- {- item.details.type -}
- {- item.details.date -}
- {- item.details.sector -}
{- item.title -}
Our services include penetration testing, vulnerability assessment of control systems and network health verification.
Our ICS penetration testing services enable you to find weaknesses in your network perimeter. The penetration testing commences by scanning the network to determine what types of hardware are connected and the operating systems being used. Then we search for unpatched vulnerabilities in those devices and attempt to exploit those vulnerabilities to gain access to the network. The penetration testing services are supported by our ethical hackers group, who have a background in IT and engineering, and certification according Certified Ethical Hacker (CEH), GXPN, GPEN, Global Industrial Cyber Security Professional (GICSP).
A common design principle is to ensure that programmable logic controllers (PLCs) and the network infrastructure that is used to connect them, operate in a secure environment (i.e. sealed from malicious attackers). In practice, ICS are often inadvertently connected to other networks, which can allow remote access through open networks or the Internet. Our ICS penetration testing services will identify such weaknesses, consider the possible impacts and then suggest corrective actions.
The competence of DNV within ICS and IT architectures is unmatched when examining critical parts of control system networks. Our ICS penetration tests aim to reveal vulnerabilities, regardless of whether they can only be exploited by: a highly skilled malicious attacker; a determined hacker; a disgruntled employee; or even a hardware/software failure. Our cyber security approach is based on recognized standards and recommendations, such as ISO 27000 series, IEC 62443 , NIST 800 framework, among others.
Get an overview of the cyber security services
How to test operational environments for cyber vulnerabilites without disrupting operations
In the cyber security industry, we are seeing a change in the way that hacks are performed
Six steps to prepare yourself
Powered by digitalization
The white hats in DNV cyber security services
Maritime cyber security services and solutions
Information risk management
Cyber security in energy
Download the flier