Cybersecurity

Secure | Compliant | Efficient

Cybersecurity for Control Systems

Cybersecurity for Control Systems

Operational Technology Cyber Security strategies differ significantly from those used to secure Information Technology. Chinook’s Cybersecurity for Control Systems practice helps organizations improve the security posture of their Operational Technology, including Facility-Related Control Systems (FRCS) and Industrial Control Systems (ICS).

Operational Technology Cyber Threats

Today’s facilities have abundant control systems for monitoring and managing building operations from heating, ventilation, air conditioning, electrical power, fire alarm, and lighting to access control, telecommunications, and transport.

Those systems are interwoven with computer processors, firmware, network connectivity, and IoT-based monitoring. Without appropriate cybersecurity safeguards, the Operational Technology which makes your buildings smarter puts your organization at risk. This is especially true as IT and OT converge.

Cybersecurity Connectivity
Cybersecurity Breach

Improving Operational Technology Cyber Security

Building an Operational Technology Cyber Security strategy starts with understanding the functions and needs of the OT ecosystem. That understanding is crucial to gauging cyber risk and objectives around any organization’s CIA Triad (Confidentiality, Integrity, Availability).

Unfortunately, many cybersecurity experts severely lack Operational Technology experience. This lack of OT qualifications and experience introduces a level of risk. Availability must be maintained through OT hardening.

Fortunately for Chinook clients, our cybersecurity professionals draw from decades of FRCS and ICS experience.

Cyber Commissioning

To help make facilities and Critical Infrastructure resilient, Chinook offers a full range of cybersecurity consulting services.

Strategic

Executive management strategies and consulting services tailored to your organization’s needs.

Tactical

Processes and training to categorize, prioritize, assess, and authorize your Operational Technology.

Operational

Workforce effort to inventory, test, and establish an improved OT security posture.

Chinook Cybersecurity employs Critical Infrastructure Cyber Community (C3), NIST, and RMF processes to promote secure OT.

Certified Ethical Hacker
CISSP
Certified Penetration Tester
Information Assurance
GICSP
SAFe logo
Advanced Security