Who we are…
Ampyx Cyber is a specialized, services-only, international consulting firm with operations in North America and Europe. We focus on industrial control systems (ICS) and operational technology (OT) security. We help you keep the lights on, water pumping, gas flowing, transportation moving — and all other industrial technologies safe and secure. Protecting industrial control systems and operational technologies is our craft.
We set out to build a different kind of firm with a unique concentration on the industrial ecosystem, comprised of people who have dedicated their careers to it. Our consultants are carefully selected for their productivity, professionalism and integrity as well as their deep industry knowledge and regulatory/standards experience.
We are technology-agnostic. We don’t make, sell, or promote any specific hardware or software. This allows us to work with what you have, and ensures our recommendations are free from influence. We can work with all available options to provide you with the best fit for your unique situation.
We understand the industrial world. We have been operations staff, security practitioners, and management at industrial asset owners. We’ve worked within equipment manufacturers. We have drafted and influenced regulations and international standards. We have even been the federal regulator performing the audits and issuing the violations. We’ve seen your world from all sides. But most importantly, we tell it to you plain and simple, straight and honest - without wasting your time.
Client confidentiality is very important to us. As such, we do not list our customers on our website. Please contact us for a list of references.
Credentials
Professional Certifications
CIPC: Critical Infrastructure Protection Credential - Ampyx Cyber
GCIP: GIAC Critical Infrastructure Protection - SANS Institute
CISSP: Certified Information Systems Security Professional — International Information Systems Security Certification Consortium (ISC2)
ISSAP: Information Systems Security Architecture Professional, CISSP Concentration — International Information Systems Security Certification Consortium (ISC2)
SSCP: Systems Security Certified Practitioner — International Information Systems Security Certification Consortium (ISC2)
CISA: Certified Information Systems Auditor — Information Systems Audit and Control Association (ISACA)
CRISC: Certified in Risk and Information Systems Control - Information Systems Audit and Control Association (ISACA)
DHS-CVI: Department of Homeland Security Certified Chemical-terrorism Vulnerability Information Authorized User – DHS
CEH: Certified Ethical Hacker — EC Council
NSA IAM: National Security Agency Information Assessment Methodology — INFOSEC Assessment Training and Rating Program (IATRP)
SCP: Snort Certified Professional — SourceFire
TCP: Tripwire Certified Professional — Tripwire
Professional Experience Highlights
First and former Manager of NERC CIP Compliance Audits and Investigations at WECC
First NERC CIP auditor in North America
Led and/or participated in (>100) NERC CIP Audits in all NERC Regions
Drafting of sections of NERC UAS 1200/1300 and NERC CIP versions 1/2/3
Drafting of multiple NERC CIP Interpretations
Contributing member to NERC CIP Supply Chain Working Group (SCWG) guidance publications
Contributing member to NERC Security Integration and Technology Enablement Subcommittee (SITES) guidance publications
Contributor to NERC/ERO Auditor Manual and Guidance
Speaker/contributor to multiple FERC Technical Committees
Regular public commentary on FERC NOPRs and Orders
SANS ICS456 GCIP instructor
SANS ICS Summit Advisory Board
EnergySec NERC CIP Bootcamp instructor and content developer
EnergySec Founder, Director and President Emeritus
Centro de Ciberseguridad Industrial (CCI) US Coordinator
Industrial Security Conference Cophenhagen (ISC CPH) Advisory Board
RSA Conference Program Committee
Cyber Senate Steering Member for Industrial Control Cyber Security
DOE National Electric Sector Cybersecurity Organization (NESCO) Principal Investigator
NARUC/NASEO Cybersecurity Advisory Team for State Solar (CATSS) Advisory Group
NARUC/DOE Cybersecurity Advisory Group
National Telecommunications and Information Administration (NTIA) and Idaho National Lab (INL) Software Bill of Materials (SBOM) Energy POC Stakeholders
DOE Solar Energy Technology Office (SETO) and National Renewable Energy Lab (NREL) Industry Advisory Board (IAB) for the Securing Solar for the Grid (S2G)
Named contributor to DHS CISA Cyber Performance Goals (CPGs)
Advisory Board for Industrial Security Conference, Copenhagen (ISC CPH)
Winter Olympics Electric Utility Operations Cybersecurity Lead
Advisory (direct or Advisory Board Member) to multiple industrial security product vendors
Former utility staff (multiple utilities, telecommunications, water & energy)
Alliances
If we’re not experts at it, we know someone who is. This gives our clients access to our wide professional ecosystem - through Ampyx Cyber - to minimize the need for multiple contracts. We’re very proud to have agreements with the following top-notch companies:
Convergence Controls & Engineering
Convergence designs, programs, and supports industrial automation systems across all major industries including energy, food and beverage, water treatment, manufacturing and more. Convergence further helps companies get real-time data from their production equipment for dashboarding and enterprise wide reporting. Services include system engineering, specification, project management, procurement, control panel design and fabrication, commissioning services and 24x7 support. From Allen-Bradley to Zedi, IO to SCADA, Power and Control, we design, fabricate, commission, support and manage all of your electrons within your facility.
