Cybersecurity is not your core business and you want to keep the focus on your primary process. That’s why you call on the specialists at Hudson Cybertec.

Vrouw werkt achter de computer

We help answer your questions and challenges in the field of digital resilience. For example, we can develop an appropriate cyber security policy and procedures for you, do a validation of the security design developed by your system integrator for your new production facility, or audit the security operations. We also help you with OT security design and engineering.

Why choose Hudson Cybertec?
Hudson Cybertec is the recognized specialist in cyber security for IACS and has extensive experience in securing IACS-environments including: DCS, PLC and ICS/SCADA-networks, (Industrial) Internet of Things (IIoT & IoT), Industry 4.0, Smart cities, Smart factories, Building management systems, HVAC, Access control systems and other building related installations.

Hudson Cybertec distinguishes itself from other suppliers through our extensive experience in the IACS-sector, our knowledge of the sectors where we operate and the application of cross domain solutions in these sectors. Our consultancy services bring your organization to a higher level of cyber security.

Consultancy services
Hudson Cybertec has a wide range of consultancy services, ranging from procurement support to the structured implementation and integration of cybersecurity management within your organization. Using our specialized knowledge we support and unburden your organization. More information about these services can be found on the relevant pages.

Policy & Procedure Development

Do you still have to create a security policy, or are your policies no longer up to date?

As an independent cyber security expert, Hudson Cybertec has all the necessary knowledge to support you in the development of security policies and procedures. We consider standards such as the IEC 62443 or the ISO 27000, as well as developments in legislation.

To ensure that the security policies and procedures of your organization stay up-to-date, we offer a service that reviews these policies and procedures on a regular basis against your (changed) organization’s needs and current standards and legal requirements.

Cyber Security Management System (CSMS)

To take control of your cyber security, the IEC 62443, the cyber security standard framework for Industrial Automation and Control Systems (IACS), provides guidance for the development and implementation of a CSMS. The implementation of a CSMS helps organizations to manage, integrate and maintain cyber security within their organization and as such comply with current and future regulations and the organization’s vision. Within the IEC 62443, the standard IEC 62443 2-1 provides the framework for the development and implementation of a CSMS.

The development and implementation of a CSMS can take some time, depending on the requirements, resources available and the size of the organization. Such an implementation requires a structured and phased approach. To ensure the success of the development and implementation of the CSMS, organizations often ask Hudson Cybertec for assistance. Hudson Cybertec has thorough experience supporting organizations with the development and implementation of their CSMS which is tailored to each individual organization’s requirements.

Procurement

When expanding existing installations, or purchase new IACS systems, you want these to be cyber secure. Together with you, Hudson Cybertec defines the cyber security requirements. Products and systems that are delivered to you should be configured conform the set cyber security requirements, thereby significantly increasing the level of cyber security.

During the procurement phase you deliver these requirements to your suppliers. This allows them to take your requirements into account during development of systems, and deliver a product that meets your cyber security expectations.

Design Validation

Incorporating the required cyber security measures in the design of technical installations, or securing existing installations, requires a thorough knowledge of both technology and cyber security.As an independent specialist in the field of cyber security for technical environments such as Industrial Control systems, PLC and SCADA networks, building management systems, HVAC and other building-related installations.

Hudson Cybertec supports you with validation of network design, creating or updating ‘as-built’ design documentation, FAT/SAT-support, or engineering validation (of external parties). But also with security by design implementation, penetration tests, engineering support, and more.

Network segmentation & Re-design

When an incident occurs, it is important that the impact is contained. As a result, it is important to segment your network infrastructure. Due to the long life of technical networks it is important that this is considered. Until recently, functionality and safety of the installation were the most important criteria. Cyber security and segmentation were nice to have and rarely considered. Hudson Cybertec will help you to improve the structure of your infrastructure, by segmenting or redesigning your OT-network, making your infrastructure more resilient to cyber incidents.

In dialog with our customers

Customer
My business is expanding. Our system supplier designed a new production line and made a new design for the OT network. Can Hudson Cybertec assess whether this design meets our requirements and is cyber secure?
vrouw-werkt-met-computer
Hudson Cybertec
It is essential that your new installation and network are digitally resilient. We perform a validation to assess whether the network design meets cybersecurity requirements, and/or cybersecurity principles as stated in e.g. IEC 62443. After validation you will know where the design complies and where changes are necessary. The validation report that you receive provides insight into the extent to which the design complies and indicates which changes are still necessary to meet the set requirements.

In the spotlight

Monitoring your OT environment is essential. You know what is happening on your network and see to what extent you are compliant with various cyber security standards and laws and regulations.

IEC 62443 Standard

The IEC 62443 standard offers your organization tools to improve the digital security and safety of your IACS environment. Implementation of the standard improves the cybersecurity level of your organization's OT / ICS / SCADA environment.

The IEC 62443 is the international cybersecurity standards framework for operational technology (OT). The framework consists of a collection of standards, technical reports and related information for securing Industrial Automation and Control Systems (IACS).

read more

Hudson Cybertec’s IEC 62443 Competence Center has extensive experience with this standard. We play an active role in the development of the standard, actively promote it internationally and have developed a training program around the IEC 62443.

read more

It is becoming increasingly important for organizations to be able to demonstrate that the digital security of the OT environment is in accordance with standards frameworks. It is therefore possible to certify (parts of) your IACS environment according to IEC 62443.

read more

If you want to know more about this standard and need training on how to apply it within your own organization or at your clients, Hudson Cybertec has a number of very interesting training courses for you.

read more

The IEC 62443 standard provides organizations with tools to improve the digital security and safety of OT / ICS / SCADA environments.

read more

How digitally safe is your organization?

Curious about the possibilities? Please contact us!

Contact us

Newsletter

Sign up for our newsletter. We will keep you posted on the latest developments in our cybersecurity services.

  • This field is for validation purposes and should be left unchanged.