SCADAhacker offers professional cyber security services to a range of industrial clients including end users, owner/operators, engineering contractors, system integrators, distributors, security partners and control system vendors. SCADAhacker approaches cyber security in a fashion similar to industrial functional safety, and offers services that meet the unique needs of each client located in industrial sites and corporate offices globally.
With nearly 30 years experience in the industrial automation and control sector, you can be assured that SCADAhacker focuses on the unique aspects of applying the security priorities of Safety, Availability, Integrity and Confidentiality to industrial automation solutions covering not only Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS), but the complete automation solution ranging from field instrumentation up to and including integration with enterprise-wide applications.
The services available to clients fall into the following general categories and include security awareness, training, control system services relating to defense (security design) and testing (security assessments), and research.
|CYBER SECURITY TRAINING|
|One of the biggest challenges facing industry is the shortage of resources that understand not only traditional IT security concepts, but all have knowledge of the design and operation of industrial control systems. Training curriculum is available to improve the knowledge of your team in both offensive (assessments and penetration) and defensive (security controls and audits) roles.|
|ICS (DCS / SCADA) SECURITY SERVICES|
|Professional services are available to cover the complete lifecycle of control system security including risk assessments, risk classification, threat identification, security control selection, standards compliance, pre-commissioning testing, commissioning assistance, site audits and assemments. All services are performed using a unique "hard hat" approach to ICS security..|
|SECURITY RESEARCH & DEVELOPMENT|
|Equally important to securing control systems from cyber threats is the research that takes place to both uncover and understand vulnerabilities that could impact the availability of the control system, as well as investigating new methods to improve the overall security of the automation solution. Papers and presentations are delivered at various conferences throughout the year, as well as a detailed Resources area of the site for visitors to learn more about ICS security, including documentation, videos, and security tools.|