Cybersecurity requirements in design
Cybersecurity requirements in design | Service/Solution | Description | Supplier | Geographical scope |
---|---|---|---|---|
All | ||||
Cyber suspicion Detail |
Cybersecurity board game, where each player will assume the role of a Cybersecurity researcher who must use his powers of deduction to discover where, how, why and who has caused the Cybersecurity incident that has paralyzed an industrial plant. |
CCI Contact |
Global | |
T01. Practical workshop to assess maturity in the industrial cybersecurity process Detail |
The objective of this workshop is to provide professionals from industrial organizations, engineering, IT integrators and OT with the necessary knowledge to determine the degree of maturity in cybersecurity of an industrial organization with respect to the organization’s requirements, identifying the main gaps in security, as well as establishing comparisons between different organizations regarding their maturity in Industrial Cybersecurity capabilities, allowing risk management to evolve to levels of excellence. All this thanks to the C2M2-based maturity assessment tool. |
CCI Contact |
Global | |
+ View more about All | ||||
All | ||||
Cyber suspicion Detail |
Cybersecurity board game, where each player will assume the role of a Cybersecurity researcher who must use his powers of deduction to discover where, how, why and who has caused the Cybersecurity incident that has paralyzed an industrial plant. |
CCI Contact |
Global | |
T01. Practical workshop to assess maturity in the industrial cybersecurity process Detail |
The objective of this workshop is to provide professionals from industrial organizations, engineering, IT integrators and OT with the necessary knowledge to determine the degree of maturity in cybersecurity of an industrial organization with respect to the organization’s requirements, identifying the main gaps in security, as well as establishing comparisons between different organizations regarding their maturity in Industrial Cybersecurity capabilities, allowing risk management to evolve to levels of excellence. All this thanks to the C2M2-based maturity assessment tool. |
CCI Contact |
Global | |
+ View more about All | ||||
All | ||||
Cyber suspicion Detail |
Cybersecurity board game, where each player will assume the role of a Cybersecurity researcher who must use his powers of deduction to discover where, how, why and who has caused the Cybersecurity incident that has paralyzed an industrial plant. |
CCI Contact |
Global | |
T01. Practical workshop to assess maturity in the industrial cybersecurity process Detail |
The objective of this workshop is to provide professionals from industrial organizations, engineering, IT integrators and OT with the necessary knowledge to determine the degree of maturity in cybersecurity of an industrial organization with respect to the organization’s requirements, identifying the main gaps in security, as well as establishing comparisons between different organizations regarding their maturity in Industrial Cybersecurity capabilities, allowing risk management to evolve to levels of excellence. All this thanks to the C2M2-based maturity assessment tool. |
CCI Contact |
Global | |
+ View more about All | ||||
All | ||||
Cyber suspicion Detail |
Cybersecurity board game, where each player will assume the role of a Cybersecurity researcher who must use his powers of deduction to discover where, how, why and who has caused the Cybersecurity incident that has paralyzed an industrial plant. |
CCI Contact |
Global | |
T01. Practical workshop to assess maturity in the industrial cybersecurity process Detail |
The objective of this workshop is to provide professionals from industrial organizations, engineering, IT integrators and OT with the necessary knowledge to determine the degree of maturity in cybersecurity of an industrial organization with respect to the organization’s requirements, identifying the main gaps in security, as well as establishing comparisons between different organizations regarding their maturity in Industrial Cybersecurity capabilities, allowing risk management to evolve to levels of excellence. All this thanks to the C2M2-based maturity assessment tool. |
CCI Contact |
Global | |
+ View more about All |