Building a Resilient World:

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Cybersecurity Incidents Can Be Prevented

Cybersecurity incidents continue to increase in frequency and have greater impacts on the critical infrastructure of nations around the world. Incidents associated with operation technologies (such as automation and control systems) are impacting industries, governments, and other parties. The implementation of the ISA/IEC 62443 series of international cybersecurity standards can help prevent incidents and minimize the disruption and impact of incidents that occur. These are some incidents that have significantly impacted critical infrastructure:


These are some of the incidents that were prevented and/or minimized by following good cybersecurity practices, like those defined in ISA/IEC 62443:

Capture 2

Brian Peterson
Brian Peterson
Brian Peterson is an Information Risk Consultant who works for LOGIIC and other companies as a program and project manager. Mr. Peterson has been the project manager for LOGIIC for over 15 years. Mr. Peterson has 30 years of cybersecurity experience of IT systems, applications, and SCADA/DCS systems, such as those used in the oil and gas, and manufacturing sectors. In the last 20 years, he has concentrated on performing research of security technologies and to develop programs and implementation tools for Information Security, ICS Security, and other risk programs.

Related Posts

Excerpt #5: Industrial Cybersecurity Case Studies and Best Practices

The following blog is adapted from the book Industrial Cybersecurity Case Studies and Best Practices, aut...
Steve Mustard Mar 14, 2023 7:00:00 AM

Embracing Zero Trust: Least-Privilege Access

According to a recent World Economic Forum community paper, “The ‘Zero Trust’ Model in Cybersecurity: Tow...
Greg Elliott Mar 7, 2023 7:00:00 AM