Helping to Secure your Critical Operational Technology Assets
whAT WE Do
OT Programme Management
Our Project Management team are highly experienced in understanding what it takes to manage a successful OT Security Programme, such as creating initial high-level Management plans including realistic budget and resourcing metrics ensuring C Level buy-in to producing detailed Execution Plans. These frameworks allow for the planning, execution and detailed monitoring of the OT Programme delivery ensuring full programme visibility from the Project implementation Team up to the C-Level. We can offer a full turnkey solution or integrate with your existing resources to ensure that your OT Security programme can be executed in a predictable, timely, cost effective manner.
Asset Discovery and Analysis
Although every asset owner aspires to have a full, concise and up to date asset inventory, OTegral understands that often, the reality of a facilities documentation often falls far short of this. Our engineering team appreciates the challenge of gathering and maintaining this data and can assist to assemble a precise asset list using a combination of automated asset discovery tools as well as more traditional manual techniques such as Firewall and Switch log analysis, Network Packet capture and tried and if required on-site surveys.
OTegral can then translate these datasets using our in-house data translation tools to automatically produce useful output documentation such as Asset Databases, Data Flow and Interdependency Diagrams and Reference Architectures.
Security Risk Assessments
We utilise our own Risk Assessment tool to ensure that the OT Security Risk Assessments (SRA) we carry out are in accordance with the most relevant standard(s) to your industry and location such as IEC 62433-3-X, US NIST 800 series and OG-0086 and are based on site level risks rather than organisational. This ensures that the subsequent risk control measures are based on a mixture of technical, procedural and managerial protection measures. OTegral can offer a full service of Risk Assessment activities from initial High-Level Risk Assessments, Detailed Risk Assessments and ongoing Periodic Cybersecurity Audits.
Protective Controls Implementation
One of the most specialised aspects of an OT security programme is understanding the differences in implementing Risk Control Measures in an Operational Technology environment as opposed to a traditional IT environment. Our teams appreciate the unique challenges of OT and what is required to implement the various security controls available (such as Workforce Management and Training, Introduction of specific OT Policies and Procedures, Network Segmentation, System Hardening and Vulnerability Management) to ensure that Risk Reduction is achieved in accordance with agreed OT Execution Plan timescales and costs.
WHY WORK WITH US?
Translating Theory into Action
At OTegral we appreciate the challenges of taking the output of a Risk Management strategy, and turning into clear, realistic actionable steps in Production Environment. We specialise in planning and implementing Protective Technology to ensure that applicable security controls can be rolled out as quickly as possible whilst minimising manufacturing downtime.
We pride ourselves in our ability to work with the key stakeholders to understand the often conflicting needs of Security Programmes and Manufacturing Availability to implement practical solutions to meet the overall needs of the Business.
Our approach
Understanding the priorities of your organisation
Having full comprehension of the processes and the criticalities of the Business overall is essential to the success of an OT Security programme.
OTegral’s Consultants therefore take the time to understand the interdependencies of the various Industrial and Enterprise processes to ensure that the phasing of any work is implemented with the minimum amount of disruption to all areas of the Business.
