Foundational Assessments
Evaluate your security posture and identify gaps
OT Security Maturity Assessment
2-4 weeksComprehensive evaluation of your organization's OT security maturity against industry frameworks. Understand where you stand and where to invest.
Deep-dive assessment against NIST CSF, IEC 62443, and sector-specific standards including control system configuration review and network architecture analysis.
- Maturity score across 5 domains
- Gap analysis report
- Prioritized remediation roadmap
Gap Assessment
1-2 weeksQuick evaluation of your existing policies and procedures against regulatory requirements. Identify compliance gaps before auditors do.
Systematic comparison of existing documentation against CCoP, IEC 62443-2-1, or specified regulatory frameworks with detailed control mapping.
- Gap analysis report
- Practical actionable recommendations
- Prioritized remediation roadmap
OT Asset Discovery & Inventory
1-3 weeksYou can't protect what you don't know exists. We discover all OT assets including shadow OT that may have been forgotten or undocumented.
Passive network discovery using Nozomi/Claroty/Dragos sensors, protocol analysis across Modbus, DNP3, EtherNet/IP, PROFINET, and OPC UA with full asset fingerprinting.
- Complete asset register
- Network topology diagrams
- Risk-rated asset database
OT Risk Assessment
3-4 weeksQuantify cyber risk in business terms. Understand the financial and operational impact of potential incidents to make informed investment decisions.
Risk analysis per IEC 62443-3-2 including threat modeling, vulnerability correlation, consequence analysis for SIS/ESD systems, and attack tree development.
- Risk heat maps
- Business impact analysis
- Risk treatment plan
Advanced Architecture
Design secure OT network segmentation and IT/OT integration
Network Segmentation Design
4-6 weeksDesign network architecture that contains breaches and protects critical assets. Reduce blast radius of potential incidents.
Zone and conduit design per Purdue Model and IEC 62443-3-2, including firewall ruleset development, DMZ architecture, and data diode specifications.
- Network architecture diagrams
- Firewall rule specifications
- Implementation roadmap
Secure Remote Access Design
2-3 weeksEnable vendor access and remote operations without creating security vulnerabilities. Balance operational needs with security requirements.
Jump server architecture, PAM integration, session recording, MFA implementation, and zero-trust architecture for OT remote access.
- Remote access architecture
- Vendor access procedures
- Implementation guide
Security Operations
Build and operate 24/7 OT security monitoring
OT SOC Design & Build
8-12 weeksEstablish dedicated security operations capabilities for your OT environment. 24/7 monitoring to detect and respond to threats.
SOC architecture design, SIEM deployment, OT-specific use case development, playbook creation, and analyst training program.
- SOC architecture design
- Detection use cases
- Response playbooks
- Analyst training
Compliance & Governance
Multi-framework compliance and policy development
IEC 62443 Compliance Program
6-12 weeksAchieve compliance with the gold standard for industrial cybersecurity. Demonstrate due diligence to customers, regulators, and insurers.
Full IEC 62443 implementation including CSMS development (62443-2-1), security level targeting (62443-3-3), and component requirements (62443-4-2).
- CSMS documentation
- Security level assessment
- Compliance roadmap
Maritime Cyber Compliance (IACS)
4-8 weeksMeet mandatory IACS UR E26/E27 requirements for vessel cybersecurity. Maintain class and demonstrate compliance to flag states.
Gap assessment against IACS UR E26/E27, CBS implementation, network architecture review, and class society liaison support.
- Compliance gap analysis
- CBS documentation
- Class certification support
Incident Response
On-demand response team and forensics capabilities
OT Incident Response Retainer
AnnualGuaranteed response when you need it most. Pre-positioned expertise and familiarity with your environment for faster incident resolution.
4-hour SLA, pre-staged forensic toolkit, environment familiarization visits, tabletop exercises, and integration with your IR procedures.
- Guaranteed response SLA
- Environment documentation
- Annual tabletop exercise
- Retainer hours bank
OT Digital Forensics
As neededDetermine what happened, how it happened, and what was affected. Evidence-quality investigation for legal and insurance purposes.
PLC forensics, SCADA log analysis, network traffic reconstruction, malware analysis, and chain-of-custody evidence handling.
- Forensic investigation report
- Timeline of events
- Evidence package
- Recommendations