Australia’s first industrial cybersecurity practice

industrial

Schneider Electric has launched its Industrial Cybersecurity Practice in Australia to improve protection for utility, resources and manufacturing industries. The practice will offer consulting services and cybersecurity solutions to identify potential threats, create response strategies and protect critical service industries against future attacks.

The practice will be headed by senior Schneider Electric cybersecurity consultants Peter Clissold and Adam Woodland, supported by a team of industry experts from around the country.

Services to be offered include:

  • Industrial cybersecurity consulting: developing a best practice cybersecurity program based on a detailed threat analysis and organisational requirements
  • Design and implementation: applying cybersecurity principles to the architecture and modernising existing systems to increase security
  • Training: from building awareness of cybersecurity threats through to detailed security system training
  • Maintenance: deployment and maintenance of secure devices and software platforms that deliver improved authorisation, authentication and auditing to maintain and enhance the performance of the security system over time

According to Clissold, the launch is responding to the increased need for cyber protection by expanding their existing worldwide security services into a local offer.

“This is an offer that is built specifically for industry. Our deep industry knowledge, specialisation in smart devices, industrial software and IT skills means we can provide a highly-specific security solution for these organisations,” he said.

“This new practice can help industrial organisations identify and categorise their risk, as well as helping protect them from potential future vulnerabilities.”

Clissold added that the increasing adoption of IoT in key infrastructure environments has increased the exposure to increasingly sophisticated cyberattacks.

“The awareness of IoT amongst industrial organisations is very high but an understanding of the security risks is comparatively low. There is a concern that implementing these devices ahead of effective industrial security strategies poses a real operational risk.”