Industrial and IIOT interconnectivity is an opportunity for business improvement. At the same time, it is a cyber-risk shaped by the varied typology of OT and IOT objects and protocols.
Different initiatives, from technical to governance methods, can accelerate the cyber security roadmap. Starting points are the key phases of the main OT cyber security standards: assessing, integrating, maintaining.
Spike Reply is specialized in integrating OT/IIOT cyber security technologies and supports related operational activities. The team helps clients evaluate and maintain high cyber security levels in industrial and automation environments. Spike Reply’s expertise with these issues is gathered experience in projects covering active processes, different kinds of automation and architectures.
Critical infrastructures and automation environments cybersecurity governance
Specific automation cybersecurity policy and procedures
Organizational Assessment
IEC62443 Security Level Assessment and Maturity Level Evaluation
Technological site/plant assessment (Vulnerability Assessment)
OT Threat modelling, and OT/IIoT devices penetration test
FAT and SAT cybersecurity validation
Secure segmentation design and technologies integration
Secure Remote Assistance (SRA) in critical infrastructures
Industrial Intrusion Detection Systems (IDSs) and Industrial SOC/CSIRT technologies
Customized OT training plan
Support on technological PoC activities
Defining technological security requirements for RFI, RFQ
Cybersecurity baseline for third parties
Starting from a security level assessment, together with Spike Reply clients can identify the zones and conduits that are most critical and most exposed to security incidents. A definition of technological solutions and architectures can enhance the resilience of the production/control network and enable some necessary services like Secure Remote Assistance and continuous monitoring.
Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection. Its mission is to safeguard the values and privacy of people, companies and processes in order to support the growth of a global, sustainable digital world through innovation. Confidentiality, integrity and availability of systems are top priorities. Together with its partners, the company provides vendor-independent consulting services to help enterprises achieve a group-wide, security-oriented culture.