The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment – Vocabulary and general principles. Cybersecurity certification systems and schemes are based on assessment standards, the choice and application of which is not unambiguous and historically has many interpretations and application mechanisms. These s...
The EU Cybersecurity Act introduces cybersecurity certification framework for ICT products, services...
In the thesis cybersecurity engineering processes expand ISO/IEC 33071 creating a model for assessin...
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
The object of research is the system and schemes of conformity assessment (certification) of cyberse...
This paper discusses the first results of one of the four EU H2020 pilot projects launched to prepar...
Within Europe, there is a very high level of knowledge and experience in product and facility certif...
In recent years, cybersecurity certification is gaining momentum as the baseline to build a structur...
In 2019, the new European Union (EU) cybersecurity regulation "Cybersecurity Act" ("CSA")1 entered i...
Open source systems security certification provides an introduction to the notion of the Security Ce...
Old wine in new bottles: Standardisation and certification as regulatory instruments Standardisatio...
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the In...
Organisations’ cybersecurity requirements have several origins, including the need to protect their ...
Open Source Systems Security Certification provides an introduction to the notion of the Security Ce...
The SPHINX Automated Cybersecurity Certification (ACC) enables a solution for conducting automated a...
Organisations’ cybersecurity requirements have several origins, including the need to protect their ...
The EU Cybersecurity Act introduces cybersecurity certification framework for ICT products, services...
In the thesis cybersecurity engineering processes expand ISO/IEC 33071 creating a model for assessin...
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
The object of research is the system and schemes of conformity assessment (certification) of cyberse...
This paper discusses the first results of one of the four EU H2020 pilot projects launched to prepar...
Within Europe, there is a very high level of knowledge and experience in product and facility certif...
In recent years, cybersecurity certification is gaining momentum as the baseline to build a structur...
In 2019, the new European Union (EU) cybersecurity regulation "Cybersecurity Act" ("CSA")1 entered i...
Open source systems security certification provides an introduction to the notion of the Security Ce...
Old wine in new bottles: Standardisation and certification as regulatory instruments Standardisatio...
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the In...
Organisations’ cybersecurity requirements have several origins, including the need to protect their ...
Open Source Systems Security Certification provides an introduction to the notion of the Security Ce...
The SPHINX Automated Cybersecurity Certification (ACC) enables a solution for conducting automated a...
Organisations’ cybersecurity requirements have several origins, including the need to protect their ...
The EU Cybersecurity Act introduces cybersecurity certification framework for ICT products, services...
In the thesis cybersecurity engineering processes expand ISO/IEC 33071 creating a model for assessin...
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...