Assessing risk and trustworthiness

Governance activities that secure edge, backend, and networking components and data at rest and in motion are usually the domain of security specialists in IT. Relevant legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties, must be understood, so IT will often partner with company lawyers having a background in securing data in an organization. Many begin by researching standards, such as those published by the International Society of Automation (ISA), Information Systems Audit and Control Association (ISACA)'s Control Objectives for Information and Related Technologies (COBIT), the International Organization for Standardization and International Electrotechnical ...

Get Architecting the Industrial Internet now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.