Challenges
The loss of control over infrastructure assets can lead to severe consequences. The sources of threats are not only natural disasters but also cyber attacks by terrorist groups and state organisations. The introduction of TCP/IP protocols and the penetration of IT and OT networks, even in critical infrastructure systems pose a threat to security and the availability of services. Adversaries may use known or unknown vulnerabilities to take control of protection devices, IEDs, PLCs, RTUs, and SCADA systems.
4tn USD
estimated losses on four-day blackout in the USA in 2003
7
110kV transmission lines were disconnected as a result of the cyber attack in Ukraine in 2016
61%
companies experienced network attacks only in 2018
How can we help?
Red Teaming: actions that allow testing of teams, processes and technologies readiness to protect critical infrastructure control systems, by simulating real-world attacks trying to breach the defenses.
Threat Intelligence: proactive reduction of cyber threats in the organization by providing, in advance, information about upcoming threats.
Cybersecurity Audit: security assessment of critical infrastructure components, key organizational layer processes to identify threats, and implement corrective actions. A special case of such an audit is the examination of compliance with the polish implementation of NIS Directive (Ustawa o Krajowym Systemie Cyberbezpieczeństwa).
Cybersecurity audit may include penetration tests of components such as: SCADA system, operator and engineering stations, devices providing remote access, control devices: PLC, IED, RTU using network protocols, among others IEC60870-5: 104, IEC 61850, DNP3 and Modbus TCP / IP.
CBOM: analysis of third-party software components along with their versions and existing vulnerabilities based on the source code, firmware or reverse engineering of the device itself. Security assessment and audit of non-public, software components implemented by the device manufacturer.
Segmentation and separation of OT networks network monitoring to identify key devices and isolating selected system components to ensure the required level of security.
Benefits
Reducing the risk of a potential cyberattack by:
Contact us - we will prepare an offer
READ MORE
Related articles: