www.sectrio.com
Will your assessment require any part of the plant to be shut down or rendered inoperative?
1
How will your tools read unique protocols that my devices use?
3
Will the business impact be considered as a factor while delineating SUCs?
5
Will you also be looking at aspects such as firewall configuration?
7
How will the interviews be conducted? How will the responses be evaluated?
9
How is the cybersecurity maturity score derived?
11
How will device-level issues be identified?
13
What will be the nature of the recommendations shared?
15
Know everything about 'Operation Cronos'
Get the latest and the most important updates