Challenges in the Identify phase:
- Missing and unclear security requirements
 
- Lack of clarity as to whether there is a reporting obligation in the event of a security incident
 
- Unclear if own company is affected by KRITIS regulation
 
- Lack of transparency about existing assets in own OT network
 
- Unclear threat situation
 
- - Cyber risks are not (yet) taken into account in holistic risk management
 
- Legacy systems in use that were developed without taking security threats into account represent an attack vector
 
- Complexity and disruption of new technologies
 
- Higher potential for digital fraud and damage to the operational process
 
- Safety-critical systems connected to potentially insecure bus systems
 
- Connectivity & openness of OT systems enable cyber attacks
 
- Vulnerabilities and attacks are continuously increasing and becoming more sophisticated
 
 
 
 
Challenges in the Protect phase:
- Missing (security) concepts
 
- Inadequate architecture
 
- Missing processes
 
- Lack of integrated governance model and holistic risk management
 
- Lack of threat protection
 
- Unclear responsibilities regarding OT security (corporate vs. production IT)
 
- Failure to deal with the threat of digital fraud and damage to the operational process
 
- Protection against ransomware attacks
 
 
 
Solutions and Services 
- Technical OT Monitoring
 
- OT Security Solution Design & Evaluation
 
- OT Remote Access / Maintenance Access
 
- Risk assessment / Risk evaluation 
 
- Critical Infrastructure Consulting Critical Infrastructure Workshop OT-Security Awareness Training
 
- OT-Security Threat Modelling
 
- OT-Security Assessment
 
- OT-Security Solution Consulting
 
- Secure Digital Factory Architecture
 
- 
Red & Blue Team Testing
 
- Identity Management
 
- Protection of Networks, Applications, Workloads, Endpoints
 
- Endpoint Detection and Response (EDR)
 
 
 
 
Challenges in the Detect phase:
- Missing implementations (technical, organizational, procedural solutions)
 
- Vulnerabilities and attacks are continuously increasing and becoming more advanced
 
- Legacy systems developed without consideration of security threats represent an attack vector
 
- Closed systems prevent the realization of security concepts and measures
 
- Limited detection capabilities in terms of zones/computers/systems (technical scope/depth of inspection)
 
- Ongoing shortage of specialists in the field of cybersecurity
 
 
 
Solutions and Services 
- Technical OT Monitoring
 
- SOC Integration: OT Monitoring
 
- Vulnerability Assessment & Management
 
- Managed Threat Detection
 
- Anomalies and Events
 
- Detection processes
 
- Threat Intelligence
 
 
 
 
Challenges in the Respond phase:
- Lack of know how to deal with the threat
 
- Lack of experience in incident response
 
- No incident response process
 
- Unclear responsibilities / contact persons
 
- Ongoing shortage of cybersecurity professionals
 
Deployed legacy systems that were developed without consideration of security threats provide an attack vector
 
 
Solutions and Services 
- Threat & Incident Response
 
- Response Planning
 
- Communication
 
- Analysis
 
- Mitigations
 
- Continuous Improvements
 
- 
Digital Forensics
 
 
 
 
Challenges in the Recover phase:
- Lack of Business Continuity Management (BCM) and Detection & Response (DR).
 
- Lack of improvement process
 
- Lack of experience in continuous handling of BCM and DR cases
 
- Lack of clarity regarding communication strategy to stakeholders
 
- Unclear level of damage and recovery costs