security policy

Contenido security policy

Blog posted on 03/11/2017

After having analysed the "why" behind the cybersecurity capacities evaluation model in the first entry dedicated to the C4V model and after having explained how to carry out an appropriate management of risks in the value chain in the second edition, this third edition is dedicated to explaining how to carry out an evaluation of ourselves.

Blog posted on 30/03/2017

As explained in the first post of this series dedicated to the C4V model, the cyber security level of outsourced services is key to assess the cyber security capabilities of any organisation: It is no use increasing the cyber security levels of an organisation if their suppliers’ levels are not as high, because -it goes without saying that- "security is as strong as its weakest link".

Blog posted on 09/03/2017

The outsourcing of processes is not something we can consider new. In fact, the contrary is true. And in particular, in terms of how it applies to ICT (Information and Communication Technology), it is common for at least part of our systems to be accessed by third parties or managed directly by third parties.

Blog posted on 25/08/2015

Control system standards are being updated in order to support and regulate emerging features in these environments. One of the most consulted standards and used as an example in industrial control systems, the ISA99, has also evolved into the IEC 62443 thanks to the International Electrotechnical Commission.