Supply Chain Cyber Security

What is Supply Chain cyber security?

Understand Supply chain cyber security to protect your Industrial Control System against supply chain attacks In this short guide, let us understand Supply Chain cyber security.  This is important to understand to protect your IACS against attacks that can happen via the different components used by your Industrial Control System and your Safety Instrumented System. This topic is covered in the latest version of the Abhisam Certified Industrial Cybersecurity …

Read more

Supply chain attacks can use counterfeit switches

Supply Chain Attacks- ICS Security implications

Supply Chain attacks are something to watch out for In the recently published Abhisam Industrial Cybersecurity Report, we had mentioned supply chain attacks, as something to watch out for in 2024. We never imagined that we would be so right. These supply chain attacks are pretty broad in scope and are not just related to the Industrial Control System devices, such as DCS controllers or  SIS Logic Solvers but …

Read more

Industrial Cybersecurity Trends | What to expect from ICS security in 2021 and beyond?

Abhisam recently published a report on the State of Industrial Cybersecurity in the year 2020 and the road ahead in 2021. The report was compiled by contributions from several different experts from various industry segments, who are individually having at least 25 years of experience in their own domains as well as having  deep knowledge about Industrial Cybersecurity. To understand the basics, please see this basic Industrial Cybersecurity guide …

Read more

ICS cyber security in 2020- and the road ahead in 2021

Update (16 Oct 2020) :We have started receiving contributions/paper submissions for inclusion in this report. If you have not yet sent in your thoughts, please do so at the earliest. We will be publishing this report by end October 2020 or latest by early November 2020. A lot of exciting insights from Industry leaders and professionals will be included. The ICS Cyber security field has seen a lot of …

Read more