Cutaway Security
Cutaway Security, a veteran owned company, is a team of seasoned information security professionals who stand ready to assist you with your daily or emergency security efforts. We feel that security starts with a solid foundation of understanding an organization’s assets, people, and business requirements. We will leverage this philosophy and our unique experiences in the manufacturing, energy, media, and service industries to help accurately scope and complete your next security effort.
Egede industrial cybersecurity
Egede is a distinguished leader in industrial and critical infrastructure cybersecurity, offering an extensive range of expert services to safeguard complex systems and environments. With years of specialized experience, Egede stands as a trusted advisor in cybersecurity, providing comprehensive solutions from security design and architecture to in-depth technical tasks such as malware analysis and cybersecurity assessments. Recognized for its "offensive thinking" approach, Egede delivers tailored industrial cybersecurity analyses, penetration testing, and application testing, ensuring reliable protection tailored to the unique needs of each client. Committed to excellence and innovation, Egede's team of seasoned professionals is dedicated to advancing the standards of cybersecurity, making them a preferred partner for both large and small companies looking to fortify their defenses against evolving threats.
Full circle strategic communications
A woman-owned business founded in 2006, FullCircle Communications LLC is a boutique consultancy specialized in cybersecurity, cybersecurity education, and strategic support services in engineering and related disciplines. Our customers and partners include the Department of Defense, the State of California’s Manufacturing Exchange Partnership with the National Institute of Standards and Technology, South Carolina, Michigan, and Universities. We maintain a strong network of companies, Universities, FFRDCs, and consultants to ensure the strongest and best support to our customers and partners.
GRIMM
GRIMM is a forward-thinking cybersecurity organization led by industry experts. The company's practice demonstrates the impact of security risks and provides technical solutions to address top risks. GRIMM's expertise is built on operational experience in solving advanced cybersecurity problems.
ICS|AP
The ICS Advisory Project was created by Dan Ricci to provide smaller OT asset owners, CISOs, cybersecurity analysts, and researchers with an analysis tool that allows them to quickly identify threats and vulnerabilities by product, vendor, common weaknesses, critical infrastructure sector, and known exploited vulnerability. Our interactive dashboards are the result of countless hours of research, analysis, and data enrichment by Dan and a few volunteers using publicly available threat/vulnerability data such as CISA ICS Advisories, CVEs, MITRE ATT&CK, and ICS Vulnerability Researcher Scoreboard.
IICS Alliance
The International Industrial Control Security Alliance (IICS Alliance) is a global ecosystem of best-in-class firms focused on ICS/OT cybersecurity. We empower OT/ICS and infrastructure businesses globally by integrating superior, tailored cybersecurity services, ensuring comprehensive protection and resilience against evolving digital threats. Ampyx Cyber is a founding member of the IICS Alliance.
INPOWERD
INPOWERD LLC is a verified Veteran Owned Small Business (VOSB) specializing in power grid operations, North American Electric Reliability regulatory compliance, risk management, physical and cyber security for the electric utility industry. INPOWERD provides strategic consulting services to clients across the United States and Canada. INPOWERD services also include executive leadership programs and coaching, strategic plans, business start-up and continuity plans, technical writing (policies and procedures), and certified training development and facilitation.
insane cyber
Founded in 2020 by Dan Gunter, Insane Cyber has quickly established itself as an upcoming leader in the cybersecurity space, focusing on using automation to protect critical infrastructure and operations in the energy, data center, government, oil and gas, and other sectors. The proprietary Valkyrie Automated Security platform provides proactive and reactive protection for operational technology, leveraging powerful automation to monitor host and network data. Valkyrie is currently trusted by multiple Fortune 200 companies.
Karta
Karta is a software consulting firm that supports North American electric utilities with software solutions for NERC Compliance, Supply Chain Risk, Business Resiliency, IT Vulnerability, OT, and other governance, risk, and compliance (GRC) process needs. Karta provides a proven service delivery and effective solutions, focusing on adding value and continuity for painless GRC implementations. Karta serves all utilities, from small generators to ISOs, to large multi-organizational utility enterprises.
Manifest
Manifest is a venture-backed cybersecurity company focused on operationalizing software bills of materials (SBOMs) to help organizations reduce their supply chain risk. In the wake of several prominent software supply chain vulnerabilities (Log4j, Apache Struts, etc.), enterprises are turning to SBOMs to understand what open source and third party libraries are in their environments, especially in their OT/ICS where software lasts for years. While SBOM generation tools are proliferating, enterprises lacked a solution to consume and derive insights from those SBOMs - until Manifest. We provide SOC teams with a comprehensive software inventory, enabling them to answer the question, "Where do I have Log4j?" in seconds instead of weeks; enable Product Security to respond quickly and securely to SBOM regulations and requests; and enable GRC and third-party risk teams to easily and simply quantify the risk in vendor applications.
Opscura is a leading provider of drop-in operational technology (OT) security, protecting and connecting industrial networks through innovative and easy to implement solutions. Global customers rely on Opscura's OT Security Protection platform for network segmentation, cloaking, isolation, and Zero Trust authentication, together with simplified IT-OT connectivity. With solutions that can be deployed instantly and with near-zero downtime, Opscura reduces operational risks by protecting vulnerable legacy assets and data, enhancing threat visibility and eliminating deep-level attacker footholds.