Systems Assessment

Gain a strategic overview of your IT/OT systems: we identify weaknesses, deliver a clear risk analysis, and develop a risk profile that enables informed decision-making and targeted investment in cybersecurity.

Key activities:

  • Inventory of IT/OT systems.​
  • Risk analysis.​
  • Network traffic analysis.​
  • Vulnerability assessment of IT/OT systems.​
  • Penetration testing.​
  • Identification of critical systems and data flows within the IT/OT environment.

Outputs:

  • A structured final report resulting from penetration testing, vulnerability assessment, and/or risk analysis, including:​
     
    • Identification of security weaknesses and strengths.​
    • Remediation recommendations addressing specific findings.​
  • Systems inventory.​
  • Detailed risk analysis of IT/OT systems.​
  • Cyber risk register.​
  • Mapping of information flows within the IT/OT environment (Application Communication Matrix).​
  • Presentation of key findings and
    recommended corrective actions.

Benefits:

  • Identification of IT/OT systems, communication flows, and vulnerabilities.​
  • Proactive cyber risk management.​
  • Informed decision-making and effective resource allocation.​
  • Enhanced security of the IT/OT environment.

Assessment of Systems components:

  1. Cyber risk assessment of OT systems in accordance with ISA/IEC 62443-3-2.
  2. Cybersecurity risk assessment of IT systems in accordance with ISO/IEC 27005.
  3. Network traffic analysis of the IT/OT environment.
  4. Vulnerability scanning and assessment of IT/OT systems.
  5. Penetration testing of IT infrastructure.
  6. Penetration testing of web applications.
  7. Penetration testing of OT systems.
  8. Robustness assessment of critical OT systems.
  9. Security assessment of PLCs.
  10. Threat modelling for OT systems.