Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at or register freely in our platform as a member able to access to deliveries.

Publication of the Business Case of Industrial Cybersecurity notebook

Those responsible for industrial cybersecurity must counter threats and plan based on continuous improvement, in line with the continuous technological and other changes that companies face in order to be competitive.

To prepare a project, or rather, to start it, in many occasions it implies substantial changes in the company and / or the need to do a CAPEX. For the latter, internal conformity is needed. And to obtain it, the most widely used means is to submit the project for formal approval through a business case.

There is not normally the figure of an OT cybersecurity manager in industrial organizations, which implies that another role assumes this responsibility, for example, in some organizations the operational security manager or the physical security manager assumes this responsibility, in other organizations it is the person in charge of operations or the person in charge of communications, although it is the person in charge of information security who is usually in charge of industrial cybersecurity. This situation has been taken into account in the development of this document.

This document is available to active subscription members of CCI at the knowledge platform.

The document can be acquired by requesting it from

You can purchase this document on our NGLibrary


Pocket Guide – NIS2 for the Governing Body


CCI launches this guide with the objective of making the Management Body of an industrial organization aware of the key aspects of the NIS2 in a concise and practical way for its implementation.

Pocket Guide – Cybersecurity in the combined use of IIoT and Industrial Cloud


CCI launches this pocket guide to cybersecurity in IIoT and Industrial Cloud where you will quickly find: The combined use of IIoT and Industrial Cloud Risks in the combined use of IIoT and Industrial Cloud Three IIoT and Cloud Industrial security principles 7 tips to mitigate risks in these environments Additionally, the guide includes some […]

Pocket Guide: Reducing risks incurred by OT cybersecurity controls


Pocket guide, which addresses the most common risks linked to the seven main cybersecurity measures in automation and industrial control environments. This analysis will allow an understanding of the potential threats to which we are exposed and, in turn, will facilitate the implementation of effective strategies to protect critical systems in these operating environments.