IT/OT & ICS Solutions

Great cyber security in your IT and OT environments starts with understanding your specific business priorities and technical infrastructure. No two organizations are the same, which means that the challenges and priorities vary, especially amongst energy companies.

From compliance to threat hunting and all steps in between, our work starts at the point of greatest impact for our clients. LEO intends to be a long-term partner that can understand and advise on the ever-evolving threat landscape while fully understanding the impacts and outcomes of each potential threat.

We are confident in our position and statement of qualifications: In order to properly secure, protect and advise on cyber security strategies, a Trusted Advisor must truly understand their client, the industries they operate in, the challenges they face daily and the associated risks.

54% of Companies Experienced an ICS Security Incident in the Past 12 Months

  • Once
  • Twice
  • 3 to 5 times
  • 6 to 10 times
  • 11 to 25 times

*The State of Industrial Cybersecurity 2017, The Business Advantage Group Ltd

LEO’s mission is to protect the reliability and efficiency of our clients’ operations

By leveraging our talent, LEO builds unique solutions and educates clients by providing guidance in an environment where we thrive in with respect to risk management. We help our clients build and mature their cyber security programs, and this starts by understanding their specific business, operations, and risks. We help identify and assess the risk to their operations and business and then help them build and deploy the most efficient and cost-effective risk mitigation strategies and cyber security programs according to their specific needs and resources.

We are highly experienced, skilled, and uniquely qualified

At LEO, we offer one of the largest ICS cyber security talent pools, comprised of some of the industry’s most skilled and tenured professionals. Whether our personnel are Chief Information Security Officers (CISO), security architects, engineers, analysts, or penetration testers, all of our staff have extensive experience within organizations providing front-line security operations in integrating IT and OT security management. Our expertise has been cultivated from years of evaluating programs, assessing security controls in the IT and OT environment, monitoring network and systems, and responding to incidents.

We have more than 100 years of combined experience specifically in ICS Cyber Security and each member of our staff possesses a minimum of 10 years of experience that includes experience in operational environments.

Our staff comes from recognized world-class industrial organizations including Idaho National Laboratory (INL), Federal Energy Regulatory Commission (FERC), Department of Defense (DoD), Electric Reliability Council of Texas (ERCOT), Shell, General Electric (GE), General Motors (GM), Marathon Oil, Phillips 66, Rockwell Collins, Comanche Peak Nuclear Power Plant, Department of Energy (DoE), Department of Homeland Security (DHS), Siemens, and Portland General Electric.

LEO's ICS Cyber Security Team

When you hire LEO, you have access to our entire team of world-class ICS cyber security experts throughout the duration of the entire project. LEO maximizes the efficiency and quality of every project by deploying a holistic team engagement strategy, rather than limiting the participation to a couple of specifically assigned personnel. Furthermore, all LEO staff are thoroughly vetted, full-time employees, not subcontractors.

