Supercharging Product Security in 6½ Steps

How can device manufacturers proactively secure products, throughout their lifecycle?