{"id":492712,"date":"2022-06-14T16:13:00","date_gmt":"2022-06-14T16:13:00","guid":{"rendered":"https:\/\/www.capgemini.com\/pt-en\/?p=492712"},"modified":"2025-03-26T09:27:06","modified_gmt":"2025-03-26T09:27:06","slug":"5-advices-tips-for-secure-an-industrial-system","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","title":{"rendered":"5 advices\/tips for secure an Industrial system"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>5 advices\/tips for secure an Industrial system<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/08\/cg-logo.png?w=330?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Capgemini<\/h5><h5 class=\"blog-date\">14 Jun 2022<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/pt-en\/?p=492712\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/pt-en\/?p=492712&amp;text=5%20advices%2Ftips%20for%20secure%20an%20Industrial%20system\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/pt-en\/?p=492712&amp;text=5%20advices%2Ftips%20for%20secure%20an%20Industrial%20system\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\">We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Whatever the business sector, there are human and environmental risks but also business risks such as production shutdown and the inability to deliver on time.<\/p>\n<cite>Didier Appell, Head of OT\/IoT cybersecurity, Capgemini<\/cite><\/blockquote>\n\n\n\n<p><strong>The advices presented below are based on a little less than a decade of support to industrial companies in different sectors, who wanted to increase the security and monitoring\/surveillance level of their factories and production centres (electricity, gas, water, etc.) where we have acquired significant experience in End-to-End services (Define\/Protect\/Defend).<\/strong><\/p>\n\n\n\n<p>It has been a decade or so (and the STUXNET effect which raised awareness), that industrial companies are concerned about cyber risk and that Capgemini is supporting them in those challenges.<\/p>\n\n\n\n<p>Whatever the line of business, there are human and environmental risks but also business risks such as production shutdown and the inability to deliver on time.<\/p>\n\n\n\n<p>Our presence with companies wishing to enhance the security and monitoring level of their factories and production centres (electricity, gas, water, etc.) allow us to acquire a significant experience in End-to-End services (Define\/Protect\/Defend)<\/p>\n\n\n\n<p>Before going into details of the security approach followed with these companies, it seems important to remember that a cybersecurity project in industrial environment requires to involve people with dual \u00ab business \u00bb skills (industrial production, energy, transports, \u2026) and \u00ab cyber \u00bb skills in order to propose recommandations and solutions that respect the regulatory and normative framework for Industrial Information System security (ANSSI\/NIS,IEC 62443, IEC 62351, ISO270xx, NIST-800, \u2026) and adapted to the business context :<\/p>\n\n\n\n<p>\u2013 Compliance with safety,<br>\u2013 Compliance with operational constraints,<br>\u2013 Compliance with technological constraints (heterogeneity, obsolescence, real time perfomance, limited resources, network bandwidth).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-5-key-steps-of-a-factory-security-program-and-important-points-to-remember\"><strong>The 5 key steps of a factory security program and important points to remember<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-have-a-clear-vision-of-what-the-company-wants-to-protect\"><strong>1 \u2013 Have a clear vision of what the company wants to protect<\/strong><\/h3>\n\n\n\n<p>It is essential to perform an assets inventory on the industrial network in order to understand the diversity of these to set up protections able to cover a maximum of them.<\/p>\n\n\n\n<p>However, it is not enough to simply map the equipments physically (type, network location, etc.) but also set up a functional mapping to understand which equipments contribute to which function. To do this, it is recommended to use the \u00ab zones and conduits \u00bb concept of IEC 62443. This allows a better reaction in case of an attack because it will be possible to immedialty identify which function is impacted and then adapt the remediation action.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-only-protect-what-is-necessary\"><strong>2 \u2013 Only protect what is necessary<\/strong><\/h3>\n\n\n\n<p>In other words, optimize the security costs. For this a risk analysis based on specific attack scenarios for factories allows us to quickly identify risks that we accept and those we want to reduce (human risks are unacceptable whereas risk of image degradation may or may not be acceptable depending on the company\u2019s market positioning).<\/p>\n\n\n\n<p>To do this, it\u2019s necessary to involve people working in the factory at the moment of the scenarios analysis by means of dedicated working sessions. In addition to a precise risk assessment, this risk approach makes it possible to raise the awareness among the operational staff and get them on board in the program as they are convinced of the risk\u2019s reality and that something must be done.