Clint Bodungen
Vice President, ICS Cyber Security
Trailblazers often leave their mark, but every now and then, some even help build an entire industry. Clint has done just that. With more than twenty years of experience, he is one of the original pioneers of the Industrial Control Systems Cyber Security industry. From the deep technical trenches to the “C-Suite”, few people in the world have been doing it longer. Now, Clint is a frequently requested public speaker, a published author in the iconic “Hacking Exposed” series, and is regarded as one of the industry’s leading experts. At LEO, he is our resident “industrial hacker” and heads up our Industrial Cyber Security Business.
Isiah Jones
Director & Principal ICS Cybersecurity Engineer
Isiah Jones has over 13 years of progressive experiences in various aspects of IT, security, assurance, and ICS. In 2014 he decided to work exclusively on ICS security and has since performed work in the Middle East, East Africa, Europe, Hawaii, and throughout the United States. Isiah has delivered ICS security for the US Navy, US Marine Corps, Siemens, and FERC in addition to various asset owners and operators across several sectors and asset type verticals. He has held national security clearances as high as TS/SCI and Q. Isiah also carries a network of affiliations that reach into various parts of the US intelligence community, Defense community, Congress, FERC, Department of Energy, Depart of Homeland Security, Department of Commerce, various National Labs, ICS vendors, ICS integrators, and asset owners/operators. He brings well rounded experiences, access, insights, connections and visibility into critical infrastructure security issues across many asset types (water, electric, oil, gas, building automation, airfields, maritime, hydro dams, manufacturing, logistics & warehouse, ERP etc) that is rarely found publicly and hard for asset owners and operators to encounter regularly.
BSc, MSc, Security+, C|CISO, GICSP, CISSP
Credentials
Rob Beason
Cyber Security Manager and ICS Cyber Security Architect
Rob Beason has demonstrated cyber security experience in multiple roles over the last 20 years. He started his career in the US Army supporting tactical communications for operational units on a global scale, has been a network security analyst at large oil and gas companies, and held positions as a security analyst and security operations manager for Idaho National Laboratory. He is an advocate for growing diversity in the cybersecurity industry and is actively engaged in volunteer organizations. His recent volunteer work includes helping the Idaho chapter of Infragard and Idaho Falls BSides.
CISSP, GSLC, Security+
Credentials
Rod Holmes
CISO
Rod Holmes has worked in some form of cybersecurity for nearly 30 years and has a healthy passion for protecting information. Beginning his career at Johnson Space Center, Rod rose through the ranks to become a leading security leader at Marathon Oil. Rod has designed and managed corporate information security programs, including multiple initiatives to integrate operational technology security in the industrial control systems (ICS) world with corporate IT security. Rod is a Certified Information Systems Security Professional (CISSP) and has advanced degrees from Texas A&M University.
MS, MBA, CISSP
Credentials
Jeremy Wilkinson
Cyber Security Professional
Jeremy Wilkinson is an experienced, educated, and certified Cyber Security Professional with demonstrated success in Cyber Security, Network Engineering, Project Implementation, and Quality Assurance. He has expertise in a diverse range of security and network technologies within a variety of industry settings. Prior to joining LEO, Jeremy held various security roles at Wilks Brothers LLC, Rockwell Collins, Comanche Peak Nuclear Power Plant, and Lightsource Systems, Inc. Equally impressive is Jeremy's international experience supporting various US Department of Defense teams in Afghanistan at HITT Exelis Geospatial Systems and DynCorp International.
B.A.Sc, CSIH, CEH, CISSP, CCNP, CCNA-Security
Credentials
Kevin Lackey
OT, ICS & SCADA Cyber Security Principal
Kevin has been involved in the hacking scene since the early 1980's, his elementary teachers will tell you that he wrote a disk protection system that locked school personnel out of the classroom Apple IIe. Kevin became involved in security for critical infrastructure in 2004 when he became a member of the National SCADA testbed for the DOE and worked in the national lab system for the next several years pursuing innovative approaches for researching and defending ICS systems for the DOE & DHS. Kevin then moved into defensive side of the house for the last 8 years helping to secure critical infrastructure for both ERCOT and General Motors. Kevin brings a unique perspective to cyber security being one of the original ICS security pioneers that has spent considerable time on both red team and blue team programs.
Matthew Anderson
ICS Cyber Security Engineer
Matthew Anderson is our point man for ICS risk assessments, vulnerability assessments, penetration testing, standards compliance, and security policy/procedure design for our clients in the energy industry. Prior to joining LEO, Matt was the Lead Developer and Co-Founder of Derezzed and also held various roles at Kaspersky Lab, Critical Infrastructure Defense Group, U.S. Support, Convergys, and Systems Evolution, Inc. Matt has also served as an Adjunct/Volunteer Cybersecurity Lab Leader for North American University (NAU).
Alexander Claytor
Principal ICS Cybersecurity Strategist
Alexander has 20 years of IT experience, 12 of which in IT cybersecurity & 10 focusing on ICS cybersecurity. His expertise is in Enterprise IT infrastructure security with the past decade specializing in Industrial Operational Technology (ICS/SCADA/IIoT) security. His career goal is assisting enterprises to embed best security practices into their environment & culture via strategic implementation. Alex has owned multiple businesses, worked for some of the largest corporations in the world, & been a contractor for the federal government & various municipalities. He is most at home doing R&D of security-related best practices & being out in the field supervising deployment & commissioning of infrastructure he has often had a key role in architecting. He has been an IT Manager/Director, SCADA/HMI Integrator, Cybersecurity Consultant, owned his own IT consulting/MSP business, and a CISO/Solutions Architect for an MSP.
Brian Foster
Senior ICS Cyber Security Engineer
Brian is an experienced Controls Engineer and OT/ICS Security Engineer. After many successful years in controls and automation, he decided to transition to cybersecurity as it is a lifelong passion. He brings with him an advanced understanding of various control systems and an engineering approach to cybersecurity. Using proven mathematical methods he builds risk models in terms of probability of lost dollars to help drive informed decision making. Brian has found securing critical infrastructure to be his calling. He thrives in the challenging and ever-evolving environment. He believes in a holistic approach that builds bridges and overcomes the traditional divide between OT and IT. A powerful desire to protect the systems of the modern world drives him. Above all else, he strongly believes in keeping all the necessities of daily life that we take for granted safe, secure, and operational

CONTACT US TO LEARN MORE

  • Please complete the following form and one of our team members will get back to you as soon as possible.


    If you would prefer, you may call LEO directly at (530)-FINDLEO

ABOUT LEO CYBER SECURITY

LEO is a seasoned team of cyber trailblazers and creative practitioners who have the deep experience and operational knowledge to combat the cyber skills gap. From information security program / policy development to virtual security experts to on-demand threat hunting and response, LEO delivers tailored security solutions to your organization through creativity, experience, and commitment.