Gerrie

Cyber Security

banner

In a world where cyber-attacks are becoming more common and more expensive, it’s critically important to know if your company is prepared. Do you have the necessary precautions in place to stop a cyberattack from happening? Are you ready to respond immediately to help mitigate the effects of a cyber incident?

Our Cybersecurity Preparedness Assessment will help you identify areas to prioritize as well as how to implement industrial cybersecurity best practices.

Upon completion of the assessment, we will provide you with your Cybersecurity Preparedness Score based on the NIST Cybersecurity Framework. You will also receive a full customized report that will allow you to dive into your results, get recommendations on how to improve your score, and compare yourself to industry averages. This quick 10 minute assessment will help you learn: How your organization compares to industry peers Where your largest gaps are in terms of known best practices in OT cybersecurity Recommended steps to prioritize and close gaps.

Continue below to check out a Comprehensive Resource Guide, Cybersecurity Discussion Video and the Research Report with all the top findings.

*All information provided will be confidential and not shared.

comprehensive resource guide

The Comprehensive Resource Guide for Securing Critical Infrastructure
Cybersecurity Best Practices for Protecting OT Organizations 

Critical Infrastructure organizations are undergoing digital transformation, digitizing processes and adopting Internet of Things (IoT) technology to improve efficiency and reliability. The resulting connectivity of operational technology (OT) to the internet and the convergence between OT and IT have created extreme efficiencies, as well as new vulnerabilities and exposure to cybersecurity threats. Many of the principles for defending your IT environment apply to industrial control systems (ICS), supervisory control and data acquisition (SCADA) systems and other OT. But securing OT has additional complexities and considerations. 

We’ve created this resource guide with more than 80 useful reference links, categorized and described, to provide shortcuts for learning about the evolving Critical Infrastructure threat landscape, the modern industrial cybersecurity practices used for defense, and steps to formulating your own plans and strategies. Download this Resource Guide to learn:

  • OT Cybersecurity Basics and Best Practices
  • Regulations: CISA (US and US gov't), Legal, NIS Directive (EU)
  • Cybersecurity Roadmaps to Follow: NIST, MITRE ATTandCK, Sector-Specific Guides (US), IEC 62443, CAF (UK)
  • NIST Breakdown (5 components) - Identify, Protect, Detect, Respond, Recover
  • Resources for Designing an OT Architecture + Zero Trust and John Kindervag
  • Understanding the US CI Grant: Use Rockwell Automation 's Free Plan Template
  • Industry Specifics, such as Water/Wastewater, Utilities, Pipelines, Manufacturing

The Big Shutdown: Cybersecurity Preparedness in Critical Infastructure; Featuring Dawn Cappelli & Greg Touhill

Rockwell Automation and ISMG conducted a research survey to gauge cybersecurity preparedness in Critical Infrastructure industries. In this discussion cybersecurity professionals, Retired U.S. General Gregory Touhill (Director of the Software Engineering Institute’s CERT Division) and former Rockwell Automation CISO Dawn Cappelli, review survey highlights, overall implications, and talk next steps for both individual organizations and the industry as a whole.  

This discussion examines: 

  • How a perfect storm is brewing, made up of rising OT attacks, mass disruptions, geopolitical tensions, under-budgeted security programs, common security gaps and enticing financial gains for ransomware criminals.
  • Steps industrial organizations can take to quickly shore up cybersecurity preparedness, including supply chain risk assessments, asset inventorying, continuous threat monitoring and a written incident response plan.
  • How to use the NIST cybersecurity framework as the basis of a reliable, ongoing cybersecurity plan, how to identify and prioritize business critical systems to enable zero trust strategies and develop a cybersecurity plan suitable for a US grant application with Rockwell Automation's free guide.
research report

Cybersecurity Preparedness in Critical Infrastructure: Avoiding 'The Big Shutdown'

This report will provide research and findings where you will learn where and how organizations are succeeding or failing to deploy key cybersecurity measures including these 3 big points:

  1. How to avoid 'The Big Shutdown'
  2. Which vulnerabilities to shore up first
  3. Recommended steps to improve cybersecurity posture