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-design-a-realistic-efficient-and-progressive-roadmap\"><strong>3 \u2013 Design a realistic, efficient and progressive roadmap<\/strong><\/h3>\n\n\n\n<p>Willing to secure everything everywhere at the same time does not work ! Only a progressive approach can succeed by taking into account the factory\u2019s business stakes (a production shutdown can be costly\/expensive in terms of penatlties for late delivery and damage the company\u2019s image).<\/p>\n\n\n\n<p>For example, it is possible to start by deploying protections that do not impact the architecture of the production line:<\/p>\n\n\n\n<p>\u2013 EPP\/EDR on Endpoints<br>\u2013 USB key control device<br>\u2013 Port mirronig detection and asset management tools<br>\u2013 Operators awareness<\/p>\n\n\n\n<p>Then when it is necessary, it is possible to change the architecture with:<\/p>\n\n\n\n<p>\u2013 Isolation and segmentation of networks<br>\u2013 More detailed management of access rights and priviledges, including many remote accesses to industrial Information System for operations and maintenance<br>\u2013 Management of obsolescence with version updates (i.e with the automates) or \u00ab virtual patching \u00bb (i.e with old OS)<\/p>\n\n\n\n<p>It is interesting to classify factories into 2 or 3 categories by level of criticality and choose to only deploy a certain type of protection depending on the category. The highest criticality will be for example for factories producing the company\u2019s flagship product and which also have environmental (SEVESO for example) and\/or human risks if there are dangerous manipulations by the operators.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-test-a-solution-before-deploying-it-in-all-the-factories\"><strong>4 \u2013 Test a solution before deploying it in all the factories<\/strong><\/h3>\n\n\n\n<p>Prototyping the solution in a pilot factory allows detailed understanding of the solution and better preparation for its deployment. It is important to not only test the functionality of the solution but also ensure that it does not degrade safety, operators efficiency and of course the perfomance of the system. A second point to check during this test step is that the solution to be deployed is easy to install and \u00ab patchable \u00bb with a maximum of automation enabling the writing of deployment procedures minimizing the production impact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-detect-and-react-to-attaks-without-breaking-everything\"><strong>5 \u2013 Detect and react to attaks without \u00ab breaking everything \u00bb<\/strong><\/h3>\n\n\n\n<p>The challenge here is to have teams that know and understand the functioning of the production chain and industrial equipments \/ networks in order to be able to analyze events in detail and above all, build a remediation plan minimizing the production impact and avoid the deterioration of the critical industrial equipments.<\/p>\n\n\n\n<p>To do this, it is important to have a cybersecurity representative, within the factory, from the operational teams, who has a very good knowledge of the factory to help analyse alerts and above all, contribute to the construction of the remediation plan. It is not up to the SOC to decide to stop a machine on the production chain or within the control command chain of the system!<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.<\/p>\n","protected":false},"author":336,"featured_media":509970,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[34],"industry":[],"partners":[],"blog-topic":[82],"content-group":[],"class_list":["post-492712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","service-cybersecurity","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 advices\/tips for secure an Industrial system - Capgemini Portugal<\/title>\n<meta name=\"description\" content=\"We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 advices\/tips for secure an Industrial system\" \/>\n<meta property=\"og:description\" content=\"We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Portugal\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-14T16:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-26T09:27:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2800\" \/>\n\t<meta property=\"og:image:height\" content=\"1800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Capgemini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"krishnasingh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\",\"name\":\"5 advices\/tips for secure an Industrial system - Capgemini Portugal\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg\",\"datePublished\":\"2022-06-14T16:13:00+00:00\",\"dateModified\":\"2025-03-26T09:27:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95\"},\"description\":\"We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg\",\"width\":2800,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/pt-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 advices\/tips for secure an Industrial system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/\",\"name\":\"Capgemini\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95\",\"name\":\"krishnasingh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/14f4c4fd7fea7ae4f374cdd517d91813e8568440c87f622f026292efd982b816?