With the ever-increasing need for secure systems, McKim & Creed has risen to this challenge and offers a complete, and client focused approach, to SCADA cybersecurity.
With the ever-increasing need for secure systems, McKim & Creed has risen to this challenge and offers a complete, and client focused approach, to SCADA cybersecurity.

SCADA Cybersecurity

Stable instrumentation and controls (I&C) and Supervisory Control and Data Acquisition (SCADA) systems allow utility providers to monitor and control processes, which saves time and frees up operator resources for more critical tasks. McKim & Creed’s team of 25 talented controls engineers, designers, programmers, integrators, and field administrators has been providing I&C and SCADA services to our clients for over 25 years. Collectively, our team brings more than 150 years of I&C and SCADA experience in the municipal and industrial markets.  With the ever-increasing need for secure systems, McKim & Creed has risen to this challenge and offers a complete, and client focused approach, to SCADA cybersecurity.

A critical component of designing and building SCADA systems is providing the highest level of security. Keeping SCADA systems secure will safeguard a community’s water supply and other vital infrastructure to keep everyone safe.  Our designs incorporate and fully integrate solid security practices into them, resulting in a fully operational, yet secure, SCADA system.

McKim & Creed focuses on the engineering design and build of SCADA systems, typically utilized in the: ​

  • Water​
  • Wastewater ​
  • Renewables​
  • Midstream Oil & Gas​
  • Upstream Oil & Gas​
  • Microgrids​
  • Light Manufacturing

McKim & Creed offers:

High-Level Risk Assessment

Driven by published industry standards (ISA/IEC-62443-3-2) and focused on new projects or significant upgrades, the scope typically is driven by risks, design architecture, equipment, applications, and the operating model(s) required to support and sustain the security countermeasure installed as part of a new project. ​

McKim & Creed sticks to the fundamentals in any engineering problem. SCADA cybersecurity is not different. Our approach is based on risk; our solutions are pragmatic and aligned to engineering and design to enable safe and secure operations and maintenance.​

SCADA Security Readiness

Based on McKim & Creed’s cyber, engineering, and operations experience that focuses on the client’s previous assessments, countermeasure status, governance, training, and awareness, the SCADA security readiness scope begins with a focus on open items or concerns that have not been accomplished to date (i.e., Pragmatic vulnerability management, operationalized asset management, OT/IT network security tools and interfaces, etc.).​

McKim & Creed’s SCADA Security Readiness cybersecurity enables an operations team to:​

  • Be Prepared​
  • Document the Defense​
  • Continue to Advance Cybersecurity ​
  • Create and Maintain a Roadmap for the Future

SCADA Asset Management

Based on multiple industry standards that call for asset inventories and management, our goal is to operationalize the asset index and database via day-to-day items within the fundamentals of cybersecurity and countermeasures supporting a safe and secure system. The process leverages McKim & Creed’s cyber, engineering, and operations experience in making asset management systems. The win for our clients is making asset management a useful tool, not a reference table. ​

The McKim & Creed SCADA asset management offerings enable an operations team to:​

  • Start Small​
  • Develop Basics ​
  • Plan the Technology

SCADA Vulnerability Management

Based on multiple industry standards to validate the vulnerability management work process and day-to-day activities are fundamental, defendable, and repeatable. The method leverages McKim & Creed’s cyber, engineering, and operations experience in dealing with and addressing the complex and often overwhelming challenge of managing vulnerabilities. The McKim & Creed team sticks to the fundamentals of consequences of compromise, likelihood, and exploitability within the protective countermeasures that are in place. ​

The McKim & Creed vulnerability management offerings enable an operations team to analyze, categorize, and defend what vulnerabilities to:

  • Treat
  • Tolerate
  • Terminate
  • Transfer

Projects