Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

OT/ICS Cybersecurity Voices: A Video Interview with Lesley Carhart

The ISA Global Cybersecurity Alliance (ISAGCA) strives to amplify uniquely talented voices in the field of OT/ICS cybersecurity. We recently sat down with Lesley Carhart, principal incident responder at Dragos (a founding member of ISAGCA). One of the few female-identifying OT/ICS cybersecurity experts in the world, Lesley uses her position to advocate for the importance of protecting industrial control systems and critical infrastructure from cyber threats, as well as the imperative to increase diversity in the field.

Watch the exclusive video interview below:

 

To learn more about Lesley's work and her uniquely personalized approach, you can visit her blog at tisiphone.net. You can also read the blog post on diversity in cybersecurity that she mentions in our conversation. 

To explore the Dragos Year in Review report, which we also addressed in the interview, go to dragos.com/year-in-review. If you'd like to read the executive summary for the 2020 report, go here.


Interested in reading more articles like this? Subscribe to the ISAGCA blog and receive weekly emails with links to the latest thought leadership, tips, research, and other insights from automation cybersecurity leaders.

Jennifer Halsey
Jennifer Halsey
Jennifer Halsey was the director of marketing and communications for ISA.

Related Posts

How to Secure Machine Learning Data

Data security is paramount in machine learning, where knowledge drives innovation and decision-making. Th...
Zac Amos Mar 12, 2024 11:10:47 AM

Fortifying Your Security Arsenal: A Strategic Approach to Safeguarding OT Security Assets from Adversarial Threats

Introduction Despite investing significant budgets and resources in security products and services. The c...
Mohannad AlRasan Mar 5, 2024 9:17:57 AM

Why Collaboration Is Essential for Cybersecurity Teams

Today’s cybersecurity workforce faces seemingly insurmountable workloads and increasing pressure to manag...
Zac Amos Feb 27, 2024 10:40:13 AM