You need an active session. Login.
You need to log in with an active user account on the website in order to access the contents. Many of the contents are not publicly available, in case you do not remember your password, use the option to recover password. Prevent your account from being blocked.
You don’t have permission. Access Denied.
A large amount of the content on the Web is available only to certain users and profiles or requires an active subscription. It may be that the contents have been moved or reclassified. Send us a technical support ticket with a description of the incident.
The link is not valid. An Error.
Over the past few years we have made many changes to the Web. Internet search engines often retain information and references about content that no longer exists. Therefore, these links no longer work. In these cases we don’t have much to do about it. Either way, you can reach us or simply continue browsing.
You may be interested in:
Rationalization: Stop spending valuable resources wrongly
We see very often how companies (through their security staff) go shopping and rush to spend, often pushed by the pressure of the business, the inertia of the market, lack of knowledge, skill and opportunism of suppliers, before performing a good risk assessment.
Construction of Awareness and Training Programs
Currently, for companies it is a necessity to develop training and awareness programs in industrial cybersecurity, but there are doubts about how to successfully develop a program focused on generating the necessary knowledge, skills and actions for each type of public.
Industrial cyber risk management based on vulnerabilities or consequences?
We have already talked about the need to perform an industrial cyber risk analysis, and this time we will address one of the mistakes most commonly assumed "and accepted" by enthusiasts in industrial cybersecurity. Risk analysis based on vulnerabilities or consequences?
Risk Assessment System for Industrial Cybersecurity
Do you know what an industrial cyber risk management system is, its components and why it is so important in industrial cybersecurity?
Automation Systems Cybersecurity: From Standards to Practices
Eric Cosman, chairman of ISA99 Committee, explains that standards, guidance, and direction are available from several sources, but surveys and anecdotal reports have shown that many still struggle with how to turn this information into effective programs. Suppliers have a clear imperative to improve their products, but asset owners often struggle with how to get started. Practical approach into cybersecurity is very hard to find in the market, still today.
Working with future and new systems (Special Edition)
When the owner of the industrial plant has the possibility of having the best of both worlds, the best control systems and the best security. When the consequences occur the damage is done, and there is no turning back. That is why we say that it is never too late to deal with security (redesign), but the sooner much better (design).
IEC designates ISA/IEC-62443 as horizontal standard
The International Society of Automation (ISA) and the ISA Global Cybersecurity Alliance (ISAGCA) are proud to announce that the International Electrotechnical Commission (IEC) has officially designated the IEC/ISA-62443 series of standards as "horizontal," meaning they are proven to be applicable to a wide range of different industries.
Top Five Cybersecurity Issues in the Power Grid Supply Chain
The U.S. Department of Energy (DOE) recently held a meeting to discuss the security of the power grid. The traditional power grid has struggled due to increased demand. Evidence of this can be seen in the continued blackouts in California to the extensive outages during the 2021 Texas winter storm.