Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

More Than 17 Million Control System Cyber Incidents are Hidden in Plain Sight

Control system cyber incidents are more common and dangerous than most security specialists and indu...
Joe Weiss Feb 28, 2023 5:30:00 AM

OT Security Dozen Part 4: IDS/AD Solutions

This is Part 4 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal Jan 31, 2023 5:30:00 AM

Securing Industrial Networks Can–And Should–Be Simple

A version of this blog originally appeared on Cisco
Andrew McPhee Jan 24, 2023 5:30:00 AM

Defending Remote-Friendly Environments from Cyberattacks

This blog has been repurposed from the December 2022 issue of InTech
Damon Purvis Jan 10, 2023 5:30:00 AM

What Do You Do When You Can’t Patch Your OT?

Operational technology (OT) supports your company’s operations where it really matters, often doing ...
Stephan Venter Dec 27, 2022 5:30:00 AM

OT & IoT Cybersecurity: Marriage of Digital Factories & Cybersecurity

This blog has been repurposed from the August 2022 edition of InTech.
Contributing Authors Nov 22, 2022 5:30:00 AM

OT Security Dozen Part 2: OT/ICS Cybersecurity Policy & Governance

This is Part 2 of The OT Security Dozen – a 12-part series on building an OT/ICS cybersecurity progr...
Muhammad Yousuf Faisal May 31, 2022 5:30:00 AM

Why Network Discovery is Critical in the ICS/IACS Environment

Securing operational technology (OT) networks requires a great deal of thought when designing and im...
Achal Lekhi May 17, 2022 5:30:00 AM

Using Risk Analysis to Optimize OT SOC Operations

Here’s a scenario that may sound all too familiar: The chief executive officer (CEO) catches you in ...
Ilan Barda Mar 29, 2022 5:30:00 AM

    Related Posts