Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

ISA's Cybersecurity Standards Implementation Virtual Conference (CSIC)

Are your industrial automation and control systems (IACS) protected against malicious cyberattacks? These critical infrastructures are often run on outdated operating systems that hackers are increasingly infiltrating. In a connected world, every digital device is a potential vulnerability point, and it is no longer a matter of whether you will be attacked, but when. Cybersecurity incidents are occurring with more frequency and with more impact than ever before.

The ISA/IEC 62443 series of standards, when implemented using best practices and guidance, increases security consistency and drives results. The standards are a proven, horizontally applicable series that improves the security of devices, systems, processes, and facilities. Properly implemented, the series of standards drives operational excellence by ensuring quality, productivity, supply chain integrity, interoperability, and less redundancy. A well-documented and well-managed standards-based cybersecurity program strengthens your company’s regulatory position and improves your global capabilities, ensuring consistency of processes across the entire labor force and lowering financial risk for development projects.

ISA's upcoming 2021 Cybersecurity Standards Implementation Virtual Conference (CSIC), taking place on 19 October 2021, will help you harness the tools and insights you need to plan a smart and efficient adoption of the ISA/IEC 62443 series, opening a new world of possibilities while protecting your valued assets and employees. This all-day event runs from 8 a.m. to 5 p.m. ET, and our virtual setup makes attending easier and more flexible for professionals all around the world.

CSIC-Hero-1This two-track, interactive event will harness the best practices and lessons learned from hundreds of end user applications, showcasing the tried-and-true approaches for securing automation and control systems across dozens of industry segments. Sessions and panel discussions will explore the lifecycle of OT cybersecurity projects, along with the roles and responsibilities of end users, product suppliers, system integrators, and maintenance providers.

Join ISA for this elevated conference, focusing on expert discussions surrounding awareness and solutions for organizational threats and vulnerabilities. This conference will provide you with a look into how the implementation of 62443 can deliver a robust automation cybersecurity system so that you can quickly and efficiently respond to threats, while minimizing harm.

To learn more about the conference and to register, please visit the Cybersecurity Standards Implementation Virtual Conference (CSIC) website.


ISA offers virtual events, including webinars, virtual conferences, and ISA Connect Live, across a variety of topics. Learn more about ISA's virtual events program for 2021.

Steven Aliano
Steven Aliano
Steven Aliano is the Content Marketing Specialist for ISA & ISAGCA.

Related Posts

Cybersecurity Risk is the Great Equalizer

This blog has been repurposed from the May-June 2020 edition of InTech.
Eric Cosman Aug 9, 2022 5:30:00 AM

Securing Your Operations? Don't Forget Your Hardware

A version of this blog originally appeared on Cisco
Vivek Bhargava Aug 2, 2022 5:30:00 AM

Why ICS/OT Infrastructure is Insecure

Overview  Industrial control system (ICS)/operational technology (OT) infrastructure security is differen...
Ritesh Srivastava Jul 26, 2022 5:30:00 AM