invesco tickerroom1 (1 of 1)

Cybersecurity Operational Technology Services

Our cybersecurity services offer a comprehensive approach to safeguarding your operational technologies. We enhance cybersecurity awareness through educational programs and create customized frameworks for risk management and asset security. Here’s how we can support you:

Information and Communications Technology (ICT) Design

  • Network
  • Server hosting
  • Low voltage

 

Bridging the Gap

Integrating the information technology and operational technology teams—such as facilities, physical security, and audio-visual—forms a cohesive team within the organization that promotes the secure implementation of operational technologies. This approach aligns with the guidelines outlined in NIST SP 800-82r3.

 

Cybersecurity Education

Designing a program to enhance awareness of operational technology cybersecurity risks and best practices for all stakeholders throughout the construction process.

Creating internal cybersecurity policies and standards to guide the design, system selection, installation, and operation of operational technology.

 

Cybersecurity Program Development

Establishing a tailored cybersecurity program to address all operational technologies, including:

  • Security and risk management
  • Asset security
  • Security architecture and engineering
  • Communications and network security
  • Identity and access management
  • Security assessment and testing
  • Security operations
  • Software development/life cycle

Integrating read-only operational technology data streams into virtual environments for training and technology lifecycle management.

Norfolk Southern Offices scaled
Invesco Meeting Room

Assessing your Cybersecurity Strength

Evaluating risk, exposure, and opportunities for improvement. This process utilizes various frameworks, including ISA/IEC 62443, CIS Controls, and NIST 800-93r3, to offer a comparative grading scale and insights into current cybersecurity preparedness.

 

Cybersecurity Peer Review

Peer review for operational technologies being integrated into the built environment. Recommendations are provided after performing a GAP analysis on submittals and proposals.

 

Cybersecurity Operational Technology Commissioning

  • Comprehensive program tailored to the operational technologies to ensure compliance with the owner’s cybersecurity goals.
  • Full peer review
  • Commissioning program development
  • Onsite/remote commissioning