C2M2 Implementation Guide
C2M2 Implementation Guide
READ NOW
Respond to Cyber
Risk
Management
Activities
Manage the organization’s IT and OT assets, including both hardware and software,
commensurate with the risk to critical infrastructure and organizational objectives.
Create and manage identities for entities that may be granted logical or physical
access to the organization’s assets. Control access to the organization’s assets,
commensurate with the risk to critical infrastructure and organizational objectives.
Management
Activities
Management Armed with this intelligence, teams can quickly review and classify
Activities all vulnerabilities and associated threats to expedite threat detection
and response efforts, as well as establish a patch management
process and Computer Emergency Response Team.
Establish and maintain activities and technologies to collect, monitor, analyze, alarm,
report, and use operational, security, and threat information, including status and
summary information from the other model domains, to establish situational awareness
for both the organization’s operational state and cybersecurity state.
Establish and maintain controls to manage the cyber risks arising from suppliers
and other third parties, commensurate with the risk to critical infrastructure and
organizational objectives.
Management
Activities
Implement Workforce
Controls
Increase Cybersecurity
Awareness
Management
Activities
Establish and Maintain Data collected and maintained by Industrial Defender keeps your cyber
Cybersecurity Architecture architecture strategy informed. You can measure and manage network device
Strategy and Program configuration and communication between assets, monitor firewall and network
device changes, and be aware if network protections are compromised/bypassed
Implement Network Protections
with built-in IDS capabilities.
as an Element of the
Cybersecurity Architecture Industrial Defender also provides endpoint security through configuration
Implement IT and OT Asset management, vulnerability and patch management, and security event monitoring.
Security as an Element of the Flexible integrations enable sharing of this OT data with other parts of an
Cybersecurity Architecture organization’s enterprise security architecture.
Implement Software Security Realtime software inventory, patch and vulnerability management help teams
as an Element of the incorporate software security into their architecture.
Cybersecurity Architecture
Industrial Defender monitors data security tools and has policies that check for
Implement Data Security as an data security (e.g. 2FA, encryption, VPN).
Element of the Cybersecurity
Architecture The solution provides reporting and documentation to support any operations
management, maintenance activity needs, and audit/assessment functions.
Management Activities
Management
Activities
Since 2006, Industrial Defender has been solving the challenge of safely collecting, monitoring,
and managing OT asset data at scale, while providing cross-functional teams with a unified view of
security. Their specialized solution is tailored to complex industrial control system environments
by engineers with decades of hands-on OT experience. Easy integrations into the broader security
and enterprise ecosystem empower IT teams with the same visibility, access, and situational
awareness that they’re accustomed to on corporate networks. They secure some of the largest
critical control system deployments with vendors such as GE, Honeywell, ABB, Siemens, Schneider
Electric, Yokogawa and others to protect the availability and safety of these systems, simplify
standards and regulatory requirements, and unite OT and IT teams.
SCHEDULE A DEMO