LoginJoin
You must be an ISA member to view the Connectivity and Cybersecurity topics in this community. Please login or join to view and contribute to these conversations.
See a preview of all conversations below.
Randy, Just checking if I am eligible to contribute to your survey. I am not currently a licensed control system engineer, but was a certified automation professional for many years (having passed ISA's CAP exam) and also contributed for a few years after becoming a CAP to ...
@Jorge Jimenez Plants in other industries are now also implementing data diodes with "data provider" app and "edge environment" server to copy the data from their DCS in real-time. That is, they have a real time replica of the DCS data. People on the corporate network or ...
Hello. My name is Eugene Khalim and I'm a Control Systems Engineering Manager for Barry-Wehmiller Design Group's San Francisco office. I graduated from The University of Houston in 2006 with a Bachelor of Science in Mechanical Engineering. I've worked in control system engineering ...
Hi Amit, Thank you for quick response. Such representation of transformation is still confusing for me, but following my question - what are definitions for components inside the new 2-4? On the top - 8 Security Program Elements. What's the name for those 16 components inside ...
Hi @Vilas Mohanrao Desai , your comment makes sense to me. I do think a machine can be considered a system, but in this OT security 62443 discussion, the system is referring to the ICS composed by all the cyber assets inside the machine but not the whole machine, you are right. ...
The International Society of AutomationPO Box 12277 Research Triangle Park, NC 27709E-Mail: info@isa.orgPhone: (919) 549-8411Fax: (919) 549-8288
© International Society of Automation