Special Core Capabilities
Conduct Risk Assessments that comply with Australian Cybersecurity legislation, using industry standards and frameworks including:
ISA / IEC62443-4-1-2018
Australian Energy Cybersecurity Framework (AESCSF)
SANS Institute 20 Critical Control
USA Government National Institute of Standards and Technology (NIST) Cybersecurity Frameworks
USA Government Department of Energy Cybersecurity Capability Maturity Model (C2M2)
Industrial Cybersecurity Services
Industrial Cybersecurity has been experiencing rapid growth that parallels the increased adoption of externally accessible networks in the Operational Technology (OT) domain. Rising incidents of cyber attacks has increased awareness and accelerated the adoption of cybersecurity approaches.
However, the high complexity of OT cybersecurity and unclear return on investment (ROI) benefits are creating ambiguity among end users:
Incorrectly applied standards are common in industrial settings. This may include trying to apply IT best practices to OT environments, resulting in efficiency loss for every little gain.
While IT and OT convergence is happening at a rapid pace, the lack of personnel with skills across both domains remains illusive.
The rapid adoption of Industrial Internet of Things (IIoT) devices raises the risks even further.
Vernetzen's Unique Value Proposition
Vernetzen is an Industrial Network and Cybersecurity specialist, focused on delivering practical solutions to enhance and secure industrial networks.
Vernetzen has the expertise to bridge the IT - OT gap. The team consists of experienced traditional engineers (e.g. electrical, chemical, mechanical) with highly regarded networking certifications, as well as traditional network engineers with direct exposure to and familiarity with operations and OT.
Deploying teams with cross-skilling is very important in minimising misunderstandings between experts across the two domains (which itself can constitute a risk). The Vernetzen team is adept at interfacing with operational teams to understand their unique OT requirements, resulting in risk assessments that are more relevant to the production process, with practical advice that balances the security risks with the imperatives of production.
The exposure of an organisation's OT network to the outside world is gathering pace. Businesses are using advances in the Industrial Internet of Things (IIoT) to drive new efficiencies, such as remotely operated equipment and extensive data acquisition and analysis from OT end points. Third-parties are providing legitimate services remotely over the internet - alongside potential harmful actors. Properly designed OT networks offer increases in operational efficiency, increased production, improved data gathering and analysis and improved safety, As OT networks grow in size and complexity and become accessible via the internet, risk of malicious cyber attacks grow too.