KAJE Cyber
www.kajecyber.comDriven by the need to embrace Cybersecurity in Functional Safety, John Lear and Keerthy Mysore founded KAJE Cyber to Cybersecure your Plant. At KAJE Cyber, we provide ISA/IEC 62443 Lifecycle Services in Industrial Cybersecurity to Cybersecure your Plant. Our mantra: Assess, Implement & Maintain. Assess The Assess phase starts with a High Level Cybersecurity Risk Assessment which helps determine the type and extent of risks faced by the Organisation e.g., Health & Safety risk, Environmental risk, Financial risk, Reputation vis-a-vis the Risk Tolerance criteria. This is followed by a Vulnerability Assessment and a Detailed Cybersecurity Risk Assessment where a Security Level SL (Target) is assigned to each zone / conduit. Implement Once a SL (Target) has been assigned to a zone /conduit in the Assess phase, countermeasures are implemented during the Implement phase to reach SL (Achieved) better than or equal to SL (Target). The SL (Achieved) is determined after the system has been validated against the security requirements for the zone / conduit. Maintain Countermeasures and inherent security properties of devices and systems degrade over time. The security properties relevant to the zones / conduits must be audited and / or tested at regular intervals or whenever a new vulnerability is discovered during the Maintain phase to ensure that SL (Achieved) is better than or equal to SL (Target) at any point in time.
Read moreDriven by the need to embrace Cybersecurity in Functional Safety, John Lear and Keerthy Mysore founded KAJE Cyber to Cybersecure your Plant. At KAJE Cyber, we provide ISA/IEC 62443 Lifecycle Services in Industrial Cybersecurity to Cybersecure your Plant. Our mantra: Assess, Implement & Maintain. Assess The Assess phase starts with a High Level Cybersecurity Risk Assessment which helps determine the type and extent of risks faced by the Organisation e.g., Health & Safety risk, Environmental risk, Financial risk, Reputation vis-a-vis the Risk Tolerance criteria. This is followed by a Vulnerability Assessment and a Detailed Cybersecurity Risk Assessment where a Security Level SL (Target) is assigned to each zone / conduit. Implement Once a SL (Target) has been assigned to a zone /conduit in the Assess phase, countermeasures are implemented during the Implement phase to reach SL (Achieved) better than or equal to SL (Target). The SL (Achieved) is determined after the system has been validated against the security requirements for the zone / conduit. Maintain Countermeasures and inherent security properties of devices and systems degrade over time. The security properties relevant to the zones / conduits must be audited and / or tested at regular intervals or whenever a new vulnerability is discovered during the Maintain phase to ensure that SL (Achieved) is better than or equal to SL (Target) at any point in time.
Read moreEmployees statistics
View all employeesPotential Decision Makers
Operations Manager Co - Owner
Email ****** @****.comPhone (***) ****-****Professor of Economics ( On / Off )
Email ****** @****.comPhone (***) ****-****Self Employed
Email ****** @****.comPhone (***) ****-****Principal and Partner
Email ****** @****.comPhone (***) ****-****
Technologies
(2)