Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

Why are Cyberattacks Shifting to ICS?

Firewalls and two-factor authentication have become the norm when protecting our information technol...
Nahla Davies Feb 14, 2023 5:30:00 AM

Securing Industrial Networks Can–And Should–Be Simple

A version of this blog originally appeared on Cisco
Andrew McPhee Jan 24, 2023 5:30:00 AM

OT Security Dozen Part 3: Network Security Architecture & Segmentation

This is Part 3 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal Oct 4, 2022 5:30:00 AM

Why ICS/OT Infrastructure is Insecure

Overview Industrial control system (ICS)/operational technology (OT) infrastructure security is diff...
Ritesh Srivastava Jul 26, 2022 5:30:00 AM

ICS4ICS Launches First Ever Exercise at S4

The first exercise of Incident Command System for Industrial Control Systems (ICS4ICS) capabilities ...
Brian Peterson Jun 21, 2022 5:30:00 AM

The ICS Periodic Table

Science has come a long way since Aristotle’s theory of air, water, fire, and earth. Just like Arist...
Achal Lekhi Jun 7, 2022 5:30:00 AM

Experience Centers Teach Cybersecurity Best Practices

The adoption of Industry 4.0 technologies is increasing efficiency and profitability across industri...
Luis Narvaez May 24, 2022 5:30:00 AM

Why Network Discovery is Critical in the ICS/IACS Environment

Securing operational technology (OT) networks requires a great deal of thought when designing and im...
Achal Lekhi May 17, 2022 5:30:00 AM

Cybersecurity Using ICS ATT&CK Strategies

Risk assessments and mitigation are commonplace activities in the manufacturing environment, but as ...
Jacob Chapman Feb 1, 2022 5:30:00 AM

Accelerating Cybersecurity Culture Maturity in the Workplace

A Digital, Data-Driven Organization While companies can have an excellent safety culture, cyber thre...
Contributing Authors Jun 29, 2021 5:30:00 AM

    Related Posts