Industrial Control Systems

Latest ResearchJoin Group
Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary
Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary

Download

Join this working group
Industrial Control Systems
Industrial Control Systems with access to the cloud via web-enabled services are where IT (Information Technology) and OT (Operational Technology) converge resulting in an integrated process and information flow that brings with it a more complex architecture.

As Industrial Control Systems (ICS) advance from communicating with networks within the enterprise to interacting externally via IoT platforms and the cloud, the efficiency, effectiveness and scalability, have improved. However, these advances’ create additional complexity and created a larger attack surface which in turn has increased the opportunity for cyber-attacks.

Get started by reading CSA’s glossary for Industrial Control Systems.
The intended audience includes everyone from the board to security staff inside an organization to customers and third-party suppliers including cloud service providers. CSA wanted to help provide a common language by bringing together the terms and definitions in one document.  Ultimately we hope this glossary will help minimize misinterpretation and provide a common ICS and IT/OT language. 

Industrial Control SystemsHigh Performance ComputingInternet of ThingsQuantum-Safe SecurityBlockchain/Distributed Ledger

This working group aims to develop security guidance to encourage cloud providers, asset owners and device manufacturers towards adopting best practices to secure industrial control systems.

Next Meeting

No Meetings Currently Scheduled



Working Group Leadership

Darnell Washington Headshot
Darnell Washington
Darnell Washington

Mr. Washington’s experience spans over 35 years in information technology and cybersecurity, He began his career at the Johns Hopkins Applied Physics Laboratory and has continuously progressive experience working developing architectures for banking and financial organizations such as the Federal Reserve and collaborating as a subject matter expert for the US Department of Homeland Security Federal Law Enforcement Training Center.

Hi...

Read more

William Ho Headshot
William Ho
William Ho

William is co-founder of Indonesia CIO network with over 25+ years of ICT background and extensive Business-Technology experience and exposure in IT infrastructure & Architecture design, Converged infrastructure solutions, Cloud Computing, Information Security, Data protection & security, Cloud Security, Disaster recovery/Business Continuity Management, Risk Management and Business-IT compliance.

Professionally, William is a professio...

Read more

Sabri Khemissa Headshot
Sabri Khemissa
Sabri Khemissa

Sabri is the ICS group cybersecurity officer a French multinational corporation that produce a variety of construction and high-performance materials. He is in charge of developing and maintaining the cybersecurity strategy, building and coordinate a cross-country and cross-business cybersecurity governance, supporting business initiatives, including strategic Smart Manufacturing and IIoT projects with a large shift to cloud services, defin...

Read more

Join this working group

Industrial Control Systems Security

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary

Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary

The Industrial Control Systems (ICS) Security Glossary is a reference document that brings together ICS and IT/OT related terms and definitions. Bringing together the terms and definitions in this document is meant to minimize misinterpretation and provide a common ICS and IT/OT language. A balance has been struck between length of the definitions and understandability with reliance on the reference source as the final arbiter. The goal is to provide a common language to communicate, understand, debate, conclude, and present the results of the ICS WG’s work. The intended audience is everyone from the Board to security staff inside an organization to customers and third-party suppliers including cloud service providers.