IT/OT Cybersecurity • Audits • Incident Response • 24/7 Retainer

Why companies choose my IT/OT security support:

Securing industrial infrastructure (OT/ICS) requires both deep technical knowledge and understanding of operational processes.
I help organisations assess risk, implement controls and procedures compliant with NIS2, ISO/IEC 62443 and ISO/IEC 27001,
and build resilience across IT, OT and mixed network environments.


Scope of services

IT/OT security audits

Assessment of industrial systems, servers, networks and peripheral devices. Identification of technical and procedural weaknesses.

Risk analysis & compliance

Identification of assets, threats and vulnerabilities. Roadmap aligned with NIS2, ISO/IEC 62443, ISO/IEC 27001 and ENISA guidelines.

Network segmentation & architecture

Design of security zones and conduits, access limitation and logical separation of industrial systems (PLC, SCADA, HMI).

Monitoring & incident response

Development of incident response procedures, playbooks, event analysis and log correlation. SOC and SIEM integration.

Retainer (subscription-based advisory)

Continuous expert support: risk reviews, vendor assessments, incident consultations and security governance with defined SLA.


Cooperation process

  1. Initial assessment and environment interview
    Collecting information about architecture, technologies and operational processes.
  2. Risk & gap assessment
    Identification of key assets, threats and technical vulnerabilities.
  3. Recommendations & action plan
    Prioritised risks, remediation plan and proposed security controls.
  4. Implementation & team training
    Support in executing the plan, validating effectiveness and training staff.
  5. Ongoing support (retainer)
    Regular reviews, updated policies, vendor evaluations, incident drills and advisory.

Areas of specialisation


FAQ

How is OT security different from IT security?In OT environments, the priority is **continuous operation and physical process safety**. In IT, the priority is confidentiality and data protection. OT requires different architectures, tools and access policies.
How often should an OT audit be performed?Full audits are recommended once a year or after any major infrastructure change. Partial control checks — every 6 months.
Do you implement NIS2 or ISO/IEC 62443 requirements?Yes. I help with gap analysis, documentation preparation and compliance audits for operators of essential services and technology providers.
How does a retainer cooperation model work?We define a monthly pool of advisory hours and an SLA — rapid expert availability, incident reviews, change consultations and periodic reports.

Contact

Do you need an audit or expert support for your OT/ICS security?

📞 Phone: +48 515 601 621
✉️ Email: biuro@wichran.pl

Request a security audit »