{"id":10800,"date":"2021-04-19T11:40:28","date_gmt":"2021-04-19T11:40:28","guid":{"rendered":"https:\/\/privasec837746.wpengine.com\/sea\/?page_id=10800"},"modified":"2021-05-14T11:31:58","modified_gmt":"2021-05-14T11:31:58","slug":"scada-ics-penetration-testing","status":"publish","type":"page","link":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/","title":{"rendered":"SCADA ICS Penetration Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10800\" class=\"elementor elementor-10800\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50fc9c04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50fc9c04\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c15269f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f49ead0\" data-id=\"6f49ead0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f63bc33 elementor-widget elementor-widget-heading\" data-id=\"6f63bc33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">SCADA ICS Penetration Testing<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60d2ba8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60d2ba8b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;2f3114d&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6857abaa\" data-id=\"6857abaa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15f67f3c elementor-widget elementor-widget-text-editor\" data-id=\"15f67f3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SCADA or ICS environments are sensitive domains responsible for running critical functions such as utility networks, traffic management systems, farm and factory equipment, etc.<\/span><\/p><p><span style=\"font-weight: 400;\">The devices in these environments typically run old and vulnerable software, sometimes proprietary. Bespoke and multi-layered defence approaches are required to secure these environments.<\/span><\/p><p><span style=\"font-weight: 400;\">The critical nature of these environments make them attractive targets for financially motivated, state sponsored and nation-state attackers.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26d6d60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26d6d60\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;e6109a9&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48250b17\" data-id=\"48250b17\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41f30fc elementor-widget elementor-widget-heading\" data-id=\"41f30fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How we can help<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5219eeb0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5219eeb0\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5acbca98 elementor-widget elementor-widget-text-editor\" data-id=\"5acbca98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Conventional penetration testing methodologies and techniques cannot be used against SCADA\/ICS environments.<\/span><\/p><p><span style=\"font-weight: 400;\">Privasec, with our team of experienced and certified ethical hackers, helps you identify the valuable and safe testing techniques to recognise and remediate vulnerabilities before the bad guys find them.<\/span><\/p><p><span style=\"font-weight: 400;\">Our engagement process is simple and we are here in person and over the phone to assist at every stage.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0100e10 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0100e10\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;e4cadff&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d36c1b\" data-id=\"2d36c1b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef6cc78 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ef6cc78\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-950b80a elementor-widget elementor-widget-heading\" data-id=\"950b80a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Industry\u2019s Leading Red Team<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d1533 elementor-widget elementor-widget-text-editor\" data-id=\"e2d1533\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>To discuss how our Red Team can help you test your defences and\/or train your staff. Our direct and flexible approach means we can get your Red Team attack going in as quickly as 24 hours.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-664b5e2 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"664b5e2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/privasec837746.wpengine.com\/sea\/quick-quote\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 18.71875 6.78125 L 17.28125 8.21875 L 24.0625 15 L 4 15 L 4 17 L 24.0625 17 L 17.28125 23.78125 L 18.71875 25.21875 L 27.21875 16.71875 L 27.90625 16 L 27.21875 15.28125 Z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to our Red Team Specislist<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SCADA ICS Penetration Testing SCADA or ICS environments are sensitive domains responsible for running critical functions such as utility networks, traffic management systems, farm and factory equipment, etc. The devices in these environments typically run old and vulnerable software, sometimes proprietary. Bespoke and multi-layered defence approaches are required to secure these environments. The critical nature [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11407,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"wds_primary_category":0,"footnotes":"","_wp_rev_ctl_limit":""},"categories":[],"tags":[],"class_list":["post-10800","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SCADA ICS Penetration Testing - Privasec SEA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SCADA ICS Penetration Testing - Privasec SEA\" \/>\n<meta property=\"og:description\" content=\"SCADA ICS Penetration Testing SCADA or ICS environments are sensitive domains responsible for running critical functions such as utility networks, traffic management systems, farm and factory equipment, etc. The devices in these environments typically run old and vulnerable software, sometimes proprietary. Bespoke and multi-layered defence approaches are required to secure these environments. The critical nature [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Privasec SEA\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-14T11:31:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/\",\"name\":\"SCADA ICS Penetration Testing - Privasec SEA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2021\\\/04\\\/privasec_post.png\",\"datePublished\":\"2021-04-19T11:40:28+00:00\",\"dateModified\":\"2021-05-14T11:31:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2021\\\/04\\\/privasec_post.png\",\"contentUrl\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2021\\\/04\\\/privasec_post.png\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/scada-ics-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/privasec.com\\\/sea\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCADA ICS Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#website\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/\",\"name\":\"Privasec SEA\",\"description\":\"Governance and Information Security Partners\",\"publisher\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/privasec.com\\\/sea\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#organization\",\"name\":\"Privasec SEA\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2020\\\/12\\\/Copy-of-Privasec5-No-Tag-Line-1.png\",\"contentUrl\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2020\\\/12\\\/Copy-of-Privasec5-No-Tag-Line-1.png\",\"width\":850,\"height\":189,\"caption\":\"Privasec SEA\"},\"image\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SCADA ICS Penetration Testing - Privasec SEA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/","og_locale":"en_GB","og_type":"article","og_title":"SCADA ICS Penetration Testing - Privasec SEA","og_description":"SCADA ICS Penetration Testing SCADA or ICS environments are sensitive domains responsible for running critical functions such as utility networks, traffic management systems, farm and factory equipment, etc. The devices in these environments typically run old and vulnerable software, sometimes proprietary. Bespoke and multi-layered defence approaches are required to secure these environments. The critical nature [&hellip;]","og_url":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/","og_site_name":"Privasec SEA","article_modified_time":"2021-05-14T11:31:58+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/","url":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/","name":"SCADA ICS Penetration Testing - Privasec SEA","isPartOf":{"@id":"https:\/\/privasec.com\/sea\/#website"},"primaryImageOfPage":{"@id":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","datePublished":"2021-04-19T11:40:28+00:00","dateModified":"2021-05-14T11:31:58+00:00","breadcrumb":{"@id":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/#primaryimage","url":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","contentUrl":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/privasec.com\/sea\/scada-ics-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/privasec.com\/sea\/"},{"@type":"ListItem","position":2,"name":"SCADA ICS Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/privasec.com\/sea\/#website","url":"https:\/\/privasec.com\/sea\/","name":"Privasec SEA","description":"Governance and Information Security Partners","publisher":{"@id":"https:\/\/privasec.com\/sea\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/privasec.com\/sea\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/privasec.com\/sea\/#organization","name":"Privasec SEA","url":"https:\/\/privasec.com\/sea\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/privasec.com\/sea\/#\/schema\/logo\/image\/","url":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2020\/12\/Copy-of-Privasec5-No-Tag-Line-1.png","contentUrl":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2020\/12\/Copy-of-Privasec5-No-Tag-Line-1.png","width":850,"height":189,"caption":"Privasec SEA"},"image":{"@id":"https:\/\/privasec.com\/sea\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages\/10800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/comments?post=10800"}],"version-history":[{"count":0,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages\/10800\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/media\/11407"}],"wp:attachment":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/media?parent=10800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/categories?post=10800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/tags?post=10800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}