Professional Documents
Culture Documents
www.tuv.com/informationsecurity
T H E C H A L L E N G E O F O P E R AT I O N A L T E C H N O LO G Y ( OT ) The team is then able to work with you to update your OT
A N D I N D U ST R I A L CY B E R S E C U R I TY cybersecurity policies, processes and procedures to ensure
As your organisation embraces new connected systems, they are suitable for your business going forward and help
equipment and facilities it is vital that cybersecurity related you meet regulatory and customer requirements.
policies, processes and procedures are created or refrehed
to reflect emerging threats and risks that such systems W H Y AS S E S S YO U R P O L I C I E S, P RO C E S S E S A N D
can introduce. Applying default IT policies, processes and P RO C E D U R E S ?
procedures to an industrial technology environment can lead ··There has been an incident or event that has challenged
to under provision in important areas, failure to address key an existing policy, process or procedure.
risks and a reduced ability to respond to an incident. ··Audits or reviews have identified issues and you need help
in implementing new policies.
For example: ··Systems have been breached but those responsible can-
··Are mobile devices such as smartphones used in your not be held to account as there is no suitable policy
plant? Could a user take photographs of your plant or in place.
control room? Are control systems accessible from smart- ··You are concerned how upcoming industrial security regu-
phones? lations may impact plant operations or personal informati-
··Are accounts shared between users impacting your ability on.
to track who has been accessing which systems?
··What is the impact of new data protection regulations on WO R K I N G W I T H T Ü V R H E I N L A N D
your operational environment? The TÜV Rheinland 145+ year heritage gives us a deep
understanding of the markets we serve, with unmatched
H OW A R E YO U R P O L I C I E S A N D P R O C E D U R E S AS S E S S E D ? depth of experience solving complex safety, security, data
We will engage with you to help you understand how your privacy, and infrastructure challenges.
existing policies, processes and procedures address OT
® TÜV, TUEV and TUV are registered trademarks. Utilisation and application requires prior approval. 08.2018
cybersecurity issues in your business. These will be compa-
red against best practices developed at TÜV Rheinland as
well as appropriate industry standards. This is a collaborative
process enabling you to gain proactive insight from our team
of industrial security experts.
I N D U ST R I A L S E C U R I TY R I S K OT A R C H I T E C T U R E R E V I E W OT SYST E M S P E N E T R AT I O N OT S E RV I C E S F O R T H E
ASSESSMENTS T E ST I N G N U C L E A R I N D U S T RY
Do you understand your operational Is your industrial technology design Do you need to undertake operational Do you understand your nuclear
technology and industrial and architecture secure and technology vulnerability assessments facility operational technology and
security risk? compliant with cybersecurity and penetration tests? industrial security risk?
standards and regulations?
TÜV Rheinland
Digital Transformation & Cybersecurity
otsecurity@tuv.com
www.tuv.com/en/industrial-sec