ICS or SCADA Security Consulting

ICS or SCADA Security Consulting

ICS or SCADA Security Consulting

Cyber Stone’s ICS or SCADA Security Consulting Practice is known for its impact. Our clients have a dramatic improvement in their security posture after working with Cyber Stone. We focus on increasing security rather than perfection, and we have developed proven methodologies for both the enterprise and industrial control systems (ICS).

We have worked in most sectors that rely on ICS such as electric, pipeline, refinery, water and wastewater, food and beverage, mining, chemical manufacturing, building management, … Our clients do not want their names posted on a web site, but they are willing references for other members of their industry sector.

Cyber Stone has the experience and a knowledge base that is unique in the industry. Not only do we have some of the top experts in IT security, but we have also performed many engagements in an oil pipeline, water distribution and management, electric transmission and generation and a variety of other critical infrastructure control systems.

Our first SCADA security assessment was in 2010, and this client is still using our services for advanced ICS security projects in 2016. We are very proud of many of our ICS security clients who we have been working with for years. They have gone from very vulnerable control systems with little security to an appropriately high level of security. These clients have addressed vulnerabilities, deployed a best practice security architecture, developed, implemented and audited security policies, created a CIRT and even used the security lessons learned and procedures in RFP’s for new systems.

Once Cyber Stone accepts a new client we will do whatever type of engagement the client requires to deploy and maintain a secure, robust and effective ICS.

requst service

ICS Security Consulting Services

ICS Security Assessments

Security Governance, Policy and Audit

Operations Technology (OT) Strategy

ICS Vendor Security Services

Security Architecture

Custom Security Services

Big Data, Industrial Internet and Cloud Services Strategy

SAP Security And SAP Role Design Services

In order to address our customer’s needs, Cyber Stone focuses our SAP Security and SAP Role Design expertise on the following 3 services:

requst service

CyberStone's SAP Role Design Review

  • Services target customers that
  • Know there is an issue with their current Role Design, but are unsure of the best approach to resolve their issues.

    We identify issues in the current role design, prioritize the issues based on risk, and create a road map to resolve the issues.

CyberStone's SAP Security Role Design

  • Services target SAP customers
  • Services target customers with significant deficiencies, usually identified in access control audits, in their existing Role Design and require a full or partial Role Re-Design.

    Our team can quickly determine whether to leveraging our pre-configured Role Design or fixing the existing Role Design is the most effective and efficient approach. In either case, the result is a compliant Role Design optimized to reduce ongoing maintenance costs and minimize risk.