Solicitar documento

Puede adquirir el documento solicitándolo a o registrándose como miembro con acceso a entregables.

Document request

If you are interested in this document, you can ask for it at or register freely in our platform as a member able to access to deliveries.

Industrial Cybersecurity Maturity Assessment Tool"


Tool that allows any industrial organization to evaluate its cybersecurity capabilities. Developed based on C2M2 and valid for any type of infrastructure and degree of automation of the organization. The level of exposure is taken into account, in this way an organization with low exposure requires fewer objectives to cover than one with high exposure.

In addition, we encourage you to sign up for the practical workshop that CCI organizes: T01. Workshop Maturity Assessment of the Cybersecurity Process in Industrial Organizations, through which you will be able to acquire the necessary knowledge to determine the degree of maturity in cybersecurity in an industrial organization with respect to the requirements of the organization, identifying the main security gaps, as well how to establish comparisons between different organizations in terms of their maturity in Industrial Cybersecurity capabilities. It is based on this document (which will be delivered at no additional cost as workshop documentation), during which the following topics will be addressed:

  • Maturity models
  • Tool overview
  • Strategy and organization areas
  • Asset, risk and operation areas
  • Configuration and access areas
  • Continuity area
  • Benckmarking. 27 relevant objectives

For further information about the workshop, please visit:

If you prefer a more complete training in which to put this document into practice together with other publications of relevant interest, we encourage you to enroll in the practical course that CCI organizes: C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control Systems).

More information about this Course at:

You can purchase this document by mail at


Pocket Guide – NIS2 for the Governing Body


CCI launches this guide with the objective of making the Management Body of an industrial organization aware of the key aspects of the NIS2 in a concise and practical way for its implementation.

Pocket Guide – Cybersecurity in the combined use of IIoT and Industrial Cloud


CCI launches this pocket guide to cybersecurity in IIoT and Industrial Cloud where you will quickly find: The combined use of IIoT and Industrial Cloud Risks in the combined use of IIoT and Industrial Cloud Three IIoT and Cloud Industrial security principles 7 tips to mitigate risks in these environments Additionally, the guide includes some […]

Pocket Guide: Reducing risks incurred by OT cybersecurity controls


Pocket guide, which addresses the most common risks linked to the seven main cybersecurity measures in automation and industrial control environments. This analysis will allow an understanding of the potential threats to which we are exposed and, in turn, will facilitate the implementation of effective strategies to protect critical systems in these operating environments.