WisePlant – A WiseGroup Company

OTC – Industrial Cybersecurity

Digital transformation in industrial cybersecurity

In this era of digital transformation, technologies cannot become a pain for organizations, it must be the answer that adds value. That is why it is so important to identify and know the ecosystem in which the transformation strategy is going to be developed, which makes a difference with respect to digitalization.

Automation Systems Cybersecurity: From Standards to Practices

Eric Cosman, chairman of ISA99 Committee, explains that standards, guidance, and direction are available from several sources, but surveys and anecdotal reports have shown that many still struggle with how to turn this information into effective programs. Suppliers have a clear imperative to improve their products, but asset owners often struggle with how to get started. Practical approach into cybersecurity is very hard to find in the market, still today.

IEC designates ISA/IEC-62443 as horizontal standard

The International Society of Automation (ISA) and the ISA Global Cybersecurity Alliance (ISAGCA) are proud to announce that the International Electrotechnical Commission (IEC) has officially designated the IEC/ISA-62443 series of standards as "horizontal," meaning they are proven to be applicable to a wide range of different industries.

Is the safety of your plant an expense or an investment?

We continue to watch as many professionals with vast experience in Information Security, industrial companies taking action, renowned cybersecurity consultancies, government organizations and technology developers are wrong (by far) when it comes to mitigating industrial cyber risk. One of the main mistakes is to implement the same strategies as in industrial information security.

How are you identifying and classifying Industrial Cyber Assets?

We continue to observe how many professionals with vast experience in Information Security, industrial companies that take action, renowned cybersecurity consultants, government organizations and technology developers are wrong (by far) when it comes to identifying, evaluating, classifying and managing industrial cyber assets. One of the main mistakes is to focus and prioritize those that have communications interfaces over those that do not. The errors we observe are many and very significant.