{"id":61404,"date":"2025-09-26T11:20:08","date_gmt":"2025-09-26T11:20:08","guid":{"rendered":"https:\/\/becolve.com\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/"},"modified":"2025-09-26T11:20:08","modified_gmt":"2025-09-26T11:20:08","slug":"the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy","status":"publish","type":"blog","link":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/","title":{"rendered":"The Industry is Beginning to Structure its Own Cybersecurity Strategy."},"content":{"rendered":"<p>The deployment of security programs in IT environments is a common practice carried out in most organizations. The same is not true for industrial or OT (Operation Technology) environments, where the lack of standards and regulations makes the introduction and development of specific security programs much more costly. <\/p>\n<p>In any case, it is true that there is currently abundant and varied documentation on how to deploy this type of program. Among them, we highlight the document \u201c<a title=\"Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies\" href=\"http:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/recommended_practices\/Defense_in_Depth_Oct09.pdf\" target=\"_blank\" rel=\"noopener\">Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies<\/a>\u201d developed by the ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) of the DHS (Department of Homeland Security) of the US government. <\/p>\n<p>This document proposes that the deployment of a defense-in-depth strategy in industrial environments should consider the following six perspectives:<\/p>\n<ol>\n<li>Physical security: implement surveillance mechanisms in the factory, CCTV, secure access to data processing centers.<\/li>\n<li>Perimeter security: deploy devices that allow segmenting, protecting and\/or filtering the information handled on the networks.<\/li>\n<li>The development of policies and procedures: that help improve the effectiveness of the installed countermeasures or help to perform change management and backup automatically.<\/li>\n<li>Training and awareness actions in the field of industrial cybersecurity.<\/li>\n<li>Network event monitoring: so that you can respond in real time to possible unexpected events, analyze the logs generated, or perform forensic analysis.<\/li>\n<li>The acquisition of devices and technologies that incorporate security elements or that help create secure environments such as:\n<ul>\n<li>Field devices (RTU or PLC) that are accessible through secure protocols such as SSL, HTTPS, that use the IEEE802-1X standard for secure authentication at wireless access points or that include an integrated firewall.<\/li>\n<li>Industrial protocols created with security layers, such as OPC UA or DNP3 SECURE.<\/li>\n<li>SCADA or HMI systems that have been developed with secure programming methodologies, that allow them to be deployed with different levels of redundancy (communication, application, historical data, visualization) or can be virtualized to take advantage of the advantages provided by this technology.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Fernando Sevillano<br \/>\nBusiness Development Consultant at Logitek<\/p>\n<p>In collaboration with: Cristina Jim\u00e9nez<br \/>\n(Marketing Department at Logitek)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We highlight the document \u201cRecommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies\u201d developed by the ICS-CERT of the DHS of the US government.<\/p>\n","protected":false},"author":31,"featured_media":61405,"menu_order":0,"template":"","categories":[1371],"tags":[],"arquitectura":[1839],"area":[],"sector":[],"experto":[1396],"weborigen":[157],"productos-tax":[],"soluciones-tax":[],"marcas-tax":[],"coauthors":[],"class_list":["post-61404","blog","type-blog","status-publish","has-post-thumbnail","hentry","category-cybersecurity","arquitectura-industrial-cybersecurity","experto-industrial-cybersecurity-total-availability","weborigen-ciberseguridadlogitek-com"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The industry is structuring its own cybersecurity strategy.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The industry is structuring its own cybersecurity strategy.\" \/>\n<meta property=\"og:description\" content=\"We highlight the document \u201cRecommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies\u201d developed by the ICS-CERT of the DHS of the US government.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Becolve Digital\" \/>\n<meta property=\"og:image\" content=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"795\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Logitek_es\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Becolve Digital\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/\",\"url\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/\",\"name\":\"The industry is structuring its own cybersecurity strategy.\",\"isPartOf\":{\"@id\":\"https:\/\/becolve.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg\",\"datePublished\":\"2025-09-26T11:20:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#primaryimage\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg\",\"width\":795,\"height\":440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/becolve.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog Items\",\"item\":\"https:\/\/becolve.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Industry is Beginning to Structure its Own Cybersecurity Strategy.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/becolve.com\/en\/#website\",\"url\":\"https:\/\/becolve.com\/en\/\",\"name\":\"Becolve Digital\",\"description\":\"Transformaci\u00f3n digital en industria e infraestructuras\",\"publisher\":{\"@id\":\"https:\/\/becolve.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/becolve.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/becolve.com\/en\/#organization\",\"name\":\"Becolve Digital\",\"url\":\"https:\/\/becolve.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"width\":200,\"height\":64,\"caption\":\"Becolve Digital\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Logitek_es\",\"https:\/\/www.linkedin.com\/company\/becolve-digital\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The industry is structuring its own cybersecurity strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"The industry is structuring its own cybersecurity strategy.","og_description":"We highlight the document \u201cRecommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies\u201d developed by the ICS-CERT of the DHS of the US government.","og_url":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/","og_site_name":"Becolve Digital","og_image":[{"width":795,"height":440,"url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Logitek_es","twitter_misc":{"Est. reading time":"2 minutes","Written by":"Becolve Digital"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/","url":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/","name":"The industry is structuring its own cybersecurity strategy.","isPartOf":{"@id":"https:\/\/becolve.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#primaryimage"},"image":{"@id":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg","datePublished":"2025-09-26T11:20:08+00:00","breadcrumb":{"@id":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#primaryimage","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/estrategia-ciberseguridad.jpg","width":795,"height":440},{"@type":"BreadcrumbList","@id":"https:\/\/becolve.com\/en\/blog\/the-industry-is-beginning-to-structure-its-own-cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/becolve.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog Items","item":"https:\/\/becolve.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"The Industry is Beginning to Structure its Own Cybersecurity Strategy."}]},{"@type":"WebSite","@id":"https:\/\/becolve.com\/en\/#website","url":"https:\/\/becolve.com\/en\/","name":"Becolve Digital","description":"Transformaci\u00f3n digital en industria e infraestructuras","publisher":{"@id":"https:\/\/becolve.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/becolve.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/becolve.com\/en\/#organization","name":"Becolve Digital","url":"https:\/\/becolve.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","width":200,"height":64,"caption":"Becolve Digital"},"image":{"@id":"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Logitek_es","https:\/\/www.linkedin.com\/company\/becolve-digital\/"]}]}},"_links":{"self":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/blog\/61404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/blog\/61404\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/media\/61405"}],"wp:attachment":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/media?parent=61404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/categories?post=61404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/tags?post=61404"},{"taxonomy":"arquitectura","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/arquitectura?post=61404"},{"taxonomy":"area","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/area?post=61404"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/sector?post=61404"},{"taxonomy":"experto","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/experto?post=61404"},{"taxonomy":"weborigen","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/weborigen?post=61404"},{"taxonomy":"productos-tax","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/productos-tax?post=61404"},{"taxonomy":"soluciones-tax","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/soluciones-tax?post=61404"},{"taxonomy":"marcas-tax","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/marcas-tax?post=61404"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/coauthors?post=61404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}