Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

Spanish Industrial Cybersecurity Roadmap 2013-2018

This document aims to be the first piece of the foundations on which to build a culture of Industrial Cybersecurity aimed at improving the security of industrial facilities with application in Spain, and that can be easily transferred to all of Latin America.

This document is available for free on our knowledge platform after registering as Basic Member
EN
01/03/2014
0€

Title

Industrial CRA Position Paper (Multisectoral)

24/11/2025

The new Industrial CRA Position Paper from the Industrial Cybersecurity Center highlights a critical need: adapting the European Cyber Resilience Regulation to the reality of OT environments. Critical infrastructures, legacy systems, decades-long life cycles, and the absolute priority of availability make it impossible to apply the CRA as currently designed. The document proposes a multisectoral […]

Pocket Guide – Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities

22/10/2025

This document, titled “Pocket Guide: Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities,” developed by the Industrial Cybersecurity Center (CCI), provides a structured set of questions designed to help organizations assess the level of maturity and commitment to cybersecurity among their industrial suppliers.

10 Best IT Security Practices Adapted to the OT Environment

18/03/2025

This pocket guide will help you enhance security in industrial environments (OT) without compromising system stability or availability. By adapting IT best practices, it provides strategies for access control, network segmentation, data encryption, and secure device management, minimizing risks while ensuring operational continuity.