Operationalize Your ICS Cybersecurity with Dragos Professional Services
Evaluate & Plan Your Cyber Defense
Whether you are starting from square one or looking to mature your OT cyber program, our experts can evaluate your key OT cyber architecture and identify prioritized recommendations to make it more defensible.
Explore our full range of professional services
Urgent Incident Response ServicesIncident Response: Support for Your Worst Day
Expert responders to create a more efficient, effective response to speed resolution.
What’s Included with Incident Response:
- Rapid Response Retainers: Reduce costs & speed response by preclearing contracts and helping to refine Incident Response Plans (IRP).
- A Team of Experts: Work with experts in crisis management, in-depth analysis, & investigations Workshops: Build and refine effective IR Plans
- Table-Top Exercises: Test plans and identify areas to improve
Tabletop Exercises
Gain a better understanding of your team’s OT incident response capabilities against a realistic cyber-attack with a tabletop exercise. Designed to demonstrate how a realistic attack might occur in your OT environment, tabletop exercises help you assess your cybersecurity posture using scenarios tailored to your organizational risks or customized to meet your needs.
What’s included in Tabletop Exercises:
- Test and strengthen your current incident response plan
- Reduce the impact of an industrial cyber event
- Improve cross-functional communication and team relationships
- Get knowledge transfer from an experienced team
Assessments: Discover Your Strengths and Weaknesses
Understanding your most critical OT systems and the potential consequences of a cyber incident or attack on those systems is essential for prioritizing your protection, detection, and response efforts.
What’s included with Assessments:
- Architecture Review: Understand current vulnerabilities & compromises, while evaluating defensible architecture. Identify issues using four options, including a TSA-aligned CADR evaluation.
- Network Vulnerability Assessments: Access a data driven baseline of security of the environment. Identify network and device vulnerabilities along attack paths defined by likely scenarios.
- Network Penetration Tests: Attempt system compromise by finding vulnerabilities, gathering information, and privileging escalation.
Threat Hunting: Find Elusive Threats with OT Watch
Dragos OT Watch is a service exclusively for Dragos Platform customers. We provide a dedicated team of expert OT hunters who identify advanced tools and adversaries hidden in your environment.
What’s Included with Dragos OT Watch:
- Persistent Threat Hunts: Formulate new hunt hypotheses and analytics based on the latest threat intelligence
- Critical Escalations: Access details and context of results that require follow up by your security operations
- Insight Reports: Receive document hunt results on a monthly basis
Lessons Learned from the Front Lines
What Our Customers Say
Get Started
Whether you’re starting your quest or strengthening your current program, Dragos is here for you every step of the way. Take the first step to protect your OT environment with a free demo.