Services

Stay Informed

Keep up to date on threats and risks relevant to your organization

ICS Threat Intelligence
Vulnerability Intelligence
Analytical Reports on ICS threats and vulnerabilities on the Kaspersky Threat Intelligence Portal
Reports and alerts about cyberattacks on industrial enterprises and vulnerabilities in industrial software and equipment; regular threat overviews for industrial automation systems available through the web portal and API
Threat landscape analysis on request
Preparation of a detailed analytical report on threats, incidents, and vulnerabilities relevant to the territory, industry or infrastructure specified by the customer
ICS Vulnerability Reporting
Regular reports containing carefully verified information on relevant vulnerabilities in ICS products and mitigation measures based on a pre-agreed list of products used by the enterprise.
ICS Vulnerability Data Feed
Regularly updated feed of verified and refined data on vulnerabilities in ICS software and equipment in machine-readable format
Industrial OVAL Data Feed
Regularly updated feed containing OVAL definitions for automated detection of known vulnerabilities in SCADA systems and other industrial software

Get Ready

Empower your workforce with cybersecurity knowledge

ICS Security Awareness
In-depth Professional Training
Instructor-Led Training
Industrial cybersecurity awareness trainings for IT, information security and ICS specialists and for managers at industrial enterprises provided in-class or online
Self-Study Online Training
Online industrial cybersecurity course on the Kaspersky Automated Security Awareness platform (ASAP)
Digital Forensics and Incident Response in ICS
Training in the effective response to cybersecurity incidents at industrial enterprises and in incident investigation techniques
IoT Vulnerability Research
Training in (I)IoT vulnerability research
Fuzzing-Based Vulnerability Research
Training in modern fuzzing-based methods, techniques and approaches for software vulnerability research

Respond

Expert handling of security incidents using our professional services

Threat Hunting and Detection
Incident Response
Analyst Inquiry Service
ICS Malware Data Feed
Stream of data (IOCs, hashes, IDS rules, Yara rules) on threats identified by ICS CERT experts in ICS systems, designed to simplify and automate attack detection and investigation
Free
Threat Hunting and APT Investigation
Joint investigation of APTs and other cyberattacks targeting an industrial organization, exchanging indicators of compromise with other organizations and independent researchers
Incident Response at Industrial Organizations
Help in blocking an active cyberattack, investigation of the cybersecurity incident and mitigation of its consequences
Digital Forensics
Analysis of artifacts from cybersecurity incidents affecting industrial organizations and critical infrastructure facilities
Incident Response Handbook Development
Developing scenarios and instructions to ensure that the different stages of cybersecurity incident response are carried out effectively, based on the specifics of the industrial organization’s operations
Ask the Analyst
Request additional information* from our experts, including information on threats and threat statistics for a specific region/industry, malware, vulnerabilities, ICS/OT related security regulations or standards.*Provided through the Kaspersky Threat Intelligence Portal

Transform

Rethink your approach to cybersecurity from the ground up

Cybersecurity Assessment of Products and Solutions
Generic Information Security Consulting
Product Security Maturity Assessment
Cybersecurity assessment of ICS/IoT products and their development and support processes, with a public security maturity certificate issued for the products assessed
Product Design Cybersecurity Assessment
Evaluating the cybersecurity of a product’s architecture and protocol specifications and providing recommendations on improvements
Product Vulnerability Assessment
Analyzing pre-release versions of products for vulnerabilities, developing customized tools and recommendations to address any security issues
Policies and Procedures
Analyzing whether an industrial enterprise’s information security policies and procedures meet their specified goals and requirements
Methodology and Frameworks
Developing methodologies and approaches to define information security requirements for industrial facilities plus methods for security analysis and the assessment of risks associated with cybersecurity incidents
Regulation and Standards
Providing advice and developing custom reports on standards, recommendations and regulatory requirements for the information security of industrial facilities and systems