Welcome to
Cutaway Security

Cutaway Security, a veteran owned company, is a team of seasoned information security professionals who stand ready to assist you with your industrial and automation cyber security efforts. We feel that security starts with a solid foundation of understanding an organization’s assets, people, and business requirements. We will leverage this philosophy and our unique experiences in the manufacturing, energy, media, and service industries to help accurately scope and complete your next security effort.

Read More

welcome-bottom

Our SERVICES

Industrial Control System Security

Continuous operations and unique technologies make securing ICS environments a challenging task. Our team can provide the expertise your team needs to review your ICS environment and help them secure it according to industry standards, such as ISA/IEC 62443.

Security Program Maturity Assessments

Most security teams are challenged by continuous operations. This makes it hard for them to take time to evaluate the security program for gaps and prioritize strategic efforts. Our team can augment your team to evaluate the current state of your security program and identify steps that improve the overall security of your organization inline with your business needs.

Security Assessments

We provide a wide variety of security assessment services. Architecture reviews, merger and acquisition environment analysis, assumed breach assessments, web assessments, and penetration testing. Each of these provide your team with information to feed into your vulnerability and risk analysis programs.

Hardware and Device Assessments

The Internet of Things can expose an organization to new threat vectors they have yet to experience. A security assessment of these devices can provide details about how the device communicates and handles data. Information your team needs to understand to define requirements and configure controls to protect your data and assets.

Incident Response

Incident response can be intimidating and challenging. Let us augment your team by providing analysis of forensic analysis of system and network events to feed your team with actionable intelligence. This will allow your team to focus on internal efforts to contain the event, eradicate the compromise, and return your critical applications to normal operations.

Information Security Training

Knowledges starts with exposure to information and consistent application over time. We participate in SANS, ControlThings.io, and ICS Village training programs to educate and empower your team. We also provide specialized training to meet your team’s information security goals.

services-bottom

Team BLOG