Hudson Cybertec will be developing one of the first 24×7 central network monitoring platforms for use in the Operational Technology (OT). It enables centralized monitoring capabilities for companies using industrial systems and networks.

Security Operations Centers (SOC’s) have been in use by Information Technology (IT) for some time now. Recent IT-OT convergence trends would suggest adding OT to an IT-SOC is a no-brainer. However, an IT-SOC will be missing essential functionality when used in an OT environment. This led us to developing our own OT-SOC using our OT security specialism and subject matter expertise on the IEC 62443 standard. A company specialized in IT security will have a hard time adjusting to OT operations. On the surface IT and OT may look similar. Both use computers and servers for example, but there’s quite a large difference in how this equipment is used and that’s not even including sensitive real-time systems or specialized computers.

OT-SOC

The goal of the OT-SOC is to monitor all devices related to OT, even the ones that fall into grey areas of responsibility. Currently in trial runs, it’s expected that the first big clients will be benefiting from this central monitoring platform this year. This fits perfectly with the current trend of permanent control of network intrusion, including attempts (intrusion detection), penetration testing and entering a building as ‘mystery guest’. In the SOC, Hudson Cybertec combines the knowledge of many different OT-protocols with totally different markets of our customer base. Varying from oil drilling installations, infrastructure and chemical production to water management and water treatment facilities.

Standards development

Different standards apply to security in almost all markets in which Hudson Cybertec operates. However, the cybersecurity standard IEC 62442 for Industrial Automation & Control Systems (IACS) is leading. Hudson Cybertec has its own ‘Academy’ and provides IEC 62443 training courses, in close collaboration with de NEN.

Hudson Cybertec is, and has been, intimately involved with the development of this standard for a long time. These unique insights facilitate the ability to provide the tools necessary for applying and setting up cyber security in your organization. Fully compliant with the Wet Beveiliging Netwerk- en Informatiediensten (Wbni), the implementation of the NIS directive in the Netherlands. Companies covered by this law are held accountable for reporting major security incidents to their national supervisor and for demonstrating adequate cyber security measures have been taken.

Source: ‘Automatie PMA (edition 05), June 2019’

Click here to read the full interview with Marcel Jutte (in Dutch).

HUDSON CYBERTEC