Great cyber security in your ICS/OT environments starts with understanding your specific business priorities, operations, and technical infrastructure. No two organizations are the same, which means that the challenges and priorities vary, especially amongst industrial and automation infrastructures across all industrial verticals. Our work starts at the point of greatest impact for our clients. From compliance to threat hunting, assessments to full penetration tests, strategy to implementation, and all steps in between, LEO’s world-class team of ICS cyber security experts is equipped to address them all.
IT/OT & ICS Solutions
LEO’S ICS CYBER SECURITY PRACTICE MISSION IS TO PROTECT THE RESILIENCY, SAFETY, SECURITY AND EFFICIENCY OF AUTOMATON AND CONTROL SYSTEMS
LEO intends to be a long-term partner that can understand and advise on the ever-evolving threat landscape while fully understanding the consequences and impacts of each potential threat to operations and safety. By leveraging our talent, LEO builds unique solutions and educates clients by providing guidance and resources in an environment where we thrive in with respect to operational risk management. We help our clients build and mature their cyber security programs, and this starts by understanding their specific business, operations, and risks. We help identify and assess the risk to your operations and business and then help build and deploy the most efficient and cost-effective risk mitigation, consequence and impact reduction strategies, and cyber security programs according to their specific needs and resources.
54% of Companies Experienced an ICS Security Incident in the Past 12 Months
- 3 to 5 times
- 6 to 10 times
- 11 to 25 times
- 3 to 5 times
- 6 to 10 times
- 11 to 25 times
*The State of Industrial Cybersecurity 2017, The Business Advantage Group Ltd
WE ARE HIGHLY EXPERIENCED, SKILLED, AND UNIQUELY QUALIFIED
In order to properly secure, protect and advise on ICS cyber security strategies, a trusted advisor and execution partner must truly understand their client, the industries they operate in, the challenges they face daily and the associated risks. The ICS security team within LEO adds to this by bringing highly experienced, detailed focused ICS expertise that understand the consequences, impacts and nuances within automation and control systems environments. We offer one of the largest ICS cyber security talent pools, comprised of some of the industry’s most skilled and tenured professionals. Whether our personnel are Chief Information Security Officers (CISO), security architects, engineers, analysts, or penetration testers, all of our staff have extensive experience within organizations providing front-line security operations and management in both IT and ICS/OT environments. Our expertise has been cultivated from years of evaluating programs, assessing, monitoring and implementing security controls in both IT and ICS/OT environments, including monitoring networks and systems, doing ICS system validation and acceptance testing and responding to incidents.
Our staff comes from recognized world-class industrial organizations including Idaho National Laboratory (INL), Federal Energy Regulatory Commission (FERC), Department of Defense (DoD), Electric Reliability Council of Texas (ERCOT), Shell, General Motors (GM), Marathon Oil, Phillips 66, Rockwell Collins, Comanche Peak Nuclear Power Plant, Department of Energy (DoE), Department of Homeland Security (DHS), Siemens, Portland General Electric, and more.
LEO'S “ALL TEAM” APPROACH
When you hire LEO, you have access to our entire team of world-class ICS cyber security experts throughout the duration of the entire project. LEO maximizes the efficiency and quality of every project by deploying a holistic team engagement strategy, rather than limiting the participation to a couple of specifically assigned personnel. Furthermore, all LEO staff are thoroughly vetted, full-time employees, not subcontractors.
LEO'S ICS CYBER SECURITY SERVICES
Some of the services our ICS team focuses on providing around the globe are but not limited to:
- ICS Security Program Advisory, Creation and Maintenance
- ICS Systems Security Engineering & Security Architecture (Including FAT, SAT, Commissioning)
- ICS Cyber Security Assessments (Risk, Threat, Vulnerability, Consequence & Impact)
- ICS Standards, Regulatory and Compliance Assessments
- ICS Cyber Security Penetration Testing
- ICS Cyber Security Training (Awareness, Tabletop Exercises, Advanced Security Methods)
- ICS Cyber Security Monitoring, Detection, Threat Hunting
- ICS Cyber Security Compromise Assessments
- ICS Cyber Security Incident Response
- ICS Security R&D and Thought Leadership
- Community Outreach & Educational Programs
- ICS Security Manager as a Service
ABOUT LEO CYBER SECURITY
LEO is a seasoned team of cyber trailblazers and creative practitioners who have the deep experience and operational knowledge to combat the cyber skills gap. From information security program / policy development to virtual security experts to on-demand threat hunting and response, LEO delivers tailored security solutions to your organization through creativity, experience, and commitment.