Risk Assessment Objectives
Identify platform access vectors
Whether it’s a locomotive, airplane, or military weapon system; every access vector is also an attack vector. Determine cyber risk level per access vector according to operational impact.
Demonstrate potential cyber intrusion effects
Understand the impact to rolling stock operations of an embedded cyber attack and leverage a cyber intrusion demonstration to set the framework for a proper cyber incident response plan.
Report findings and make recommendations
After a comprehensive assessment, we deliver a premium cyber survivability analysis of all access vectors, potential operational effects in terms of risk, and detailed actionable findings to improve cyber resilience.
Benefits of Cyber Survivability Risk Assessment:
- Measure organizational risk from OT cyber attacks
- Mitigate risk from discovered & public vulnerabilities
- Empower CISO’s to enhance cybersecurity practices of onboard embedded systems
- Utilize results to build proper incident response plan
- Leverage an intrusion simulation as internal training event & test response plan efficacy
Talk to us
Please fill out this form and we will reach out to you shortly to schedule a call to answer your questions and discuss assessment needs for a custom quote.
Why work with Shift5?
Shift5 leverages extensive industry experience, government and intelligence community backgrounds, veterans, contracting know-how, and cross-functional skill sets. We’ve worked with government customers on custom solutions and we’re staffed with personnel who pioneered platform mission assurance in response to NDAA 1647.