Life sciences companies will need to understand their unique ICS risks, and the best way to mitigate them, for the safe advancement of medicine.For those in the life sciences ecosystem, it\u2019s time to review and adopt these three industry leading security practices:1) Agree not to compete on security, and then action that agreement with your peers, partners and law enforcement2) Accept that your supplier's security risks are your security risks, and start to choose, acquire and manage their apps and services within your security policy3) Understand that ICS devices are different, are real targets, and must be secured properly.The global life sciences industry plays a key role in this planet\u2019s critical infrastructure. Getting security right is not just a bottom-line decision, but one that affects our very lives. It\u2019s great to see the industry making such progress.