Request a quote

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY

Cybersecurity Services in control system, OT,loT & lloT Cyber Security Solution Provider & consultant bringing a defense-in-depth portfolio comprising of Industry leading technologies through a consultative approach with an Advanced, Impenetrable & Scalable Cyber Security Architecture.

With massive breadth of knowledge and expertise in the field of ICS, SCADA & Historian Cyber Security, Industrial Firewalls, Uni/Bi-directional Gateway solutions, Experts Cybersecurity Services aims to provide an end-to-end high quality design solution along with efficient network management that meets the needs & expectations of our customers.

Experts Cybersecurity Services brings the best-in-class Comprehensive & Industry leading Technologies which are in compliance with local Cyber Security Standards in the region and provide the ultimate value for investment.

 

Assess Services

  • Cybersecurity Vulnerability Assessment (CVA) 

Perform Cybersecurity Vulnerability Assessment, Review and evaluate Architecture Drawing(s), Evaluation of existing countermeasures, Network architecture and traffic assessment, Policy/Procedure Review.

  • High Level Cybersecurity Risk Assessment (HLCRA) 

Development of High Level cybersecurity risk assessment procedure, Assist with inventory requirements, Criticality Assignments, Assist with Zone & conduit and Dataflow Information, Train staff on risk assessment procedure, Facilitate and Document Risk Assessment, Initial Security Level (SL) assignments, Threat Modeling.

  • Detailed Level Cybersecurity Risk Assessment (DLCRA)   

Development of Detailed Level cybersecurity risk assessment procedure, Assist with inventory requirements, Train staff on risk assessment procedure, Facilitate and Document Risk Assessment, Documentation of assessment results, Security Level-Target (SL-T) assignment confirmation, Threat Modeling.

  • Process Control Network Defense-in-Depth Review 

Refer to an information security approach in which a series of security mechanisms and controls are thoughtfully layered throughout a computer network to protect the confidentiality , integrity and availability of the network and the data within . 

  • Zone and Conduit Modeling, Zone and Conduit

Review of corporate reference models, Zone and Conduit - High-level diagrams, Zone and Conduit - Detailed design, Zone and Conduit - design reviews, Barrier device training and commissioning.

                                                                                             

Design & Engineering Services

  • Cybersecurity Requirements Specification (CSRS) 

Technical writing - Templates, Development of Requirements, Review of Cybersecurity Requirements Specification.

  • Cybersecurity Design Specification (CSDS) 

Consultation, Review, Technology Investigation & Recommendation.

  • Defense-in-Depth Analysis 

Analysis of effectiveness of defense layers, Detection-in-Depth Analysis (analysis of effectiveness of monitoring layers).

  • User account Administration, Access, and Authorization Philosophy 

Policy/Procedure Review, Policies/Procedures Development, ACL Review, Design Reviews.

  • Cybersecurity Factory Acceptance Test (CFAT) 

Cybersecurity Factory Acceptance Test plan development, CFAT execution and reporting.

  • Cybersecurity Site Acceptance Test (CSAT) 

Cybersecurity Site Acceptance Test plan development, CSAT Execution and reporting.

 

Operate & Maintain Services

  • Cybersecurity Monitoring & Maintenance 

Develop logging requirements, Assess monitoring methods, Assess Countermeasures, Assess Security Levels (SL) to requirements.

  • Modifications or Decommissioning of ICS 

Impact Analysis Review.

  • Cybersecurity Vulnerability Assessment (CVA)  

Perform Cybersecurity Vulnerability Assessment, Review and evaluate Architecture Drawing(s), Evaluation of existing countermeasures, Network architecture and traffic assessment, Policy/Procedure Review.

  • Network Detection Discovery, Monitoring and Threat Detection 

Network Anomaly & Threat Detection, Network Asset Discovery & Mapping, Automated network inventory, Monitor and alert & report.

  • IT/OT Endpoint Security and Patch Management 

Industrial IT endpoint protection, IT endpoint protection (HMIs, workstations & others), OT endpoint (PLCs, RTUs and others), Patch Management and Configuration Management.

  • Industrial loT (lloT) Device Security 

Embedded loT agent, lloT Inventory — Hardware/Software, Continuous Vulnerability Management and Device Update.

  • Identity and Access Management (IAM) 

IAM - Policy and role management, ID governance, MFA, SSO & PAM.