Resources for more information
US Homeland Security Information Network
https://www.dhs.gov/homeland-security-information-network-hsin
The Homeland Security Information Network (HSIN) is the Department of Homeland Security's official system for the trusted sharing of Sensitive But Unclassified information between federal, state, local, territorial, tribal, international and private sector partners. Mission operators use HSIN to access Homeland Security data, send requests securely between agencies, manage operations, coordinate planned event safety and security, respond to incidents and share the information they need to fulfill their missions and help keep their communities safe.
US Cybersecurity & Infrastructure Security Agency
The US government has identified 16 critical infrastructure sectors whose assets, systems and networks are critical to national security. If you work in one of these 16 critical infrastructure sectors, you can use these sector-specific resources.
UK National Cyber Security Centre
https://www.ncsc.gov.uk/section/advice-guidance/all-topics
The UK National Cyber Security Centre has put together a broad list of cybersecurity-related topics ranging from access control and asset management to vulnerabilities.
EU Agency for Cyber Security
ENISA contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies and helps Europe prepare for the cyber challenges of tomorrow.
Business Continuity Planning Suite
https://www.ready.gov/business-continuity-planning-suite
If you need more help getting your business or organization prepared, ready.gov has business continuity resources and tools that you can use. The Suite is scalable for optimal use by organizations of any size and consists of a business continuity plan (BCP) training, automated BCP and disaster recovery plan (DRP) generators and a self-directed exercise for testing an implemented BCP. Businesses can utilize this solution to maintain normal operations and provide resilience during a disruption.
IFMA Deep Dive: Digitize Your FM Operations | October 10, 2023 | Boston, MA, USA
New technologies provide little value unless an organization can develop new capabilities. But where do you start? Learn from the industry's leading experts on how you can make your next operational technology purchase a success at IFMA's Deep Dive: Digitize Your FM Operations. Those who register for IFMA’s Oct. 10 Deep Dive receive a package of facility digitization resources, including a free copy of IFMA’s FM Guide to Procuring Technology AND automatic enrollment in IFMA's 5-part Digitization eLearning series covering Assets, Processes, People, Technology and Sustainability – a US$495 value. Register today! Seating is limited to only 100 attendees.
ISO 27001 Information Security Management System (ISMS) Provides a systematic approach for organizations to establish, implement, monitor, maintain, and improve information security within their operations. The standard outlines a comprehensive framework that helps organizations identify and manage security risks, safeguard sensitive information, and ensure the confidentiality, integrity, and availability of data. ISO 27001 encompasses a set of controls and guidelines that assist organizations in effectively managing their information security processes and adapting to evolving security threats and challenges. Compliance with ISO 27001 demonstrates an organization's commitment to maintaining robust information security practices and fostering a secure operating environment.
ISA 62443 Formally known as ISA/IEC 62443, is an internationally recognized series of standards developed by the International Society of Automation (ISA) and the International Electrotechnical Commission (IEC). This series of standards addresses the cybersecurity of industrial automation and control systems (IACS), commonly referred to as Operational Technology (OT) systems. ISA 62443 provides a comprehensive framework for implementing cybersecurity measures to safeguard critical infrastructure and industrial processes from cyber threats and attacks. It includes guidelines for identifying vulnerabilities, assessing risks, implementing protective measures, and continuously monitoring and improving the cybersecurity posture of IACS environments. ISA 62443 is designed to address the unique challenges and requirements of industrial control systems, ensuring their resilience and security in the face of evolving cyber risks.