top of page
1-1.jpg

OT Cyber-security Consultant

Identify

  • Cybersecurity Risk Assessment 

  • ​Vulnerability Assessment

  • Cybersecurity requirements specifications (CSRS)

  • Security Architecture design

  • Brown field data collection

  • Design proposals

  • Product selection

Recover

Business recovery planning

Business continuity planning

Computer / Application Backup Management

Protect

Domain Controller (Role Based Access)

Anti-Virus

USB Malware Scanning Appliance

Application Whitelisting

Data Loss Prevention

Patch Management

RADIUS (AAA)

Network Segmentation / Air gapping

Training and Awareness

.

  • .

Detect

  • Security Information and Event Management (SIEM)

  • On access / On demand scan’s

  • DLP

  • Nozomi Appliance

Respond

  • Incident response procedure

  • Preparation support Risk analysis

  • Risk mitigation

bottom of page