Cybersecurity Success Stories

SentryOT – Cyber Situational Awareness for OT Energy Infrastructures

SentryOT collects all the information needed by an Incident Response team to investigate or perform threat hunting activities.

This includes full network visibility, device and application logs, up-to-date asset inventory and an accurate OT network topology. In a clear, visual, and easy-to-interpret way.

Implementing the SentryOT Cyber Resilience Platform on any OT Power & Automation system will lay a robust foundation for a secure and resilient infrastructure.

TSO Cybersecurity Assesment & Transformation Plan

Scope of work: Cybersecurity Assessment and Transformation Plan for the main national grid substations.

Steps: The following steps were part of the cybersecurity assessment for each station individually to understand the current security posture and to be able to propose a transformation plan based on the findings and security risks identified.

  • Identify Assets: Determine all critical assets within the station, including network devices, servers, control systems, and data repositories.
  • Network Architecture Review: Evaluate the network architecture, including segmentation, firewall configurations, and access controls, to ensure proper isolation of critical systems and minimize the impact of a potential breach.
  • Security Policy Review: Assess existing security policies, procedures, and incident response plans to ensure they are up to date, comprehensive, and aligned with industry best practices.
  • Threat Analysis: Assess potential threats and vulnerabilities specific to the station, considering both external and internal factors. This involves analyzing potential attack vectors, such as unauthorized access, malware, social engineering, and physical breaches.
  • Vulnerability Scanning: Perform automated vulnerability scanning on all systems and networks to identify any known vulnerabilities. This helps in understanding the current security posture and prioritizing remediation efforts.
  • Penetration Testing: Conduct controlled simulated attacks to identify potential weaknesses in the station’s defenses. This involves attempting to exploit vulnerabilities in a controlled environment to evaluate the effectiveness of existing security measures.
  • Transformation Plan
Cybersecurity Main References

Cyber Security OT Training Platform

Cyber Security OT Training Platform

Designing three distinct Process Automation Environments for an Oil Refinery, Reverse Osmosis Treatment Plant, and Automation Transfer Switch.

  • Design process automation environments for an Oil Refinery, Reverse Osmosis Treatment Plant, and Automation Transfer Switch.
  • Build a unified platform representing dynamics for all three environments.
  • Conduct a detailed cybersecurity audit for all three automation environments.
Explore more