Cybersecurity is not your core business and you want to keep the focus on your primary process. That’s why you call on the specialists at Hudson Cybertec.
We help answer your questions and challenges in the field of digital resilience. For example, we can develop an appropriate cyber security policy and procedures for you, do a validation of the security design developed by your system integrator for your new production facility, or audit the security operations. We also help you with OT security design and engineering.
Why choose Hudson Cybertec?
Hudson Cybertec is the recognized specialist in cyber security for IACS and has extensive experience in securing IACS-environments including: DCS, PLC and ICS/SCADA-networks, (Industrial) Internet of Things (IIoT & IoT), Industry 4.0, Smart cities, Smart factories, Building management systems, HVAC, Access control systems and other building related installations.
Hudson Cybertec distinguishes itself from other suppliers through our extensive experience in the IACS-sector, our knowledge of the sectors where we operate and the application of cross domain solutions in these sectors. Our consultancy services bring your organization to a higher level of cyber security.
Hudson Cybertec has a wide range of consultancy services, ranging from procurement support to the structured implementation and integration of cybersecurity management within your organization. Using our specialized knowledge we support and unburden your organization. More information about these services can be found on the relevant pages.
Policy & Procedure Development
Do you still have to create a security policy, or are your policies no longer up to date?
As an independent cyber security expert, Hudson Cybertec has all the necessary knowledge to support you in the development of security policies and procedures. We consider standards such as the IEC 62443 or the ISO 27000, as well as developments in legislation.
To ensure that the security policies and procedures of your organization stay up-to-date, we offer a service that reviews these policies and procedures on a regular basis against your (changed) organization’s needs and current standards and legal requirements.
Cyber Security Management System (CSMS)
To take control of your cyber security, the IEC 62443, the cyber security standard framework for Industrial Automation and Control Systems (IACS), provides guidance for the development and implementation of a CSMS. The implementation of a CSMS helps organizations to manage, integrate and maintain cyber security within their organization and as such comply with current and future regulations and the organization’s vision. Within the IEC 62443, the standard IEC 62443 2-1 provides the framework for the development and implementation of a CSMS.
The development and implementation of a CSMS can take some time, depending on the requirements, resources available and the size of the organization. Such an implementation requires a structured and phased approach. To ensure the success of the development and implementation of the CSMS, organizations often ask Hudson Cybertec for assistance. Hudson Cybertec has thorough experience supporting organizations with the development and implementation of their CSMS which is tailored to each individual organization’s requirements.
When expanding existing installations, or purchase new IACS systems, you want these to be cyber secure. Together with you, Hudson Cybertec defines the cyber security requirements. Products and systems that are delivered to you should be configured conform the set cyber security requirements, thereby significantly increasing the level of cyber security.
During the procurement phase you deliver these requirements to your suppliers. This allows them to take your requirements into account during development of systems, and deliver a product that meets your cyber security expectations.
Incorporating the required cyber security measures in the design of technical installations, or securing existing installations, requires a thorough knowledge of both technology and cyber security.As an independent specialist in the field of cyber security for technical environments such as Industrial Control systems, PLC and SCADA networks, building management systems, HVAC and other building-related installations.
Hudson Cybertec supports you with validation of network design, creating or updating ‘as-built’ design documentation, FAT/SAT-support, or engineering validation (of external parties). But also with security by design implementation, penetration tests, engineering support, and more.
Network segmentation & Re-design
When an incident occurs, it is important that the impact is contained. As a result, it is important to segment your network infrastructure. Due to the long life of technical networks it is important that this is considered. Until recently, functionality and safety of the installation were the most important criteria. Cyber security and segmentation were nice to have and rarely considered. Hudson Cybertec will help you to improve the structure of your infrastructure, by segmenting or redesigning your OT-network, making your infrastructure more resilient to cyber incidents.