There is no one-size-fits-all approach to OT cybersecurity. Whether you want help managing the security of your SEL-designed and commissioned OT system or want to maximize your cybersecurity effectiveness with sophisticated planning and response, we have a service package that meets your stage of the cybersecurity lifecycle. And with our experienced security staff carrying as much of the load as you need, your teams can be free to do what they do best: keep your systems up and running.
Cyber Maintenance
With our cyber maintenance service offerings, we provide ongoing support for ICS and OT systems designed and commissioned by SEL.
These services include the ongoing support and maintenance of your system through any of the following:
- Patch requirement management
- Software update management
- Software and firmware upgrade notifications
- Software enhancement guidance to optimize system efficacy and resiliency
- Periodic access log, system log, and security alert review
- Device backup
- Server and workstation health reviews
- Vulnerability assessments to uncover security weaknesses
- System capacity analysis to determine scalability for future resource needs
- End-of-life monitoring for firmware and hardware
Cyber Monitoring
With our cyber monitoring services, we provide security support to monitor your network, whether your system was designed by us or another security vendor. In this service package, our analysts fulfill the role of a full-time internal security analyst. This includes monitoring your network for suspicious activity, alerting you to any findings, and regularly reporting on network threats and activity.
Cyber Readiness and Response
Strategic planning is essential to combat cyber threats. With our cyber readiness and response services, engineers with unmatched expertise in a variety of ICS and OT environments can proactively assess and test your systems to strengthen your cybersecurity posture. And if a security event does occur, we can help minimize the impact and return to normal operation quickly.
Our proactive service offerings include:
Architecture review—Evaluate your OT infrastructure to identify potential weakness and recommend improvements.
Compromise assessment—Assess whether your systems and networks have been compromised by a threat actor, and if so, determine the extent.
Crown jewel analysis—Designate which assets within a system are most critical, then evaluate the risks and generate a risk management plan for them.
Cybersecurity program maturity assessment—Evaluate the effectiveness of your cybersecurity program to identify potential gaps and recommend improvements.
Firewall audit—Evaluate the effectiveness of your organization’s firewall configuration, and identify any issues that may compromise security.
Incident response plan development and review—Develop and maintain a comprehensive incident response plan to protect your systems and data; minimize the impact of any incidents that do occur; and respond most effectively to emerging threats.
Incident response readiness assessment—Evaluate your preparedness for security incidents or breaches by identifying gaps in security capability and recommending improvements to them.
Penetration test—Identify vulnerabilities and weaknesses in the security of your systems and networks by simulating an attack, then evaluate the effectiveness of existing security controls.
Tabletop exercise—Simulate a security event to test your incident response in a controlled environment, and identify areas of improvement.
Threat hunt—Proactively identify and investigate potential security threats that may have evaded detection by traditional security controls.
Vulnerability assessment—Identify potential security flaws in your systems and network.