Optiv + Food Manufacturer = A Whole Menu Of Solutions

The Situation – Targeted OT Threats Calling For Security Fine Tuning

 

A global food manufacturer poured concrete for three new “factories of the future” after nearly a decade of planning. But there was a rise in security threats, specifically targeting operational technology (OT) within food manufacturing. This called for late-stage security fine tuning before bringing their new facilities online.

The Solution – Find Overlooked Security Gaps via a Risk Register

 

We kicked things off by evaluating the client’s existing network architecture and design for security gaps. We then created a risk register to communicate security issues previously overlooked by several third parties, including the engineering and construction company, automation interrogator and installer as well as automation vendors. 

 

By combining the efforts of our client and third parties, our team created a common thread of security throughout the facilities, while developing a stronger architecture model capable of modernization and stronger security posture at critical points. We accomplished all this without disrupting operations. 

Image
Food Manufacturer Success Story-Asset Download.png

 

Industry Served: Food and Beverage


Our Starting Point

  • Facility planning and design had been underway for a decade, but many security gaps were overlooked
  • Increase in OT security threats for food manufacturers

Accelerating Forward

  • Risk assessment, site walk and threat modelling to properly communicate threats and security gaps through risk register
  • Architecture modeling to improve modernization capabilities and security posture
  • Strategic OT security roadmap

Client Outcomes

  • Efficiently created a new security design by augmenting client and third-party work
  • Ensured modernized and strengthened security posture with a stronger, converged plantwide ethernet (CPwE) / Purdue architecture model
  • No interruptions to facility operations
  • Client invested in future upgrades, including an OT security sensor, SIEM integration, firewall improvement plan and implement risk scoring system

How can we help you secure greatness?

 

Optiv can advise on, deploy and operate end-to-end cybersecurity programs aligned to your business goals. As the cyber advisory and solutions leader, we serve nearly 6,000 companies across every major industry. Our certified experts can help you gain the agility, security, scale and control you need to stay ahead of the competition.

 

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?