-
21 Jan 2022Power and RenewablesManaging ICS cybersecurity incident response: going beyond containment, eradication and recovery
-
Pierre Janse Van Rensburg, GCIH
Senior Consulting Expert, ICS Cybersecurity
-
-
23 Nov 2021Other industriesIACS risk assessments are a must!
-
-
14 Sep 2021Power and RenewablesDo you have an incident response plan for your industrial control systems?
-
Pierre Janse Van Rensburg, GCIH
Senior Consulting Expert, ICS Cybersecurity
-
-
Other industriesIntegration of the IEC 61850 standard and cybersecurity at the British Columbia Inst[...]
-
Other industriesData centre design for COLO-D
-
03 Mar 2021Power and RenewablesIndustrial control system (ICS) cybersecurity risk methodology webinar
-
José Alvarado, P.Eng., GICSP
Director, ICS Cybersecurity
-
-
07 Jan 2021Power and RenewablesLocal access of ICS devices: a cybersecurity perspective
-
Shayne Casavant, P.Eng.
Senior Engineer, ICS Cybersecurity
-
-
09 Dec 2020Power and RenewablesSegmenting a network for increased reliability and security
-
09 Dec 2020Power and RenewablesCybersecurity tool integration challenges with IEDS in digital power systems
-
Shayne Casavant, P.Eng.
Senior Engineer, ICS Cybersecurity
-
Cybersecurity
Digital transformation offers many advantages to optimize processes, but it also carries risks. As a result, companies must prioritize industrial cybersecurity to protect their operations, their workers and the environment. Because operational technologies (OTs), industrial control systems (ICSs) and information technologies (ITs) are quickly evolving, cybersecurity approaches must also be agile, while understanding that people are an essential part of this dynamic equation.
Cybersecurity
-
Your challenges
-
System digitalization is changing your methods
As an industrial company, you want greater insight into your operational data. You also need to share this useful information across your various production lines and with decision makers who previously couldn’t access it. Data sharing and volume is becoming increasingly important, cloud computing use is on the rise and connectivity across systems is intensifying.
These new practices are now standard in your organization; they’re designed to ensure better cohesion among your teams and to benefit from data analysis so you can remain competitive and innovative. But with these new capabilities comes new risks. This transformation means that your industrial control systems and supply chain management software are facing increased cybersecurity challenges and are making your processes more complex. So, adaptability becomes the watchword.
The importance of people in your cybersecurity strategy
Too often overlooked, people are a key factor when integrating cybersecurity into new or existing technologies and practices. Implementing a new system to mitigate all risks in one fell swoop is not a viable long-term solution. All members of your team must commit to following approved work methods and sharing the responsibility.
That’s why you need to work on your teams’ methods, which have generally been ingrained for years, so they develop new protection reflexes, thereby leaving no potential cybersecurity gaps.
-
-
-
Three pillars supporting our cybersecurity experts’ approach
People BBA’s experts incorporate change management into their solutions, a key success factor. -
Processes BBA’s multidisciplinary teams have mastered industrial processes and understand their challenges.
-
Technologies Before they’re deployed, new technologies are tested in BBA’s cybersecurity labs.
-
-
Our approach
-
Our cybersecurity approach is adapted to the industrial sector
BBA’s multidisciplinary teams have extensive experience in industrial control systems (ICS) and operational technology (OT), as well as in-depth knowledge of regulatory and cybersecurity frameworks and requirements. This holistic vision, from automation to security governance, allows them to identify major issues and risks much more quickly and to integrate proven and, most importantly, operationally effective solutions. Of course, they know that for an effective industrial cybersecurity program, it must reflect the company’s vision and support its growth.
-
-
IACS Cyber Security Incident Response Playbook
The IACS Cyber Security Incident Response Playbook, which combines various internationally recognized IT/OT cyber incident response standards with the Incident Command System, will support the advancement of standards, best practices and guidelines related to protecting critical energy infrastructure.
-
Solutions we offer