Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

COVID-19 and Automation Cybersecurity

When we're describing cyberattacks against industrial control systems, it can sound like we're talking about something medical. Words like "virus," "inject," "infect," and "quarantine" can be found all over the world of cybersecurity.

So if you're immersed in the world of cybersecurity like we are,  our current news cycle can be a hall of mirrors. It's a reminder that these concepts we know so well are abstract approximations of medical terms, carried over from the study of living viruses.

Of course, we're seeing a lot of coverage these days of one specific virus. The recently classified pandemic COVID-19 will have long-term effects that are difficult to foresee today, and we hope you and your loved ones stay healthy. This is an automation cybersecurity blog, however⁠—so what parallels exist between the COVID-19 outbreak and the automation cybersecurity industry? How are the associated concepts related, aside from a few phrases that happen to overlap?

A new post on ISA Interchange, the official blog of the International Society of Automation, tackles this subject:

The dramatic increase in connectivity—of devices, systems, networks, and facilities—has been the underlying enabler to digital transformation, which has brought an unprecedented increase in productivity and reliability across industry sectors. In a similar fashion, over a longer time period, the worldwide economy has benefited greatly from the transition to an interconnected, mobile world where significant percentages of populations can travel internationally—affordably and reliably—at numbers we’d never imagined in the centuries prior.

In a connected world, how do you limit the vectors of potentially contagious threats? Whether those threats are new diseases or new malware, containment is more than just a handy word choice—it's essential. Read the full blog post here, and stay tuned for additional coverage. We're working on a blog post about security considerations in remote environments.

This is a significant topic right now, and ISA (along with ISAGCA) will work hard to deliver quality information that you can trust. If you'd like to see blog posts on other topics, please drop us a note below. Thanks for reading!

Kara Phelps
Kara Phelps
Kara Phelps is the communications and public relations manager for ISA.

Related Posts

New Resource: Comparison of ISA/IEC 62443-4-1 and NIST SP 800-218, Secure Software Development Framework

The ISA Global Cybersecurity Alliance (ISAGCA) and ISASecure® have published a document comparing the ISA...
Kara Phelps Mar 28, 2025 12:00:00 PM

9 SCADA System Vulnerabilities and How to Secure Them

Supervisory control and data acquisition (SCADA) systems are pivotal in managing and monitoring industria...
Zac Amos Mar 21, 2025 7:00:00 AM

Is Your OT Network Truly Secure? Here’s Why Active Directory Might Be Your Weakest Link

When was the last time you assessed the security of your operational technology (OT) network? If your set...
Jatin Mannepalli Mar 14, 2025 7:00:00 AM