Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Securing Industry 4.0

As we head into the Industry 4.0 era—where connected Internet of Things (IoT) devices and automation...
David Nosibor May 10, 2022 5:30:00 AM

Q&A: The Global Threat Landscape Report by FortiGuard Labs

The following is an interview with Derek Manky, Chief Security Strategist & VP Global Threat Int...
Steven Aliano May 3, 2022 5:30:00 AM

OT Security Dozen Part 1: A Year of OT/ICS Cybersecurity Assessments

This is Part 1 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal Apr 26, 2022 5:30:00 AM

Understanding Railway Cybersecurity

The railway industry is increasingly viewed as a viable target for cybercriminals. Signaling systems...
Nikhil Kapoor Apr 19, 2022 5:30:00 AM

ISA Launches New Microlearning Modules for CISOs

As a senior-level executive, the chief information security officer (CISO) plays a pivotal role in e...
Steven Aliano Apr 14, 2022 5:30:00 AM

Why Your Business Needs a Bespoke Security Strategy

Business security is an important issue and CCTV security systems can play a vital role in preventin...
Logan Bell Apr 12, 2022 5:30:00 AM

MSDR3: Monitor, Security, Data Retention, Retrieval and Redundancy

A Multi-Faceted Approach to Reliable Collection and Handling of Supervisory Control and Data Acquisi...
Daniel Williams Apr 5, 2022 5:30:00 AM

Using Risk Analysis to Optimize OT SOC Operations

Here’s a scenario that may sound all too familiar: The chief executive officer (CEO) catches you in ...
Ilan Barda Mar 29, 2022 5:30:00 AM

OT Security Dozen: Series on Building an OT/ICS Cybersecurity Program

Over next couple of weeks and months in 2022, I am excited to be sharing some experience and insight...
Muhammad Yousuf Faisal Mar 22, 2022 5:30:00 AM

Excerpt: SBoM is Crucial in Software Development

The following is an excerpt of the recently published ISS Source article, "SBoM Is Crucial In Softwa...
Cassie Crossley Mar 15, 2022 5:30:00 AM

    Related Posts