Control System Defense
Control System Defense
Our focus is to reduce your risk by enhancing the cybersecurity of your control systems and the ability and awareness of your staff. We limit our services to the following high impact areas that produce the best results.
A process of identifying vulnerabilities of a control system at any point in the life cycle including pre-construction. We will quantify risks and develop mitigation strategies for identified vulnerabilities creating an easy to follow prioritized actionable plan. This service can include Security PHA Review, CyberPHA, Vulnerability Assessments, and Audits.
Identifies gaps in your documents and creates the right documents for an organization's control system technology to help your team protect against cyber threats, including defining roles and responsibilities, defining risk management strategies, and setting incident response procedures.
Training employees and stakeholders on how to identify, prevent, and respond to cyber threats, as well as promoting a culture of security awareness to minimize the risk of cyber-attacks. This service includes various types of online and in person training as well as Operation Technology focused cybersecurity campaigns.
Typically includes convergence consulting to create a unified team of IT and OT people and any combination of the above services.
If you are interested in being notified when an article is published, you can sign up here and we promise not sell or abuse your email address.
Privately owned firm located in Central Ohio with a global experienced cybersecurity team.
Our team is comprised of industrial control system and cybersecurity experts in control system cybersecurity, safety system cybersecurity, and convergence consulting. We serve on standards bodies, teach, and write to educate on how to defend control systems.
To serve our clients we use a team that can expand as required to include the best cybersecurity contractors to serve our clients with the best possible analyst appropriate for their situation while maintaining our cost reasonable.
Jim McGlone leads the organization as a seasoned cyber security professional with 20+ years of control system experience. He has a deep understanding of security risks facing industry and has a proven track record of developing and implementing effective cybersecurity solutions. Jim is also a decorated veteran who served on submarines as an electronics technician and nuclear reactor operator,
The Subsafe Security name comes from our core belief in the same in-depth strategy from design, selection, construction, testing, operations and maintenance to protect control systems from cybersecurity attacks that the US Navy has in its SUBSAFE program. The tragic loss of the USS Thresher was a complex event with multiple contributing factors. It was discovered that the failure of a single system that was not designed appropriately and antiquated procedures caused the submarine's descrtruction. The SUBSAFE program was created to prevent a similar tragedy from happening again.
In addition to traditional cybersecurity services, we focus on solving core design issues to make systems resilient and secure.