Solicitar documento

Puede adquirir el documento solicitándolo a o registrándose como miembro con acceso a entregables.

Document request

If you are interested in this document, you can ask for it at or register freely in our platform as a member able to access to deliveries.

Publication of the new Good Governance and Compliance series

The risk matrix presented in the first document must be prepared by each organization based on its own circumstances and structure, because this is the way to adopt prevention measures more efficiently, applying economic and human resources in the right measure to each risk based on its importance and probability of materialization.

The catalog of crimes that must be analyzed will be made up of those that may entail corporate criminal responsibility according to the Penal Code (not all of them).

Once the use case scenario has been presented in the second document, the applicable criminal Compliance crimes are identified, specifically considering technological crimes and including examples of possible crimes.

These documents are available to active CCI subscription members on the knowledge platform

The document can also be purchased by requesting it from 

You can purchase this document by mail at


Pocket Guide – NIS2 for the Governing Body


CCI launches this guide with the objective of making the Management Body of an industrial organization aware of the key aspects of the NIS2 in a concise and practical way for its implementation.

Pocket Guide – Cybersecurity in the combined use of IIoT and Industrial Cloud


CCI launches this pocket guide to cybersecurity in IIoT and Industrial Cloud where you will quickly find: The combined use of IIoT and Industrial Cloud Risks in the combined use of IIoT and Industrial Cloud Three IIoT and Cloud Industrial security principles 7 tips to mitigate risks in these environments Additionally, the guide includes some […]

Pocket Guide: Reducing risks incurred by OT cybersecurity controls


Pocket guide, which addresses the most common risks linked to the seven main cybersecurity measures in automation and industrial control environments. This analysis will allow an understanding of the potential threats to which we are exposed and, in turn, will facilitate the implementation of effective strategies to protect critical systems in these operating environments.