Download document () of 20
  • Engineers working on a computer

    Initial Cybersecurity Assessment

    As the devices, processes, and infrastructure--also called Operational Technology (OT)--in factories, plants, datacenters, and power management systems become increasingly digital and interconnected, the potential for malicious cybersecurity events grows. To protect against the growing threats, organizations need to adopt a process of identifying, fixing, and managing their OT assets. Conducting an initial cybersecurity assessment is the first step.
    Contact an expert

Foundational exploration of risk

You cannot protect what you don’t know you have, and you cannot fix what you don’t know is vulnerable. Eaton’s Initial Cybersecurity Assessment aligns with the NIST cybersecurity framework and aims to document your most critical assets (crown jewels) and identify focus areas for remediation. The goal is to equip decision makers with valuable information that allows them to prioritize cybersecurity improvements and maximize the return on their investment.

What to expect from your initial cybersecurity assessment

An Eaton service or cybersecurity representative will travel to the customer site (or remotely) conduct personnel interviews, evaluate cybersecurity processes and review technology practices to assess the maturity and implementation of the existing cybersecurity program.

We provide a Cyber Risk Fitness Score based on the following cybersecurity tenants:

  • Asset Management
  • Training and Awareness
  • Logging and Monitoring
  • Response and Recovery
  • Secure Access
  • Secure Configuration
  • Secure Architecture
  • Vulnerability Management