Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

OT/ICS Cybersecurity Voices: A Video Interview with Lesley Carhart

The ISA Global Cybersecurity Alliance (ISAGCA) strives to amplify uniquely talented voices in the field of OT/ICS cybersecurity. We recently sat down with Lesley Carhart, principal incident responder at Dragos (a founding member of ISAGCA). One of the few female-identifying OT/ICS cybersecurity experts in the world, Lesley uses her position to advocate for the importance of protecting industrial control systems and critical infrastructure from cyber threats, as well as the imperative to increase diversity in the field.

Watch the exclusive video interview below:

 

To learn more about Lesley's work and her uniquely personalized approach, you can visit her blog at tisiphone.net. You can also read the blog post on diversity in cybersecurity that she mentions in our conversation. 

To explore the Dragos Year in Review report, which we also addressed in the interview, go to dragos.com/year-in-review. If you'd like to read the executive summary for the 2020 report, go here.


Interested in reading more articles like this? Subscribe to the ISAGCA blog and receive weekly emails with links to the latest thought leadership, tips, research, and other insights from automation cybersecurity leaders.

Jennifer Halsey
Jennifer Halsey
Jennifer Halsey was the director of marketing and communications for ISA.

Related Posts

Securing Industrial Networks Can–And Should–Be Simple

A version of this blog originally appeared on Cisco
Andrew McPhee Jan 24, 2023 5:30:00 AM

Double Extortion Ransomware: What It Is and How to Respond

New attack methods in the cybersecurity landscape continue to emerge in the digitally driven world. One t...
Zac Amos Jan 17, 2023 5:30:00 AM

Defending Remote-Friendly Environments from Cyberattacks

This blog has been repurposed from the December 2022 issue of InTech
Damon Purvis Jan 10, 2023 5:30:00 AM