Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Achal Lekhi

Achal Lekhi

Achal Lekhi is a diligent and detail-oriented operational technology security specialist professional with a strong academic background and hands-on experience in several complex roles in different sectors. Achal is a quick thinker, with an ability to wear multiple hats — strategic, technical and logical for a given requirement. He believes strongly that there is no problem in the world that does not have a solution! Currently, Achal works as an operational technology (OT) security consultant across several industries globally. He has an excellent blend of technology capability, OT/IT awareness, network and information security and risk and compliance with a detailed understanding and experience of implementing OT security and cybersecurity standards.

Recent Posts:

xDR in Operational Technology: Approach and Adaption

Operational technology (OT) is the backbone of automation, manufacturing systems and other utilities...
Achal Lekhi Aug 22, 2023 12:31:01 PM

The Future of the SOC: SOCaaS

A Security Operations Center (SOC) functions as a team of skilled people operating with defined proc...
Achal Lekhi Jul 12, 2022 5:30:00 AM

The ICS Periodic Table

Science has come a long way since Aristotle’s theory of air, water, fire, and earth. Just like Arist...
Achal Lekhi Jun 7, 2022 5:30:00 AM

Why Network Discovery is Critical in the ICS/IACS Environment

Securing operational technology (OT) networks requires a great deal of thought when designing and im...
Achal Lekhi May 17, 2022 5:30:00 AM

Log4J Vulnerability: What, Why and How

What is Log4j? Log4j is a software library built in Java that’s used by millions of computers worldw...
Achal Lekhi Jan 25, 2022 5:30:00 AM

Architecture vs. Design

Many Operational Technology (OT) projects start with identifying the requirements and then diving st...
Achal Lekhi Nov 16, 2021 5:30:00 AM

7 Practices to Help You Become Security Conscious

Editor's Note: As we wind down Cybersecurity Awareness Month, ISAGCA continues to provide a collabor...
Achal Lekhi Oct 19, 2021 5:30:00 AM

    Related Posts