{"id":100224,"date":"2023-11-14T10:52:21","date_gmt":"2023-11-14T09:52:21","guid":{"rendered":"https:\/\/www.dgsspa.com\/?post_type=labs&#038;p=100224"},"modified":"2024-05-14T14:24:21","modified_gmt":"2024-05-14T13:24:21","slug":"critical-infrastructure-iot-protection-ics-iot-protection","status":"publish","type":"labs","link":"https:\/\/www.dgsspa.com\/en\/labs\/critical-infrastructure-iot-protection-ics-iot-protection\/","title":{"rendered":"Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)"},"content":{"rendered":"<section class=\"dgs-hero\">\n\t<div class=\"dgs-hero-bg\" style=\"background: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Banner_2560x1920.jpg') no-repeat 50% 50%; background-size: cover;\"><\/div>\n\t\t<div class=\"dgs-hero-ptrn \"><\/div>\n\t<div class=\"hero-inner\">\n\t\t\n\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">DGS CyLABs<\/span><\/span>\n\n\n\n<h1 class=\"hero-heading hero-heading--undefined\">Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/h1>\n\n\n\n<div class=\"wp-block-dgs-theme-hero-text hero-text\"><p>Our experts work to protect critical infrastructures that are increasingly interconnected and vulnerable to cyber attacks through the development of customized solutions with a Risk Based approach, supported by vulnerability analysis for threat containment.<\/p><\/div>\n\n\t<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group alignfull content-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"content\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">DGS CyLABs<\/span><\/span>\n\n\n\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>In the digital age, <strong>critical infrastructure and the Internet of Things (IoT)<\/strong> play an increasingly vital role in our society. However, with <strong>the increasing reliance on interconnected technological systems, new threats and vulnerabilities arise that require rigorous protection<\/strong>. In this context, a cyber security lab dedicated to the protection of critical infrastructure and IoT takes a central role in ensuring security and business continuity.<\/p>\n\n\n\n<p><strong>Critical infrastructure includes vital sectors such as energy, transportation, telecommunications, financial services, public health and safety<\/strong>, and all processes managed through automation (Industry 4.0). These sectors are interconnected and heavily dependent on automated systems and IT controls for their efficient operation. <strong>Compromising these infrastructures could have catastrophic consequences for society, the economy, and national security<\/strong>. Therefore, it is essential to take advanced protection measures to mitigate risks and prevent possible attacks.<\/p>\n\n\n\n<p><strong>The IoT has introduced a new level of interconnection between physical devices and digital systems<\/strong>, enabling a wide range of innovative applications. However, <strong>this interconnection also exposes IoT devices to potential cyber attacks<\/strong>. IoT devices often lack adequate security measures, making them vulnerable to exploits and intrusion. <strong>Protecting IoT devices has become a top priority to ensure data integrity, confidentiality and availability<\/strong>, as well as to prevent them from being used as entry points for attacks on critical infrastructure.<\/p>\n\n\n\n<p><strong>Our cyber security lab<\/strong> specializing in critical infrastructure protection <strong>(ICS &amp; IoT Protection)<\/strong> is <strong>an advanced research and development environment that works to identify, understand, and resolve vulnerabilities in these crucial areas<\/strong>. The lab conducts a range of activities, including:<\/p>\n\n\n\n<p>1. <strong>Threat analysis<\/strong>: constant monitoring of emerging threats that could affect critical infrastructure and IoT. This analysis enables the development of appropriate countermeasures to protect these systems.<\/p>\n\n\n\n<p>2. <strong>Vulnerability testing<\/strong>: conducting extensive testing to identify vulnerabilities in computer systems and IoT devices used in critical infrastructure. This includes analyzing configurations, performing penetration tests, and assessing possible security holes.<\/p>\n\n\n\n<p>3. <strong>Advanced solution development<\/strong>: designing and implementing customized security solutions to protect critical infrastructure and IoT.<\/p>\n\n\n\n<p>Specifically, <strong>within the ICS &amp; IoT Protection CyLAB, our experts engage in the identification and analysis of attack techniques and tactics<\/strong>, in line with the continuous updates of the MITRE ATT&amp;CK threat model for ICS. Our mission also includes engineering solutions to strengthen policies to contain compromises and mitigate associated risks.<\/p>\n\n\n\n<p>The topics are:<\/p>\n\n\n\n<p>1. <strong>Industrial Security<\/strong>: Industrial Security is a central theme for ensuring the protection of critical infrastructure. In our CyLAB, we are dedicated to identifying vulnerabilities and implementing security measures to preserve the integrity and business continuity of industrial networks. Through threat analysis and the use of cutting-edge technologies, we aim to mitigate the risks associated with cyber attacks.<\/p>\n\n\n\n<p>2. <strong>IoT Security<\/strong>: IoT security is vital, considering the increasing interconnectedness of devices and sensors in critical infrastructure. In our CyLAB, we focus on protecting IoT environments, developing solutions to ensure the confidentiality, integrity and availability of data exchanged between devices. We work to identify and mitigate vulnerabilities and to prevent intrusions and attacks in IoT systems.<\/p>\n\n\n\n<p>3<strong>. OT\/SCADA Security<\/strong>: The security of OT (Operational Technology) networks and SCADA (Supervisory Control And Data Acquisition) systems is critical for critical infrastructure. In our CyLAB, we address the analysis of vulnerabilities specific to these systems and the implementation of appropriate security measures. Through extensive testing and the adoption of advanced security policies, we aim to protect and preserve the integrity of OT\/SCADA networks.