Resilient. Secure. Compliant. NERC CIP and ICS/OT Security. We keep you ahead of your adversaries - and your auditors.

ICS/OT Security Programs

 
power lines city iStock-495211489.jpg
 

Serious Protection

 

Ampyx Cyber provides a wide range of cyber and physical security consulting for industrial organizations. Below are some of the more common services we offer.

 
 

Security Program Development and Implementation

Depending on your organization, you may be lacking the right people, processes, and technology for an effective ICS/OT security program. Ampyx Cyber offers an assortment of full-service programs tailored to your unique business, size, and industry that are designed to make your security program relevant, actionable, sustainable, and affordable. Whatever your organization needs — from organizational structure, developing security policy, monitoring and visibility, incident management plan, security architecture (e.g. separating OT networks from IT), threat and vulnerability management, and even staffing — we’ve got you covered. We can show you how to demonstrate value from the security program through measurable cybersecurity improvements.


nuts_bolts.png

Asset Inventory and Management

You don’t know what to defend if you don’t know what you have. A complete and accurate inventory of your critical ICS/OT assets is fundamental to the success of your business in key areas such as loss prevention, regulatory compliance, configuration management, vulnerability management, incident response, disaster recovery, business continuity, and even supply chain risk management. We can assist with any scale of project from manual tracking to implementation of automated tools.


architecture-squre.png

Secure ICS/OT Architecture and network segmentation

Whether you are building out a new ICS network or adding/replacing some operational technology, the system should be designed for safety, dependability, and simplicity, but also for security. From zero trust to intelligent islanding and ransomware mitigation, your organization needs to continue operating - even while under attack. We can show you how to build a resilient operations network that you can actually defend if (when) needed.


broken-glass.png

Vulnerability Assessment and management

No. We won’t fire off a scanner in your OT network (unless you’re really really sure you want to do that). Vulnerability assessments in the ICS/OT space usually require a much more delicate and manual approach with either no-touch or very little interaction where possible. We assess the environment through configurations, firmware versions, settings, and architecture review to give you a thorough understanding of your vulnerabilities without causing any “unscheduled outages.”