Shop

Artificial Intelligence Notice: ISA prohibits the entry of any ISA intellectual property (“ISA IP”), including standards, publications, training or other materials into any form of Artificial Intelligence (AI) tools, such as ChatGPT. Additionally, creating derivatives of ISA IP using AI is also prohibited without express written permission from ISA’s CEO. In the case of such use, ISA will suspend a licensee’s access to ISA IP, and further legal action will be considered. Please review ISA's policies for Use of AI Tools, Intellectual Property and Terms and Conditions for further information.

Important Notice: Print books are temporarily unavailable. As of 12 August 2025, print books are no longer available for purchase on isa.org, but beginning 1 January 2026, they will be available for purchase through our publishing partner, Wiley. Kindle and ePub formats are still available via the links on each book's product page on isa.org. Learn More.

ISA MLMs for CISOs
As a chief information security officer working in the industrial automation space, not only do you have to protect data or information, you need to be aware of the various security concerns of an environment that uses technologies to monitor and control physical processes governed by the laws of physics and chemistry. This ISA microlearning module set, titled "IACS Cybersecurity for Chief Information Security Officers (CISOs)," provides insight and understanding around the ISA/IEC 62443 series of standards that will help you work with your automation engineering colleagues to improve the safety, reliability, and performance of the physical processes within your operations.
 

IACS Cybersecurity for Chief Information Security Officers (CISOs)

 

Part 1: What CISOs Need to Know About OT Cybersecurity

Topics

  • Differences between IT and OT systems
  • Industrial cybersecurity terminology
  • How IT and OT should work together, what should be protected in each environment, and the associated risks
  • Consequences of implementing a disjointed cybersecurity program and not having a program
  • Benefits of implementing the ISA/IEC 62443 Series of Standards

Modules

 

Part Two: Cyber Incident Use cases

Topics

  • Consequences of not implementing cybersecurity
  • Why cybersecurity is vital to industries using automation and control processes as well as society as a whole; and why automation and control systems and processes are desirable targets
  • Understand why cybersecurity is vital to industries using automation and control processes as well as society as a whole—automation and control systems and processes are desirable targets
  • Benefits of implementing the ISA/IEC 62443 Series of Standards

Modules