KAJE Cyber

www.kajecyber.com

Driven by the need to embrace Cybersecurity in Functional Safety, John Lear and Keerthy Mysore founded KAJE Cyber to Cybersecure your Plant. At KAJE Cyber, we provide ISA/IEC 62443 Lifecycle Services in Industrial Cybersecurity to Cybersecure your Plant. Our mantra: Assess, Implement & Maintain. Assess The Assess phase starts with a High Level Cybersecurity Risk Assessment which helps determine the type and extent of risks faced by the Organisation e.g., Health & Safety risk, Environmental risk, Financial risk, Reputation vis-a-vis the Risk Tolerance criteria. This is followed by a Vulnerability Assessment and a Detailed Cybersecurity Risk Assessment where a Security Level SL (Target) is assigned to each zone / conduit. Implement Once a SL (Target) has been assigned to a zone /conduit in the Assess phase, countermeasures are implemented during the Implement phase to reach SL (Achieved) better than or equal to SL (Target). The SL (Achieved) is determined after the system has been validated against the security requirements for the zone / conduit. Maintain Countermeasures and inherent security properties of devices and systems degrade over time. The security properties relevant to the zones / conduits must be audited and / or tested at regular intervals or whenever a new vulnerability is discovered during the Maintain phase to ensure that SL (Achieved) is better than or equal to SL (Target) at any point in time.

Read more

Reach decision makers at KAJE Cyber

Lusha Magic

Free credit every month!

Driven by the need to embrace Cybersecurity in Functional Safety, John Lear and Keerthy Mysore founded KAJE Cyber to Cybersecure your Plant. At KAJE Cyber, we provide ISA/IEC 62443 Lifecycle Services in Industrial Cybersecurity to Cybersecure your Plant. Our mantra: Assess, Implement & Maintain. Assess The Assess phase starts with a High Level Cybersecurity Risk Assessment which helps determine the type and extent of risks faced by the Organisation e.g., Health & Safety risk, Environmental risk, Financial risk, Reputation vis-a-vis the Risk Tolerance criteria. This is followed by a Vulnerability Assessment and a Detailed Cybersecurity Risk Assessment where a Security Level SL (Target) is assigned to each zone / conduit. Implement Once a SL (Target) has been assigned to a zone /conduit in the Assess phase, countermeasures are implemented during the Implement phase to reach SL (Achieved) better than or equal to SL (Target). The SL (Achieved) is determined after the system has been validated against the security requirements for the zone / conduit. Maintain Countermeasures and inherent security properties of devices and systems degrade over time. The security properties relevant to the zones / conduits must be audited and / or tested at regular intervals or whenever a new vulnerability is discovered during the Maintain phase to ensure that SL (Achieved) is better than or equal to SL (Target) at any point in time.

Read more
icon

Country

icon

Employees

1-10

icon

Founded

2017

icon

Social

  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Operations Manager Co - Owner

    Email ****** @****.com
    Phone (***) ****-****
  • Professor of Economics ( On / Off )

    Email ****** @****.com
    Phone (***) ****-****
  • Self Employed

    Email ****** @****.com
    Phone (***) ****-****
  • Principal and Partner

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(2)

Reach decision makers at KAJE Cyber

Free credits every month!

My account

Sign up now to uncover all the contact details