Abidance Consulting creates compliance programs and solutions for their clients that include some of the most advanced methodologies and processes in the industry. Abidance Consulting is recognized as a leader in the field with a history of innovative, cost effective, real-time solutions tailored to meet the complex challenges facing their clients. Abidance Consulting specializes in NERC CIP compliance, CFATS, Water and RGGI requirements.
PwnedList actively protects your organization by continually monitoring sites that host stolen credentials and other security data. If your data has been compromised they'll notify you immediately. You can check your online accounts and know with virtual certainty whether they’ve been compromised at any time.
Lofty Perch is a global leader in providing cyber security services and technology for mission critical industrial architectures. With a core focus on SCADA and Process Control environments, Lofty Perch leverages scientific expertise, security engineering leadership, and rich practical experience to develop solutions to meet the infrastructure protection challenges faced by private sector, law enforcement, and national security communities.
The Critical Intelligence partnership with Lofty Perch fuses subject matter expertise from both organizations to provide ICS stakeholders with an unparalleled depth of specialized SCADA and ICS consulting solutions.
NetWitness® Corporation is the world leader in real-time network forensics and automated threat intelligence solutions, helping government and commercial organizations detect, prioritize and remediate complex IT risks.
NetWitness is the single security solution that addresses a wide range of needs as diverse as advanced persistent threats, data leakage, malware activity, insider threats, and more. Originally developed for the U.S. Intelligence Community, NetWitness provides enterprises worldwide with breakthrough methods of network content analysis and host-based risk discovery and prioritization. NetWitness customers include Defense, national law enforcement and intelligence agencies, top US and European Banks, and Global 1000 organizations.
The non-profit Security Incidents Organization maintains the Repository of Industrial Security Incidents, a database and reporting service dedicated to gathering and disseminating information about security incidents affecting industrial control networks with the goal of learning from the experiences of others.
As specialized providers of complementary information services, Critical Intelligence and the Security Incidents Organization have partnered to provide their customers and members with cost-effective access to the most comprehensive ICS security data sources available. Subscribers to either organization qualify for a 25% discount on quarterly and yearly reports from the other organization. Contact us for more information.
Digital Bond is a control system security research and consulting practice. They have decades of security experience from the National Security Agency (NSA), National Labs, large asset owners and leading security equipment providers.
They were founded in 1998 and performed our first SCADA security assessment in 2000. Their team has climbed the difficult learning curve and developed skill sets and methodologies for SCADA networks, applications, and protocols. This experience is crucial to understanding the culture of organizations that run the critical infrastructure.
The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and report on malware, botnet activity, and electronic fraud. It is the mission of the Shadowserver Foundation to improve the security of the Internet by raising awareness of the presence of compromised servers, malicious attackers, and the spread of malware.
Emerging Threats Pro provides comprehensive enterprise grade IDS/IPS rulesets with a strong malware focus supporting Snort, and the recently launched multi-threaded Suricata IDS engine. In addition, Emerging Threats Pro has provided intrusion detection signatures and coverage of industrial control system vulnerabilities and exploits.