National audienceMany guides, methods, standards, recommendations or regulations deal with industrial risk control on the one hand or cybersecurity of industrial installations on the other. These two subjects interact but the normative and regulatory documents as well as the methodologies implemented have been developed separately. It can therefore be difficult to apply them in a coordinated and efficient way to the same system. This paper compares the approaches and presents the possible implications of cyber threats on the risk assessment of hazardous installations. A general framework to consider cyber security in the risk assessment for people and environment in the process industry is then proposed.De nombreux guides, méthodes, normes,...
International audienceThe migration of modern Industrial Control Systems (ICS) towards information a...
Cybersecurity is a topic that invests the globality of public and private companies as a result of t...
In industrial networks, a cyber-incident can have, as a consequence, the interference with physical ...
National audienceMany guides, methods, standards, recommendations or regulations deal with industria...
International audienceDe nombreux guides, méthodes, normes, recommandations ou réglementations trait...
This paper focuses on cyber risks as an emerging threat to global economic stability. Today, the who...
International audienceSummary In the industry, where the cyber threat awareness is quite new, classi...
Published in FIC Observatory Newsletter of March (available in English and French)Industrial Contro...
La cyber sécurité est une priorité absolue dans l’industrie financière qui cherche à assurer la sécu...
National audienceThe purpose of this paper is to describe a systemic analysis method for performing ...
This brief explains how I approached my second year of Master’s degree in Technology Risk and Harm P...
La faisabilité et l'efficacité des mesures proactives dépendent d'une cascade de défis: comment quan...
National audienceThe introduction of digital technology in process industries creates new cyber-secu...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
Au cours de la dernière décennie, l’industrie a été victime de plusieurs attaques. Ce phénomène de c...
International audienceThe migration of modern Industrial Control Systems (ICS) towards information a...
Cybersecurity is a topic that invests the globality of public and private companies as a result of t...
In industrial networks, a cyber-incident can have, as a consequence, the interference with physical ...
National audienceMany guides, methods, standards, recommendations or regulations deal with industria...
International audienceDe nombreux guides, méthodes, normes, recommandations ou réglementations trait...
This paper focuses on cyber risks as an emerging threat to global economic stability. Today, the who...
International audienceSummary In the industry, where the cyber threat awareness is quite new, classi...
Published in FIC Observatory Newsletter of March (available in English and French)Industrial Contro...
La cyber sécurité est une priorité absolue dans l’industrie financière qui cherche à assurer la sécu...
National audienceThe purpose of this paper is to describe a systemic analysis method for performing ...
This brief explains how I approached my second year of Master’s degree in Technology Risk and Harm P...
La faisabilité et l'efficacité des mesures proactives dépendent d'une cascade de défis: comment quan...
National audienceThe introduction of digital technology in process industries creates new cyber-secu...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
Au cours de la dernière décennie, l’industrie a été victime de plusieurs attaques. Ce phénomène de c...
International audienceThe migration of modern Industrial Control Systems (ICS) towards information a...
Cybersecurity is a topic that invests the globality of public and private companies as a result of t...
In industrial networks, a cyber-incident can have, as a consequence, the interference with physical ...