How Rokster Used the SecurityGate.io Platform to Upskill Their Client’s Workforce

Dominik and Ted discuss Rokster success

In the middle of 2021, Rokster was approached by a client that needed help with their OT cybersecurity but didn’t know where to start. This company was based in Latin America and had recently grown through mergers and acquisitions, leaving them with a mess of dissimilar systems and processes that they had to manage across […]

Case Study – How Rokster Solved Cybersecurity Challenges for Their Client with SecurityGate.io

Case Study How Rokster Solved Cybersecurity Challenges for Their Client with SecurityGate.io About the company Rokster offers services around four main competencies: cybersecurity, artificial intelligence, business intelligence and blockchain. With a team of experts in each of these areas, Rokster has helped a global cohort of companies protect their assets and grow within their industries. After […]

Cyber is People – How to Improve Your Most Overlooked Area for Risk

people are your most important cybersecurity asset

WHITEPAPER Cyber is People – How to Improve Your Most Overlooked Area for Risk Introduction In a 2016 paper for the International Journal of Human-Computer Interaction, a research team led by Leah Zhang-Kennedy noted that “Although computer security technologies are the first line of defense to secure users, their success is dependent on individuals’ behavior.”1 […]

Drilling Company Matures OT Cyber Risk Program with SecurityGate

CASE STUDY About the Company This SecurityGate.io customer is an oil-service industry leader, specializing in rigs and drilling equipment. For privacy and security reasons, they have chosen to remain anonymous for this case study. Their Director of Security is in charge of ensuring all the industrial control systems (ICS) are secure and properly assessed for […]

How This Chemical Company Eliminated Spreadsheet OT Risk Assessments

CASE STUDY What Challenges Did They Face? Like many critical infrastructure organizations, this chemical company was dependent on spreadsheets for running cyber risk assessments across their operational technology (OT) environment. Most of the company’s OT/ICS risk assessments were done in person and data was manually entered into spreadsheets. From there, another team would organize everything into PowerPoint presentations […]

Platform
Learn
About Us

Contact Us