Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

Roadmap of Industrial Cybersecurity in Spain 2019-2020

Six years ago, the Center for Industrial Cybersecurity published the first Road Map of Industrial Cybersecurity in Spain 2013-2018. Now, as a continuation, a new 2019-2020 roadmap has been published in which the opinion and needs of a large part of the main players in the industry have been taken into account in a scenario that has changed and evolved technologically, as well as their risks.

You can purchase this document on our NGLibrary
Español
02/12/2019
Gratuito

Title

Industrial CRA Position Paper (Multisectoral)

24/11/2025

The new Industrial CRA Position Paper from the Industrial Cybersecurity Center highlights a critical need: adapting the European Cyber Resilience Regulation to the reality of OT environments. Critical infrastructures, legacy systems, decades-long life cycles, and the absolute priority of availability make it impossible to apply the CRA as currently designed. The document proposes a multisectoral […]

Pocket Guide – Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities

22/10/2025

This document, titled “Pocket Guide: Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities,” developed by the Industrial Cybersecurity Center (CCI), provides a structured set of questions designed to help organizations assess the level of maturity and commitment to cybersecurity among their industrial suppliers.

10 Best IT Security Practices Adapted to the OT Environment

18/03/2025

This pocket guide will help you enhance security in industrial environments (OT) without compromising system stability or availability. By adapting IT best practices, it provides strategies for access control, network segmentation, data encryption, and secure device management, minimizing risks while ensuring operational continuity.