Case Study: Industrial Defender

Industrial Defender was faced with the challenge of rebuilding its cybersecurity program from the ground up after being acquired by a private equity firm. 

At A Glance

Industrial Defender was faced with the challenge of rebuilding its cybersecurity program from the ground up after being acquired by a private equity firm. The experts at Defensible Technology were brought in to provide Virtual CISO services and ongoing vulnerability monitoring. Thanks to Defensible, Industrial Defender now has a comprehensive and robust cybersecurity program that protects not only its internal assets, but also all of the clients that the company serves within the critical infrastructure sector.

Client Overview

Industrial Defender was the first Operational Technology (OT) Cybersecurity provider in the market, and, since its founding in 2006, has supported several of the largest critical infrastructure companies across the globe, including 8 of the 10 largest utilities companies in North America.

Headquartered in Foxboro, Massachusetts, Industrial Defender primarily serves industries within the critical infrastructure sector, including utilities, oil and gas, chemical, transportation and logistics, pharmaceuticals, higher education, and healthcare. Critical infrastructure organizations have unique cybersecurity needs, with plants and endpoints spread across the globe, as well as systems and assets that often require 24/7 uptime. To meet the unique and demanding needs of cybersecurity and asset control within critical infrastructure environments, Industrial Defender offers software solutions with a management platform purposebuilt to address the overlapping requirements of cybersecurity, compliance, and change management for industrial control systems (ICS).

Industrial Defender was previously owned by information technologies companies Lockheed Martin and CapGemini and was acquired by private equity firm Teleo Capital Management, LLC (“Teleo”) in January 2020.

Challenges

While owned by both Lockheed Martin and CapGemini, Industrial Defender’s cybersecurity initiatives were headed by its respective parent company; however, after being acquired by Teleo, the company faced the new challenge of needing to reestablish its own cybersecurity program from the ground up.

This challenge became especially urgent as Industrial Defender had over a decade worth of revenue stream and dozens of existing clients, and could not afford to have cybersecurity vulnerabilities interrupt its operations or put its customers at risk. Additionally, as a software supplier for critical infrastructure organizations, Industrial Defender received numerous questionnaires and surveys from clients performing thirdparty vendor due diligence and needed to quickly realign its cybersecurity program standards so that all questionnaire responses were an accurate representation of Industrial Defender’s cybersecurity program.

To fill the cybersecurity gaps created by their recent acquisition, the leadership at Industrial Defender began the search for an outsourced team of cybersecurity experts and reached out to Defensible upon recommendation from another cybersecurity industry professional. Defensible was ultimately selected to help rebuild Industrial Defender’s cybersecurity program due to the company’s practical and client-centered approach to cybersecurity and cyber risk management.

Solution

In order to create and implement the policies and procedures needed to support Industrial Defender’s internal security needs, as well as the associated needs of its clients,

“the company partnered with Defensible in 2021, and utilized Defensible’s CxO Advisory Services to rebuild their cybersecurity program and fortify their cyber defenses.”

Many of the initial services provided by Defensible fell under the umbrella of the Virtual CISO as a Service offering, and were focused on strategizing and implementing a comprehensive security program.

To reestablish Industrial Defender’s cybersecurity program, Defensible Technology CEO and co-founder, Stephen Doty, initially focused on three aspects of Industrial Defender’s security program: creating a baseline set of documents and internal standards; updating questionnaire and survey responses to reflect new policies and the governance approaches; and restructuring of technical procedures.

Since the initial engagement between Industrial Defender and Defensible, the partnership has evolved, and Defensible now provides additional cybersecurity services that address technology operations and relationships with third-party information technology (IT) providers and vendors. This partnership is expected to further expand in the coming months, as the experts at Defensible are working closely with the Industrial Defender team to build security requirements into the design and development stages for all software products, as well as incorporating more customer-facing availability for cybersecurity concerns.

 

Results & Benefits

As a result of its partnership with Defensible, Industrial Defender was able to build a comprehensive and robust cybersecurity program with a number of supplemental benefits 

  • Improved documentation and organization 

    As an organization that operates within the cybersecurity space, Industrial Defender was already adhering to a number of industry best practices, especially in regard to security controls. However, some of these successful cybersecurity initiatives were not well documented as formal policies and procedures. While rebuilding Industrial Defender’s cybersecurity program, Defensible was able to properly document and operationalize all aspects of cybersecurity for Industrial Defender, from Human Resources operations all the way through software development. This holistic approach to documentation has made the effect of Industrial Defender’s cybersecurity programs tangible across the entire organization. 

    Additionally, Defensible, as part of the efforts to create a baseline set of internal cybersecurity documents and an information security policy, created several core forms of documentation for policies and procedures; these documents included a set of standards for business continuity, a disaster recovery plan, and an incident response plan. With these new sets of documentation in place, Industrial Defender is well-equipped to not only prevent cyberattacks and incidents across their entire attack surface, but also effectively respond to and remediate any potential incidents that may occur in the future. With all of these new policies and procedures properly documented, Industrial Defender was also easily able to create new questionnaire and survey responses that serve as an accurate reflection of their cybersecurity program. 

  • Fewer gaps in cybersecurity and managed services coverage 

    Defensible worked closely with Industrial Defender’s selected managed service providers, as well as other entities who provided IT security-related services, to identify what offerings were relevant to Industrial Defender’s newly rebuilt strategy and to identify what gaps needed to be filled with in-house programs or procedures. This approach, which was specifically tailored to Industrial Defender’s unique IT and cybersecurity technology stack, allowed nothing to slip through the cracks or be unaccounted for. 

  • Increased awareness of vulnerabilities 

    In addition to the cybersecurity program groundwork laid by Defensible at the beginning of the partnership, Defensible also conducts ongoing internal and external vulnerability scans, allowing for increased visibility of vulnerabilities across the organization’s entire attack surface. Defensible performs these recurring vulnerability scans and provides detailed monthly reports to keep Industrial Defender’s leaders up-to-date on the vulnerabilities present in all of the organization’s cyber environments. 

    Defensible also helps further protect Industrial Defender from potential cyberattacks by heading a security awareness training program for all Industrial Defender employees, regardless of the department in which they work. One element of this program is internal threat testing; this can include crafting periodic messages that serve as a “phishing test,” sharing them across the organization to see if any employees click on a potentially dangerous link, and providing training to those who may be compromised by interacting with a real phishing email. 

Why Defensible

Organizations that operate within the critical infrastructure sector face a number of industry-specific cybersecurity challenges and require the attention and expertise of a seasoned cybersecurity professional. Get in touch with the experts at Defensible to see how they can help you better secure your organization.