Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

First study on the state of industrial cybersecurity in utilities companies in the United States

978-84-121149-8-0

This document, published in English, presents the results of the study carried out on 55 utility managers in the United States. It provides an interpretation of the collected data based on the knowledge and experience of its editors.

You can purchase this document on our NGLibrary
English
06/07/2020
Free

Title

Industrial CRA Position Paper (Multisectoral)

24/11/2025

The new Industrial CRA Position Paper from the Industrial Cybersecurity Center highlights a critical need: adapting the European Cyber Resilience Regulation to the reality of OT environments. Critical infrastructures, legacy systems, decades-long life cycles, and the absolute priority of availability make it impossible to apply the CRA as currently designed. The document proposes a multisectoral […]

Pocket Guide – Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities

22/10/2025

This document, titled “Pocket Guide: Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities,” developed by the Industrial Cybersecurity Center (CCI), provides a structured set of questions designed to help organizations assess the level of maturity and commitment to cybersecurity among their industrial suppliers.

10 Best IT Security Practices Adapted to the OT Environment

18/03/2025

This pocket guide will help you enhance security in industrial environments (OT) without compromising system stability or availability. By adapting IT best practices, it provides strategies for access control, network segmentation, data encryption, and secure device management, minimizing risks while ensuring operational continuity.