Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

IT and OT Cybersecurity Strategy

"Digital Transformation & Cybersecurity Strategy Premier,"—a high-level overview on both strateg...
Muhammad Yousuf Faisal Oct 3, 2023 8:00:00 AM

xDR in Operational Technology: Approach and Adaption

Operational technology (OT) is the backbone of automation, manufacturing systems and other utilities...
Achal Lekhi Aug 22, 2023 12:31:01 PM

What Do You Do When You Can’t Patch Your OT?

Operational technology (OT) supports your company’s operations where it really matters, often doing ...
Stephan Venter Dec 27, 2022 5:30:00 AM

OT Security Dozen Part 2: OT/ICS Cybersecurity Policy & Governance

This is Part 2 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal May 31, 2022 5:30:00 AM

Using Risk Analysis to Optimize OT SOC Operations

Here’s a scenario that may sound all too familiar: The chief executive officer (CEO) catches you in ...
Ilan Barda Mar 29, 2022 5:30:00 AM

Cybersecurity Preparedness Depends on Procedures and Infrastructure

Ransomware and malware are increasingly targeting industrial operational technology (OT) networks an...
Achilli Sfizzo Neto Dec 21, 2021 5:30:00 AM

Architecture vs. Design

Many Operational Technology (OT) projects start with identifying the requirements and then diving st...
Achal Lekhi Nov 16, 2021 5:30:00 AM

Cyber Threat Intelligence in ICS Sectors: Context is Everything

This blog is the second in a three-part series defining Cyber Threat Intelligence (CTI). The first p...
Dr. Tom Winston Sep 28, 2021 5:30:00 AM

Cybersecurity Incidents Can Be Prevented

Cybersecurity incidents continue to increase in frequency and have greater impacts on the critical i...
Brian Peterson Aug 6, 2021 5:30:00 AM

White Paper Excerpt: Applying ISO/IEC 27001/2 and the ISA/IEC 62443 Series for Operational Technology Environments

Introduction Many organizations (especially very large ones) have established policies and procedure...
Pierre Kobes Jul 20, 2021 5:30:00 AM

    Related Posts