...

Cyber Assurance Delivery Partner

BMT is providing a multi-disciplinary team to our customer, who wants to improve the security and security assurance of their multiple processing and distribution systems in platforms and supporting infrastructure.

The challenge our customer is facing

Exploitation of cyber vulnerabilities in systems is a very real threat, including in the Maritime Sector. The vulnerabilities of individual equipment, systems or whole platforms can range from physical access to systems by non-authorised personnel, to penetration via electronic means, over the air, or interrupting or eavesdropping on communications. Our customer wants to improve the security and security assurance of their multiple processing and distribution systems in platforms and supporting infrastructure.

The solution BMT is providing

BMT has a team of information assurance trained and certified specialists, able to work at high levels of Government Security. They can provide and support security policy and governance to projects, undertake security risk assessments at platform, system or equipment level, and can advise Customers on preventative measures to reduce the risk of cyber vulnerability exploitation. The ultimate objective is to incorporate a secure-by-design approach and ensure secure architecture of equipment and systems.

Our team bid for, and won, a multi-year contract for a Maritime Customer. BMT is providing a multi-disciplinary team incorporating information assurance professionals, domain specialists, systems engineers and training experts to deliver a cyber assurance delivery partner service.  Tasks include determining priority systems requiring cyber assurance, providing high level cyber policy advice, and assessing cyber security risk of individual systems.  Follow-on implementation and consultancy on specific solutions will also be provided.

How the BMT solution benefits the customer

Providing BMT expertise in cyber assurance means the Customer will understand the levels of risk associated with Cyber vulnerability across the spectrum of platforms and supporting systems. This will facilitate the implementation of measures which are enduring, and in future, be incorporated in the design and architectures of legacy and future equipment.

Related projects