The Business Case for Operational Technology Cybersecurity

The Business Case for Operational Technology Cybersecurity

This post was written by Don Dickinson, senior business development manager for water management, Phoenix Contact USA. With the increasing prevalence of high-profile cyberattacks and security breaches, these events may seem unavoidable. The consequences, however, come...
Book Excerpt + Author Q&A: Mission Critical Operations

Book Excerpt + Author Q&A: Mission Critical Operations

This ISA author Q&A was edited by Joel Don, ISA’s community manager. ISA’s new book, Mission Critical Operations Primer, focuses on the components of mission critical operations, including technology, standards, risk management, emergency response,...
Managing the Cybersecurity Threat to Hazardous Process Plants

Managing the Cybersecurity Threat to Hazardous Process Plants

This guest blog post was written by Edward M. Marszal, president and CEO of Kenexis. He is the co-author of two ISA books,Safety Integrity Level Selection and Security PHA Review for Consequence-Based Cybersecurity. Even though cyber threats are not adequately...

Pin It on Pinterest