My message for companies that think they haven’t been attacked is: “You’re not looking hard enough”.

James Snook, deputy director in the office for cyber security, Government cabinet office, London - April 2016


We continue to surprise ourselves with our uses for the increased connectedness we can enable through the Internet. Unfortunately our caution simply doesn't keep pace with our enthusiastic adoption.
HISTORY: Initially, Industrial Control Systems (ICS) had little resemblance to traditional information technology (IT) systems in that ICS were isolated systems running proprietary control protocols using specialized hardware and software.
Many ICS components were in physically secured areas and the components were not connected to IT networks or systems.

TODAY: Widely available, low-cost Internet Protocol (IP) devices are replacing proprietary solutions, which increases the possibility of cybersecurity vulnerabilities and incidents. As ICS are adopting IT solutions to promote corporate business systems connectivity and remote access capabilities, and are being designed and implemented using industry standard computers, operating systems (OS) and network protocols, they are starting to resemble IT systems.

THREAT LANDSCAPE: While security solutions (may) have been designed to deal with these security issues in typical IT systems, special precautions must be taken when introducing these same solutions to ICS environments. In many (majority of) cases, new security solutions are needed that are tailored to the ICS environment.
This integration supports new IT capabilities, but it provides significantly less isolation for ICS from the outside world than predecessor systems, creating a greater need to secure these systems. The increasing use of wireless networking places ICS implementations at greater risk from adversaries who are in relatively close physical proximity but do not have direct physical access to the equipment.


ASCOT BARCLAY GROUP are founding members of The Operational Technology Security Initiative. Mike Loginov our CEO is President of the Institute. We have led IOT / OT reviews for some of the world's largest companies and whilst the expanded internet adoption is truly staggering there is time to get and stay ahead of the curve when it comes to implementing security measures that are more than perfectly sound.

We would welcome the opportunity to discuss your OT / IOT estate with you and will gladly share our best practice approach to securing all of these vulnerable devices.

Macbook Pro
* Intel Core i7 (3.8GHz, 6MB cache)
* Retina Display (2880 x 1880 px)
* NVIDIA GeForce GT 750M (Iris)
* 802.11ac Wi-Fi and Bluetooth 4.0
* Thunderbolt 2 (up to 20Gb/s)
* Faster All-Flash Storage (X1)
* Long Lasting Battery (9 hours)
Yes I'm interested in gamification
and keen to learn more about Quartermaster
so please keep me posted
Your Information will never be shared with any third party.