<\/p>\n\n\n\n<p>This our CyLAB plays a key role in understanding and mitigating emerging threats, identifying and resolving vulnerabilities, and providing advanced solutions to protect our customers\u2019 critical systems. Indeed, it is only through such collaborative efforts at DGS that we can help build a secure and resilient digital future.<\/p>\n\n\n\n<p>To find out what other areas we operate in at our <strong>CyLABs<\/strong>, <a href=\"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/\">CLICK HERE<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<div class=\"wp-block-group alignfull news-carousel has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Related topics<\/h3>\n\n\n\n<section class=\"wp-block-query alignfull posts-loop is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-100211 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Identity Threat Detection and Response (ITDR)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/identity-threat-detection-and-response-itdr\/\" target=\"_self\">read more<span class=\"screen-reader-text\">: Identity Threat Detection and Response (ITDR)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100213 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Cloud Native Application Protection Platform (CNAPP)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/cloud-native-application-protection-platform-cnapp\/\" target=\"_self\">read more<span class=\"screen-reader-text\">: Cloud Native Application Protection Platform (CNAPP)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100217 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">eXtended Detection and Response (xDR)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/extended-detection-and-response-xdr\/\" target=\"_self\">read more<span class=\"screen-reader-text\">: eXtended Detection and Response (xDR)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100220 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Advanced Threat Detection Intelligence (ATDI)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/advanced-threat-detection-intelligence-atdi\/\" target=\"_self\">read more<span class=\"screen-reader-text\">: Advanced Threat Detection Intelligence (ATDI)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100222 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Business Email Compromise (BEC)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/business-email-compromise-bec\/\" target=\"_self\">read more<span class=\"screen-reader-text\">: Business Email Compromise (BEC)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100224 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/critical-infrastructure-iot-protection-ics-iot-protection\/\" target=\"_self\">read more<span class=\"screen-reader-text\">: Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><\/ul><\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We protect critical infrastructures that are increasingly interconnected and vulnerable to cyber attacks by developing customised solutions.<\/p>\n","protected":false},"author":3,"featured_media":97811,"template":"","meta":{"_acf_changed":false,"dgs_labs_date_in":"","dgs_labs_date_out":"","dgs_labs_date_in_out":"","dgs_labs_location":"","footnotes":""},"tags":[],"corsi":[],"labs":[],"class_list":["post-100224","labs","type-labs","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DGS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:site_name\" content=\"DGS\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/12\/dgs-logo-opengraph.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dgs_group\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":null,\"url\":\"\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"name\":\"DGS spa\",\"description\":\"DGS SPA\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\",\"name\":\"DGS spa\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"width\":400,\"height\":400,\"caption\":\"DGS spa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gruppoDGS\",\"https:\\\/\\\/x.com\\\/dgs_group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dgsspa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCTrU_JDYEEOcYXNjL5a9k5g\",\"https:\\\/\\\/www.instagram.com\\\/dgs_spa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DGS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/","og_locale":"en_US","og_type":"article","og_site_name":"DGS","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/12\/dgs-logo-opengraph.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@dgs_group","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":null,"url":"","name":"","isPartOf":{"@id":"https:\/\/www.dgsspa.com\/en\/#website"},"inLanguage":"en-US"},{"@type":"WebSite","@id":"https:\/\/www.dgsspa.com\/en\/#website","url":"https:\/\/www.dgsspa.com\/en\/","name":"DGS spa","description":"DGS SPA","publisher":{"@id":"https:\/\/www.dgsspa.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dgsspa.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dgsspa.com\/en\/#organization","name":"DGS spa","url":"https:\/\/www.dgsspa.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","width":400,"height":400,"caption":"DGS spa"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gruppoDGS","https:\/\/x.com\/dgs_group","https:\/\/www.linkedin.com\/company\/dgsspa\/","https:\/\/www.youtube.com\/channel\/UCTrU_JDYEEOcYXNjL5a9k5g","https:\/\/www.instagram.com\/dgs_spa"]}]}},"_links":{"self":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs\/100224"}],"collection":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs"}],"about":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/types\/labs"}],"author":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/users\/3"}],"version-history":[{"count":6,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs\/100224\/revisions"}],"predecessor-version":[{"id":101523,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs\/100224\/revisions\/101523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media\/97811"}],"wp:attachment":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media?parent=100224"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/tags?post=100224"},{"taxonomy":"corsi","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/corsi?post=100224"},{"taxonomy":"labs","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs?post=100224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}