Segmentados Administración sistemas y redes TI

Contenido Segmentados Administración sistemas y redes TI

En esta sección se ofrecen contenidos de interés para los profesionales que conocen y auditan el cumplimiento legal y normativo en materia de ciberseguridad, la gestión de riesgos, la gestión y cumplimiento de políticas internas, o se encargan de la formación interna en ciberseguridad.

The value of commitment indicators in industry

Posted on 08/03/2018, by
INCIBE (INCIBE)
Cover commitment in the industry
In recent years, indicators of compromise have become the best way of exchanging information when it comes to managing an incident. But, do we really know how to manage an indicator of compromise? The aim of an indicator of compromise is to map the information that is received or extracted during the analysis of an incident. This is done in such a way that it can be reused by other investigators or affected people, in order to discover the same evidence in their systems and to be able to determine if they have been compromised or not.
Etiquetas

Management of Patches in Control Systems

Posted on 22/02/2018, by
INCIBE (INCIBE)
Patches in Control Systems
The problems originating from the application of patches in an industrial setting have consequently led to them being rejected by the operators. For years they were practically abandoned, but thanks to the support from security companies and IT departments they are now receiving their due credit.
Etiquetas

How to Evaluate my Cybersecurity Capacities According to C4V

Posted on 03/11/2017, by
INCIBE (INCIBE)
How to Evaluate
After having analysed the "why" behind the cybersecurity capacities evaluation model in the first entry dedicated to the C4V model and after having explained how to carry out an appropriate management of risks in the value chain in the second edition, this third edition is dedicated to explaining how to carry out an evaluation of ourselves.

What is the cyber security level of my value chain?

Posted on 30/03/2017, by
INCIBE (INCIBE)
What is the cyber security level of my value chain?
As explained in the first post of this series dedicated to the C4V model, the cyber security level of outsourced services is key to assess the cyber security capabilities of any organisation: It is no use increasing the cyber security levels of an organisation if their suppliers’ levels are not as high, because -it goes without saying that- "security is as strong as its weakest link".

Managing Provider Risk as a Priority

Posted on 09/03/2017, by
INCIBE (INCIBE)
Managing Provider Risk as a Priority
The outsourcing of processes is not something we can consider new. In fact, the contrary is true. And in particular, in terms of how it applies to ICT (Information and Communication Technology), it is common for at least part of our systems to be accessed by third parties or managed directly by third parties.

IEC 62443: Evolution of the ISA 99

Posted on 25/08/2015, by
INCIBE (INCIBE)
IEC 62443
Control system standards are being updated in order to support and regulate emerging features in these environments. One of the most consulted standards and used as an example in industrial control systems, the ISA99, has also evolved into the IEC 62443 thanks to the International Electrotechnical Commission.