Emphasizing on the existing security and compliance posture at SIG, the first step to be taken was the implementation on information security assurance. Prologix presented security assessment and compliance services to uncover any vulnerabilities in their systems and applications for mitigating them.
SCOPE OF WORK
Prologix Delivered the finest solution to SIG for security Assessment which is a leading world's leading system suppliers of carton packaging and filling machines for beverages and food. The company supplies complete systems including both the packaging materials and the corresponding filling machines.
Prologix cautiously studied the existing system with their requirement and came up with a solution which would cater to the current requirements as well as the ultimate and all-encompassing converged the necessary requirements. Cyber security has become a vital part of conducting business in today’s world. The threats to organizations and individuals are real. Industrial Control Systems (ICSs) were originally built as stand-alone systems that were not interconnected and had little in the way of security protections. The internet and ubiquitous internet protocol networks have changed the design of many ICS such that the control network is now often a protected extension of the corporate network. This means that these delicate ICSs are potentially reachable from the Internet by malicious and skilled adversaries.
Prologix expertise instigated the assessment process so that users can understand how to execute an ICS cyber security assessment. There was a detailed training given on the process of planning an ICS cyber security assessment, including how to select testing areas? The test plan specifies the correct amount of detail to meet the needs of the asset owner while retaining the flexibility to use all the skills of the assessment team.
How did it help SIG Combibloc Obeikan FZCO?
Cyber security is the protection of information transmitted and stored over a computer network.
The objectives of cyber security are to:
- Protect confidentiality of private information;
- Ensure availability of information to authorized users on a timely basis (authentication,
- Protect the integrity of information (i.e., accuracy, reliability and validity).