Data flow is no longer hierarchical

Data flow is no longer hierarchical Can industrial edge computing fit into the Purdue model? edgecomputing, iiot, SCADA, cloudscada, industrialautomation, […]

IT-OT collaboration needs context and increased visibility –

IT-OT collaboration needs context and increased visibility – Information technology (IT) and operational technology (OT) are continuing the process of […]

Introduce analytics best practices into industrial environments

Introduce analytics best practices into industrial environments -Put analytics in the hands of the process experts who understand the data […]

Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation

Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation

Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology

Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT

Cybersecurity Capability Maturity Model (C2M2) Program

Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems