Industrial Control Systems
This working group aims to develop security guidance to encourage cloud providers, asset owners and device manufacturers towards adopting best practices to secure industrial control systems.Sign-Up
Working Group Leadership
Mr. Washington’s experience spans over 35 years in information technology and cybersecurity, He began his career at the Johns Hopkins Applied Physics Laboratory and has continuously progressive experience working developing architectures for banking and financial organizations such as the Federal Reserve and collaborating as a subject matter expert for the US Department of Homeland Security Federal Law Enforcement Training Center.
William is co-founder of Indonesia CIO network with over 25+ years of ICT background and extensive Business-Technology experience and exposure in IT infrastructure & Architecture design, Converged infrastructure solutions, Cloud Computing, Information Security, Data protection & security, Cloud Security, Disaster recovery/Business Continuity Management, Risk Management and Business-IT compliance.
Professionally, William is a professio...
Sabri is the ICS group cybersecurity officer a French multinational corporation that produce a variety of construction and high-performance materials. He is in charge of developing and maintaining the cybersecurity strategy, building and coordinate a cross-country and cross-business cybersecurity governance, supporting business initiatives, including strategic Smart Manufacturing and IIoT projects with a large shift to cloud services, defin...
|Publications in Review||Open Until|
|Third-Party Vendor Risk Management||Jun 13, 2022|
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.
Third-Party Vendor Risk Management
Open Until: 06/13/2022
The increased use of third-party vendors for applications and data processing services is a business model that is likely t...