SCADA | ICS Risk Assessment
Proactively identify threats. vulnerabilities. risks.
IT is true that a simple Nessus or Nmap scan can bring down a critical control system application. However, isn’t this something you should know and address before an attacker or an IT Department staffer gains access to the SCADA or ICS and inevitably starts with these tools?
Our team uses an arsenal of assessment testing tools and methodologies similar to those used by attackers on the net: automated scanning tools, commercial scripts, in-house developed scripts, manual tests, customized proprietary scripts and best of breed open-source penetration testing tools specific to ICS/SCADA applications/protocols. We test for exploitable vulnerabilities that could allow unauthorized access. Our approach to conducting assessment of your critical SCADA/ICS infrastructure: