In order to improve the overall level of service it can provide its clients, ESCAPE engaged DYONYX to improve and automate, where appropriate, the current Database Profile management process.
DYONYX is an IT and Risk Management Consulting Firm that specializes in helping senior management design, assess, deploy and maintain secure and efficient critical infrastructures. Our energy - utility industry customers include some of the biggest names in the industry.
We speak the language of your industry. We understand both the business and technical perspectives of the energy, chemical and electric utility industry, enhancing our ability to appropriately assess risks and focus our tasks as required. These capabilities, coupled with our significant experience in securing transmission grid operations and mission critical application systems, uniquely qualify the DYONYX Team to support your firm with mission critical objectives.
The DYONYX Energy Team is the same team that designed, and delivered the curriculum for the NERC Education Workshop for the Standard across North America. In addition, this same team designed the risk-based Critical Asset and Critical Cyber Asset identification methodology for the NERC curriculum. Coupled with our team's real-world experience in the development and implementation of compliant policies and procedures, we understand the pitfalls and issues typically encountered with a CIP Reliability Standard compliant Security Program. Our highly regarded functional framework used to facilitate the proposed design and implementation of a compliant Security Program has been successfully utilized by members throughout the industry. Our team, composed of engineers and subject matter experts with an average of 27 years of energy - utility industry experience, is uniquely qualified to lead your firm through many of your challenging and complex projects.
Our services include:
• NERC CIP Compliance Consulting
• Asset Management and Tracking
• Encompassing Risk Management Services
• Information System (IS) Requirements Analysis
• SCADA/DCS Security Assessments & Penetration Audits
• Operations Control Process Optimization
• Database Security, Detection & Mitigation Guidelines
• Network Design and Optimization
• Data Center Consolidation, leveraging Virtualization
• Managed Services and International Support