Once the integration phase is completed, at the end of the commissioning phase and prior to the line becoming operable, your challenge is to make sure the implemented solution meets your pre-defined tender cybersecurity requirements.
Our service offers to evaluate the extent to which the implemented solution meets your pre-defined cybersecurity requirements in the tender. Our methodology includes reviewing the implemented
operational design, systems and subsystems, rail communication protocols, architecture and security controls. We go deep into the technical details to ensure your cybersecurity requirements are enforced
in a sufficient way and also consider the compensating countermeasures in place. We identify gaps in the implementation, advise on mitigation approaches, and assist you in eliminating the risks.