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/14f4c4fd7fea7ae4f374cdd517d91813e8568440c87f622f026292efd982b816?s=96&d=mm&r=g\",\"caption\":\"krishnasingh\"},\"url\":\"https:\/\/www.capgemini.com\/pt-en\/author\/krishnasingh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 advices\/tips for secure an Industrial system - Capgemini Portugal","description":"We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","og_locale":"en_US","og_type":"article","og_title":"5 advices\/tips for secure an Industrial system","og_description":"We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.","og_url":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","og_site_name":"Capgemini Portugal","article_published_time":"2022-06-14T16:13:00+00:00","article_modified_time":"2025-03-26T09:27:06+00:00","og_image":[{"width":2800,"height":1800,"url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","type":"image\/jpeg"}],"author":"Capgemini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"krishnasingh","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","url":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","name":"5 advices\/tips for secure an Industrial system - Capgemini Portugal","isPartOf":{"@id":"https:\/\/www.capgemini.com\/pt-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","datePublished":"2022-06-14T16:13:00+00:00","dateModified":"2025-03-26T09:27:06+00:00","author":{"@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95"},"description":"We had the pleasure to have our OT \/ IoT Cybersecurity Global offering leader for Capgemini, Didier Appell attend Cyber Security Nordic event in May at Helsinki and have a presentation about our 5 advises to secure your Industrial Control System. Below you will find the 5 key steps of a factory security program and important points to remember.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#primaryimage","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","contentUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","width":2800,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/pt-en\/"},{"@type":"ListItem","position":2,"name":"5 advices\/tips for secure an Industrial system"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/pt-en\/#website","url":"https:\/\/www.capgemini.com\/pt-en\/","name":"Capgemini","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95","name":"krishnasingh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/14f4c4fd7fea7ae4f374cdd517d91813e8568440c87f622f026292efd982b816?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/14f4c4fd7fea7ae4f374cdd517d91813e8568440c87f622f026292efd982b816?s=96&d=mm&r=g","caption":"krishnasingh"},"url":"https:\/\/www.capgemini.com\/pt-en\/author\/krishnasingh\/"}]}},"blog_topic_info":[{"id":82,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"service":[{"id":34,"name":"Cybersecurity","slug":"cybersecurity"}],"blog-topic":[{"id":82,"name":"Cybersecurity","slug":"cybersecurity"}],"following_users":[{"id":143,"name":"automator","slug":"automator"},{"id":167,"name":"krishnasingh","slug":"krishnasingh"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"5 advices\/tips for secure an Industrial system","url":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Portugal","logo":""},"keywords":[],"dateCreated":"2022-06-14T16:13:00Z","datePublished":"2022-06-14T16:13:00Z","dateModified":"2025-03-26T09:27:06Z"},"rendered":"<meta name=\"parsely-title\" content=\"5 advices\/tips for secure an Industrial system\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-06-14T16:13:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Portugal","distributor_original_site_url":"https:\/\/www.capgemini.com\/pt-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/08\/cg-logo.png?w=330","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts\/492712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/comments?post=492712"}],"version-history":[{"count":5,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts\/492712\/revisions"}],"predecessor-version":[{"id":528978,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/posts\/492712\/revisions\/528978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media\/509970"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media?parent=492712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/categories?post=492712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/tags?post=492712"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/brand?post=492712"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/service?post=492712"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/industry?post=492712"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/partners?post=492712"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/blog-topic?post=492712"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/content-group?post=492712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}