
Solutions to manage cyber risk within control and safety systems.
-
Control Vault
Initially designed as a repository for project documentation, now uses Retrieval-Augmented Generation (RAG) for Domain-Specific AI tuning to build a model of your asset as a powerful tool to help with your cybersecurity program
-
Industrial Communications
Cybersecurity Risk Assessments workshops or CHAZOP studies can be carried out either remote facilitation or on-site as required. We specialise in both existing site or greenfield project sessions.
-
Protocol Converters
A design analysis usually takes two phases, an initial first pass during early FEED, followed by a final assessment before detailed design. We can guide your MAC Vendor to ensure security is baked into the design right from the start.
-
System Testkits
From our experience, summerising risk to people and equipment is a difficult task, especially from older assets. We have developed methods to quantify risk to help Insurance assessments to correctly assess the risk level saving money on premiums.
-
Asset Database
You can’t protect what you don’t know you have. One of the hardest tasks in securing your OT asset base is the inventory register. This is at the very heart of any cybersecurity program. Intrusive scanning of networks may work at Level 2 or 3 but Level 1 can be problematic. We have developed systems to accelerate discovery of all of your automation infrastructure
