Industrial (OT) Cybersecurity, Bureau Veritas

Industrial (OT) Cyber security

Industrial assets are a necessity in today's society. The assets embed more and more software and connectivity options than ever before, which also makes them vulnerable to a cyber security attack. With the services of industrial cyber security, owners and operators are helped to identify the risk associated with a cyber security attack. 

Industrial organizations are about security, reliability and accessibility, which is why it is important to protect all systems, sensors and networks against a cyber attack. This is put at serious risk today with the connectivity explosion of industrial (OT) systems (PLCs, ICS SCADA).

For these reasons, regulators clearly see the need for better security in the world of industrial organizations. The European Union parliament adopted the Network and Information Security (NIS) directive in 2016 and converted it to law in most EU nations in 2018. This is complemented by ENISA guidelines and by the IEC 62443 standard. In the US, several OT and ICS SCADA guidelines and standards were released by NIST, NERC and DHS.

Our services in Industrial cyber security (OT)

Our services divided by people, process and technology

Image
People within Industrial (OT) Cybersecurity, Bureau Veritas
PEOPLE
Security Awareness and Behavior (SAFE including an OT e-learning module)
Phishing tests
Social Engineering
Training Courses: ICS/SCADA Security and hands-on training
Secure Software Development Lifecycle (SSDLC)
Image
Process within Industrial (OT) Cybersecurity, Bureau Veritas
PROCESS
IT/OT Security Maturity Review including building roadmaps
NIS / WBNI Compliance Review and Assessment
IT/OT Risk/Site Assessment – Security Roadmap against relevant standards (IEC 62443 & others)
Design Review / Threat Modeling / Code Review
Elaboration of OT Governance (strategies, policies and processes)
Elaboration of Incident Response Planning
Business Continuity Planning
Support in building OT cyber security teams and a cyber-ready governance structures
Support in OT cyber tenders: technical specifications for RFPs, evaluation of offers, etc.
Vendor (3rd party) Review/Assessments
Maritime security assessment and classification
Image
 Technology within Industrial (OT) Cybersecurity, Bureau Veritas
TECHNOLOGY
Threat Modeling, Design/Capabilities Review, Configuration Review, Code Review
Red Teaming in IT/OT environments
IT/OT Vulnerability Assessments (penetration testing, robustness testing)