O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Assessing risk and trustworthiness

Governance activities that secure edge, backend, and networking components and data at rest and in motion are usually the domain of security specialists in IT. Relevant legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties, must be understood, so IT will often partner with company lawyers having a background in securing data in an organization. Many begin by researching standards, such as those published by the International Society of Automation (ISA), Information Systems Audit and Control Association (ISACA)'s Control Objectives for Information and Related Technologies (COBIT), the International Organization for Standardization and International Electrotechnical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required