Comprehensive ICS Security for Electric Grid Operations

Dragos has been the first responders to the most significant cyber attacks on electric grid operations, such as leading the investigation into the 2015 Ukraine attack and identifying and analyzing the CRASHOVERRIDE malware and reporting it to the community.

Our team’s 200+ years of experience hunting and responding to industrial attacks is codified throughout the Dragos Platform technology, so we can arm you to combat even the most sophisticated industrial adversaries and protect the world’s most critical infrastructure. 

Stay Ahead of Evolving Threats

Six out of nine industrial threat activity groups Dragos tracks specifically target the electric sector. Our unique threat intelligence distills their behaviors, tactics, techniques, and procedures into regular reports, so you can stay one step ahead of threats they pose to your ICS

Comprehensive Visibility, Threat Detection, and Response For Grid Operations

The Dragos Platform’s comprehensive asset identification, threat detection, and response  software provides in-depth visibility of your ICS assets, detects threats in your environment, and guides analysts step-by-step to investigate potential incidents

ICS Cybersecurity Technology Designed with Compliance in Mind

The Dragos Platform helps satisfy NERC CIP v6 regulatory requirements, while creating a robust, adaptable ICS cybersecurity strategy 

Prevent Significant Breaches with Proactive Defenses

Dragos’ ICS security services helps electric organizations prepare for and respond to significant threats–no matter where you’re at in your ICS journey–with assessments, threat hunting, penetration testing, tabletop exercises, incident response, and training

Proactive ICS Security Services

Assessments

Identify vulnerabilities in your ICS devices, applications, or networks

Penetration Testing

Learn how attackers move through ICS networks by leveraging real-world adversary tactics, techniques, and procedures 

Threat Hunting

Find undiscovered threats in your ICS networks and identify weaknesses in architecture, security controls, and policies

ICS Training

Learn actionable ICS skills in our 5-day ICS cybersecurity course: Assessing, Hunting, and Monitoring ICS Networks

Responsive ICS Security Services

Rapid Incident Response

Stabilize your ICS networks with rapid onsite and offsite incident response support

Incident Response Retainer

Reinforce your response strategy with various retainer options with specific response time SLA commitments

Tabletop Exercise

Learn how an attacker would move through your ICS environment with a customized, consequence and intelligence-driven scenario 

Dragos and SEL

The Dragos Platform integration with Schweitzer Engineering Labs provides comprehensive insight into power system networks and their communications, allowing asset owners and operators to gain deep packet inspection into SEL communications to monitor for security events

Electric Resources

CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack

CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack

The Evolution of Cyber Attacks on Electric Operations

The Evolution of Cyber Attacks on Electric Operations

Implementing the Dragos Platform to Solve ICS Cybersecurity Challenges in the Electric Industry

Implementing the Dragos Platform to Solve ICS Cybersecurity Challenges in the Electric Industry

Remarks to WAPA 2018: Cyber Threats and Response in Regional Electric Utilities

Remarks to WAPA 2018: Cyber Threats and Response in Regional Electric Utilities

Threats to Electric Grid are Real; Widespread Blackouts are Not

Threats to Electric Grid are Real; Widespread Blackouts are Not

FERC Technical Conference on Evolving Threats to the Bulk Power System – Ben Miller

FERC Technical Conference on Evolving Threats to the Bulk Power System – Ben Miller

Deadline to reunite immigrant children and parents, hacking US electric companies, long-toed lizards – Public Radio International

Deadline to reunite immigrant children and parents, hacking US electric companies, long-toed lizards – Public Radio International

Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE

Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE

CRASHOVERRIDE: Analyzing the Malware that Attacks Power Grids

CRASHOVERRIDE: Analyzing the Malware that Attacks Power Grids

Contact Us for a Demo