Industrial Cyber Security - Protecting Control Systems From Outside Threats

We understand that plant floor systems can no longer operate on an island. Connectivity to corporate networks and the Internet has delivered many key operational and business advantages; however, it has also increased the vulnerability of these systems. Our team will make sure that you can provide secure access to your data where you need it. Using our expertise and best-of-breed technologies, your operational data will be available to business managers, vendors, and support personnel when needed.

Much of the legacy equipment used in manufacturing was designed and built before the advent of the Internet. As new systems are deployed and older systems are brought online, the plant floor needs to be protected from outside threats. Many of the process control engineers faced with this task don’t have the specialized skillset to deal with these threats.

GPA has over two decades of experience with industrial control systems and their supporting networks and infrastructure. Our Cyber Security experts have the tools and experience to help customers through the definition, design and implementation in order to secure your control systems environment.

The first step in this process is a thorough inventory and assessment of your current infrastructure.  We will identify any weak points in your system and come up with a comprehensive plan to mitigate the risks.  Once your system is secure, our team will make sure you have a plan in place for monitoring your system and keeping it up-to-date.


UNLIKE TRADITIONAL BUSINESS NETWORKS THAT PROTECT DATA SUCH AS BANK ACCOUNTS AND CREDIT CARD INFORMATION, INDUSTRIAL CONTROL SYSTEMS AFFECT REAL WORLD DEVICES, CAUSING DOWNTIME, DAMAGE AND HUMAN HEALTH RISKS.

Our Expertise

Planning
Inventory documentation
Known vulnerability assessment
Best Practice review based on NIST or mandated Critical Infrastructure Requirements.
Mitigation planningTesting
Plan review
Best Practices review
Table Top exerciseImplementation
Network Firewall & access control lists
Patching
WhiteListing
Policy deployment
IDS (Intrusion detection)
Centralized Logging
Backups
Antivirus and Malware protection