The ICS (Industrial Control Systems) Assessment helps critical infrastructure organization assess their cybersecurity posture, in a non-invasive, nor aggressive method. The assessment is carried out by our CyberOPS team without the use of software-based agents or network scanning tools.
The ICS assessment involves a 3 phased process, with the ultimate goal of protecting the critical infrastructure and their ongoing operations against cyber threats. The phases include:
Phase 1: Risk Assessment
A full risk survey that identifies any gaps in the infrastructure’s security posture, with specific recommendations for closing each gap.
Phase 2: Plan
After the initial risk assessment is finalized and reviewed, a detailed plan is formulated to bridge the gaps that were identified in the assessment.
The plan includes:
• The Key Functions
• Adjustments of Policies and Procedures
• Changes in Architecture
• Physical Security
• Technologies and Organizational Culture and Awareness
Phase 3: Deployment
The last phase includes the implementation of new security controls, which include technology, people, and processes. All controls support and continuously monitor the infrastructure’s ongoing security operations and progress.
Threat & Risk Assessment
The threat and risk assessment is comprised of several stages, carried out by our CyberOPS team. The assessment covers the threats and risks which your organization may be exposed to.
Reconnaissance is an attack surface profiling method, it maps your business’s online assets, while running an attack surface analysis. CyberInt’s analysts team utilized our Argos Intelligence Platform to run an attack surface analysis, and profiling. The results of which make up a detailed findings report which includes the online footprint of the organization.
A crucial stage of mapping the threats and risk which the organization is exposed to is the organization-specific intelligence collection. This process maps out the adversaries that may be targeting the organization or active in the industry.
The intelligence collection includes:
• The exposure on Social Media networks
• Mapping the Organization’s Exposure on the Web
• Dark Web and Private Forums monitoring
Based on the findings of the prior stages, a detailed risk assessment is put together, factoring in all the organization’s assets and the threats that target them. Each asset, adversary, and related attack tool is factored in to assess the risks that the organization is exposed to.
Supply Chain Assessment
CyberInt’s Supply Chain Assessment is a service that focuses on the potential risks associated with your supply chain, including your external suppliers, vendors and service providers.
The service is a risk-based approach that includes periodic reviews of your supply chain and of the risks they are exposed to. The service is part of our Susan Solution for ongoing supply chain monitoring. Since you’re only as secure as your least secured vendor, an ongoing assessment of your supply chain is crucial for closing off any gaps in your cybersecurity strategy.
The service enables organizations to evaluate the current cybersecurity capabilities of their existing or future vendors. By collecting intelligence that relates to possible compromises of the supply chain and proactively identify vulnerabilities within the supply chain.
The Supply Chain Assessment Process Consists of:
• Define – Defining your most important vendors
• Network Footprint – An independent Vendor’s threat intelligence assessment
• Specify – Specifying the necessary security requirements for each vendor in your supply chain
• Analyze – An in-depth research of the supply chain’s security vulnerabilities
• Ongoing Assessment – A Threat Intelligence process that continuously monitors the supply chain