Welcome to ISA Connect

Connectivity and Cybersecurity Topic Conversations

Are you ready to get the conversation going? All you need to do is log in to browse through the latest posts on Connectivity and Cybersecurity topics or join the discussion and network with members all over the world! 

LoginJoin

You must be an ISA member to view the Connectivity and Cybersecurity topics in this community. Please login or join to view and contribute to these conversations.

See a preview of all conversations below.

  • Randy, Just checking if I am eligible to contribute to your survey. I am not currently a licensed control system engineer, but was a certified automation professional for many years (having passed ISA's CAP exam) and also contributed for a few years after becoming a CAP to ...

  • @Jorge Jimenez Plants in other industries are now also implementing data diodes with "data provider" app and "edge environment" server to copy the data from their DCS in real-time. That is, they have a real time replica of the DCS data. People on the corporate network or ...

  • Hello. My name is Eugene Khalim and I'm a Control Systems Engineering Manager for Barry-Wehmiller Design Group's San Francisco office. I graduated from The University of Houston in 2006 with a Bachelor of Science in Mechanical Engineering. I've worked in control system engineering ...

  • Hi Amit, Thank you for quick response. Such representation of transformation is still confusing for me, but following my question - what are definitions for components inside the new 2-4? On the top - 8 Security Program Elements. What's the name for those 16 components inside ...

  • Hi @Vilas Mohanrao Desai , your comment makes sense to me. I do think a machine can be considered a system, but in this OT security 62443 discussion, the system is referring to the ICS composed by all the cyber assets inside the machine but not the whole machine, you are right. ...

News from Automation.com