Energy Sector Analysis Process

Energy Sector Analysis Process

The Purdue aspect of Threat Modeling and Attack Simulations. Considering a SCADA environment, based on the IEC62443/ICS410/Purdue architecture, we both want to take the conformity with the intended structure and the weakest paths from the origin of an attack to the high-value assets into account. This can be done by feeding passively collected information, like firewall rules, asset information, and traffic data, into an offline threat model and then running attack simulations on it.

Share on facebook
Facebook
Share on twitter
Twitter
Joar Jacobsson

Joar Jacobsson

Head of Cyber Domain & Process Development

Download the full document here

About Foreseeti

Foreseeti is a leading provider of Automated Cyber Threat Modeling and Attack Simulation Solutions.
Our flagship products, the securiCAD solutions, empower IT decision makers with insight to the cyber risk exposure and resilience of their IT architectures, uncovering critical paths to high value assets and weak spots in the architecture so that proactive actions can be taken where they really matter.
Our solutions are used around the globe by a broad audience, including national and multi-national companies and organizations, critical infrastructure operators, leading consulting firms, and other companies for whom cyber security is truly important. We have certified partners around the globe and are proud to be an AWS Select Partner.

Let Foreseeti show you how the Security Organization can lead transformation, schedule a demo.

Capability PROFESSIONAL VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

Capability VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

WEBINAR NOVEMBER 19TH 17:00-18:30 CET

Automate Cyber Security in Cloud and DevOps Environments

We warmly welcome You to this webinar where our experts present leading security trends in using open-source software, hacker-powered knowledge, and attack simulations – automated in your pipelines!

detectify_outlined_logo_RBG
cropped-Debricked_LogoTransparentwhite (1)