Cybersecurity for Control Systems
Cybersecurity for Control Systems
Operational Technology Cyber Security strategies differ significantly from those used to secure Information Technology. Chinook’s Cybersecurity for Control Systems practice helps organizations improve the security posture of their Operational Technology, including Facility-Related Control Systems (FRCS) and Industrial Control Systems (ICS).
Operational Technology Cyber Threats
Today’s facilities have abundant control systems for monitoring and managing building operations from heating, ventilation, air conditioning, electrical power, fire alarm, and lighting to access control, telecommunications, and transport.
Those systems are interwoven with computer processors, firmware, network connectivity, and IoT-based monitoring. Without appropriate cybersecurity safeguards, the Operational Technology which makes your buildings smarter puts your organization at risk. This is especially true as IT and OT converge.



Improving Operational Technology Cyber Security
Building an Operational Technology Cyber Security strategy starts with understanding the functions and needs of the OT ecosystem. That understanding is crucial to gauging cyber risk and objectives around any organization’s CIA Triad (Confidentiality, Integrity, Availability).
Unfortunately, many cybersecurity experts severely lack Operational Technology experience. This lack of OT qualifications and experience introduces a level of risk. Availability must be maintained through OT hardening.
Fortunately for Chinook clients, our cybersecurity professionals draw from decades of FRCS and ICS experience.
Cyber Commissioning
To help make facilities and Critical Infrastructure resilient, Chinook offers a full range of cybersecurity consulting services.
Strategic
Executive management strategies and consulting services tailored to your organization’s needs.
Tactical
Processes and training to categorize, prioritize, assess, and authorize your Operational Technology.
Operational
Workforce effort to inventory, test, and establish an improved OT security posture.
Chinook Cybersecurity employs Critical Infrastructure Cyber Community (C3), NIST, and RMF processes to promote secure OT.





