Operational Technology

Put the right security policies, processes, architecture, and expertise in place.

 

IT security skills are in short supply globally, but our enterprise risk management offerings give you cost-effective access to the expertise you need. Through our security consulting services, you gain the innovation and economic productivity benefits of cloud, mobility, social media, and the Internet of Things, while eliminating the threats these technologies can pose to your brand, reputation, and business performance.

Awareness

Familiarize your employees with cyber security in your organization with our Awareness programmes.

Assessments

 

Determine the state of your organization regarding cyber security for IACS. Find the baseline and gain understanding of where there are possible risks and what you can do about it. Our assessments pay attention to human, organization and technology. As a result, you know where your investments in improvement are most fitting.

IACS Forensics

 

We make sure your organization and installation is equipped to quickly assemble all required information when a security incident occurs. In this way, an incident can be handled correctly and full operability will be restored.

Consultancy

 

Are your policies outdated? We create, expand and update your policies regarding security. We help you with setting cyber security guidelines, policies & procedures and cyber security management in your organization among other things.

Implementation

 

While you maintain focus on your core business, we help you with (re-)engineering of your IACS environment, security by design, network architecture, installation and configuration of firewalls, Intrusion Detection Systems, switches, etc. In short, with our engineering services we take a lot of concern out of your hands.

Training

 

Train your employees in cyber security for the IACS domain with the extensive IEC 62443 training programme of the Hudson Cybertec Academy. With our trainings you create a solid base for managing cyber security within your organization.