HTML Preview Building Threat Assessment page number 1.


A New Dawn Rising for Securing S
mart
B
uildings
THE THREAT
Smart building technologies should be considered CRITICAL
cyber assets. They offer an innovative and cost effective way
to improve the safety, comfort and reliability for building
occupants and owners. However, interconnected devices can
come with severely undesirable consequences. Multiple
vendor platforms, disparate integration, unpatched systems
deployed over multiple facilities presents tremendous cyber
and business continuity risk for an organization.
90%
of all smart building
devices analyzed have default/
weak passwords
8
of
10
of all smart building devices
analyzed have
CRITICAL
vulnerabilities
Multi Factor Authentication or
VPN NOT deployed for REMOTE
MANAGEMENT on over 90% of
devices audited
ABOUT LACONICL
Y
L
aconicly is a veteran owned and operated company
providing cyber security services for multiple industries to
include
:
C
ommercial
R
eal Estate, Manufacturing,
C
loud and
C
olocation Data
C
enters,
O
il
&
G
as, as well as traditional I
T
environments.
L
aconicly has years of hands
-
on experience
performing risk and threat assessments of the most critical,
high integrity systems.
S
mart
B
uilding
E
cosystem
L
ife
S
afey
S
ystems
A
cces
C
ontrol
HVAC
People
M
overs
L
ighting
Smart Building Technologies Threat Assessment and
Penetration Testing
Smart building technologies are often overlooked from traditional
IT security audits and assessments. In order to better understand
the level of risk an organization is facing, its important to have a
baseline and adequate situational awareness leveraging existing
security best practices. Laconicly's team of experts is suited to
help tackle this smart building technologies cyber security problem.
Application Threat Modeling and Risk Assessment
Laconicly specialists will examine and assess all the key
application components and supporting infrastructure. Focus is
placed on how application components are deployed and
communicate with both the user and server environments. A
rigorous methodology is leveraged utilizing a mix of automated
scanning tools and manual techniques to test and verify
exploitable vulnerabilities. A detailed report and recommended
the best practices and techniques to secure the application
environment are provided.
Additional Services
Smart Building configuration audit and hardening
Building commissioning and tuning cyber audit
Airgap testing and impact analysis
Secure smart building technology designs and planning
Internet facing smart building reconnaissance
All Rights Reserved 2015
Laconicly - Los Angeles, CA
[email protected] (213) 373-4435
J
1
DOWNLOAD HERE


To think is easy. To act is difficult. To act as one thinks is the most difficult. | Johann Wolfgang Von Goeth