Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

State of Industrial Cybersecurity in Spain. Edition 2016

978-84-945412-2-3

This third edition includes the results and conclusions of the study carried out throughout the 2015/16 financial year, with the collaboration of CERTSI_CERT of Security and Industry of the Ministry of the Interior through the CNPIC and the Ministry of Industry, Energy and Tourism through INCIBE.

You can purchase this document on our NGLibrary
ES
01/10/2016
250€

Title

Industrial CRA Position Paper (Multisectoral)

24/11/2025

The new Industrial CRA Position Paper from the Industrial Cybersecurity Center highlights a critical need: adapting the European Cyber Resilience Regulation to the reality of OT environments. Critical infrastructures, legacy systems, decades-long life cycles, and the absolute priority of availability make it impossible to apply the CRA as currently designed. The document proposes a multisectoral […]

Pocket Guide – Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities

22/10/2025

This document, titled “Pocket Guide: Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities,” developed by the Industrial Cybersecurity Center (CCI), provides a structured set of questions designed to help organizations assess the level of maturity and commitment to cybersecurity among their industrial suppliers.

10 Best IT Security Practices Adapted to the OT Environment

18/03/2025

This pocket guide will help you enhance security in industrial environments (OT) without compromising system stability or availability. By adapting IT best practices, it provides strategies for access control, network segmentation, data encryption, and secure device management, minimizing risks while ensuring operational continuity.