Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

Why IT and Hybrid SOCs should not be used to protect industrial networks

Today, hybrid Security Operations Centers (SOC) are starting to appear in the market; that is, those in which IT and OT cybersecurity professionals work together to manage the security of OT networks.This type of hybrid management poses high risks to the operational continuity of OT networks.

This document in the “CCI Notebooks – Issue 6 series” written by the CCI coordinator in Brazil, Marcelo Branquinho, provides an in-depth explanation of the various aspects of operational network cybersecurity management to demonstrate why it is not recommended to use IT and Hybrid SOCs to protect industrial networks.

The document is available in Spanish, English and Portuguese.

 

You can purchase this document on our NGLibrary
25/11/2021

Title

Pocket Guide – NIS2 for the Governing Body

11/06/2024

CCI launches this guide with the objective of making the Management Body of an industrial organization aware of the key aspects of the NIS2 in a concise and practical way for its implementation.

Pocket Guide – Cybersecurity in the combined use of IIoT and Industrial Cloud

26/06/2024

CCI launches this pocket guide to cybersecurity in IIoT and Industrial Cloud where you will quickly find: The combined use of IIoT and Industrial Cloud Risks in the combined use of IIoT and Industrial Cloud Three IIoT and Cloud Industrial security principles 7 tips to mitigate risks in these environments Additionally, the guide includes some […]

Pocket Guide: Reducing risks incurred by OT cybersecurity controls

18/09/2023

Pocket guide, which addresses the most common risks linked to the seven main cybersecurity measures in automation and industrial control environments. This analysis will allow an understanding of the potential threats to which we are exposed and, in turn, will facilitate the implementation of effective strategies to protect critical systems in these operating environments.