Skip to main navigation menu Skip to main content Skip to site footer
Submitted April 23, 2026
Published 2026-04-24

Artículos

Vol. 10 No. 2 (2026): Revista Científica Guacamaya

Industrial Cybersecurity in Panama : Tools, Gaps, and a Future Agenda


DOI https://doi.org/10.48204/j.guacamaya.v10n2.a9789

Cover image

References
DOI: 10.48204/j.guacamaya.v10n2.a9789

Published: 2026-04-24

How to Cite

Castillo, R., Vargas-Lombardo, M., Calderón-Gómez, H., & Moreno-De La Cruz, C. (2026). Industrial Cybersecurity in Panama : Tools, Gaps, and a Future Agenda. Revista Científica Guacamaya, 10(2), 8–16. https://doi.org/10.48204/j.guacamaya.v10n2.a9789

Abstract

This study examines the state of industrial cybersecurity in Panama and the real-world effectiveness of security tools for information networks and industrial control systems (ICS). A mixed-methods approach combines a recent literature review with an exploratory survey of eleven industry professionals. Results reveal an operational paradox: although 100% of organizations state that cybersecurity is a priority, only 63.6% report contingency plans and 63.6% formal access policies. Moreover, 27.3% have experienced vulnerabilities and 45.5% have had to remediate security breaches. These figures suggest a systemic gap between strategic intent and tactical execution. In terms of current impact, SIEM, IDS/IPS, network segmentation, and patch management are associated with improved detection and response, yet limitations persist regarding interoperability, legacy integration, and workforce capabilities. Looking forward, a five?pillar agenda is proposed: (i) domain maturity using the NIST CSF; (ii) security?by?design engineering for ICS; (iii) unified telemetry and XDR with advanced analytics; (iv) organizational change and security culture; and (v) operational risk measurement with leading and lagging indicators. The paper provides local evidence and a roadmap for continuous improvement that contrasts current impact with the potential risk reduction achieved by institutionalizing state?of?the?art security practices.

Downloads

Download data is not yet available.