Industrial Automation and Control Systems (IACS)

Robot working on information security

Kiwa offers cybersecurity solutions for the most diverse organisations

From organisations that are just starting to shape their OT cyber security to companies that are already making OT cyber security a high priority. The cyber security approach of Kiwa is summarised below in 5 steps. Within these steps, we offer several services to help you through each step:

    Inventorying the situation

    We map the digital resilience of your organization. Based on a baseline measurement on both organizational and technical level you know exactly where you stand.

    Coming up with an action plan

    Together with you we determine which level of digital resilience is appropriate for your organization and set a step-by-step plan to achieve this. This gives you clarity and overview.

    Implementing the plan

    We make your organization digitally resilient. We help you to implement your cybersecurity policy or enable you do it entirely yourself, supported by our consultancy or workshops.

    Sustaining digital resilience

    We keep your organization digitally resilient. We manage cybersecurity for you or help you to do it yourself. This way you are always in control.

    Certification

    To create extra value and regularly assess your digital resilience, Kiwa offers cybersecurity certification services such as IEC 62443, the international standard for cybersecurity for Industrial automation & Control Systems (IACS).

Operational Technology (OT) security requires a different and specific approach when compared to IT security because the priorities and technology differ. At Kiwa we have the right OT experts to address the IACS and OT related cyber security concerns ranging from compliancy to consultancy. 

Operational Technology (OT) consists of hardware and software that detects or causes operational activity through the direct monitoring and/or control of physical processes through the use of devices, systems and technology. OT is found in several industrially oriented environments such as critical infrastructure and factories. Some examples of OT assets are: PLC’s, SCADA systems and Building Management Systems. As this technology and data utilisation advances and converges with other technologies, OT security is becoming increasingly important.

NL_ Cybersecurity 10.jpg

Where cyber security is often taken into account when designing IT environments - due to, among other things, the sensitivity of information and the direct connection to the internet – this is much less the case with OT environments. Previously, operational technology was often separate from other systems and the internet, which decreased the importance cyber security. However, due to digitisation and increasing need for data exchange, the OT and IT worlds are becoming increasingly interconnected. Linking these environments brings new risks that affect the digital resilience of the entire organisation. Tackling these requires a combination of knowledge of the OT domain as well as in depth cyber security knowledge.

Combined expertise

At Kiwa we have the subject matter experts at hand to guide you with various OT security related concerns. With our expertise in cybersecurity and as authority on testing, inspection and certification (TIC), all the knowledge is in-house to help organisations inventory, assess, certify and maintain digital resilience.

How can an organisation defend itself in the digital space?

Contact

Contact us

Send us an email