OT/ICS SECURITY

Purpose

  • Industrial cybersecurity training services help raise the awareness of leaders and employees at factories and production facilities using industrial control systems (ICS), automation of the situation, threats, weaknesses, and cyber risks.
  • Industrial cybersecurity assessment (OT/ICS Vulnerability Assessment) services help to comprehensively review and evaluate industrial information systems (processes & policies, architecture & technology solutions, human resource organizations), thereby identifying weaknesses, limitations, and security vulnerabilities, making recommendations to help customers proactively improve the security of the system.
  • Intrusion detection solution (IDS) helps collect and analyze network traffic information on industrial terminals to detect signs of abnormal and malicious behaviour in the system, giving alerts to help customers proactively handle and prevent possible consequences.
  • One-way data transfer solution allows secure data transfer from industrial information systems (OT/ICS) to information technology systems (IT) to serve business requirements without fear of malicious agents invading backwards.
  • The secure two-way information exchange solution allows the exchange of information (sending and receiving) and the implementation of control between industrial information systems, information technology systems and industrial information systems in a secure manner, minimizing cybersecurity risks.
  • Industrial firewall solutions help increase the layer of protection between industrial information systems and create and control areas in industrial network systems, thereby early detecting and warning of cybersecurity risks, improving the level of protection for the system.

Test list

  • According to the agreement, the customer wants to use the specific service in each case.

Implementation methods

Training services: Conduct on-site or online training as required by the client.
Cybersecurity assessment services:

  • Survey the system directly.
  • Use questionnaires.
  • Interview specialized personnel on the customer’s side.
  • Deploy specialized solutions to collect necessary information, thereby analyzing and evaluating the security of the system without affecting the regular operation of the system.
  • Implement solutions: Survey the system directly and work with specialized customer staff to plan, implement handover, and train.

Outcomes Result

  • The awareness of leaders and employees on the issue of cybersecurity for industrial systems is enhanced, strengthening cybersecurity capacity in the organizational & human aspects, which is the basis for the successful implementation of industrial cybersecurity policies.
  • Customers get an overview and details of the current situation of industrial cybersecurity, from which they are advised on the work and the roadmap for implementing solutions and services to improve comprehensive security capacity.
  • The customer’s industrial information system is equipped with specialized solutions, helping to improve the ability to detect, short-block, and respond to growing threats.

Human resources for project implementation

  • It is necessary to have at least 01 senior-level personnel with certificates related to industrial cybersecurity in charge of technical focal points for each project; the number and composition of deployment personnel are arranged per each project.

Other Services