Engineering-focused cybersecurity for critical infrastructure, integrating system design, validation, and resilient architectures.
ICS / OT system design, testing, and cybersecurity
Deterministic timing and resilience engineering
CINIMINER platform for threat simulation and analysis
Security and Analytics LLC focuses on cybersecurity for Industrial Control Systems (ICS) and Operational Technology (OT) environments that support critical infrastructure. Our work includes cybersecurity research, risk assessment, and architecture design for industrial networks, building automation systems, and operational technology platforms.Current research areas include ICS honeypots, industrial protocol security, cyber-physical system risk, and the impact of cybersecurity controls on control system timing and reliability. Our research environment includes PLC controllers, building automation systems, and industrial networking equipment used to study threats targeting operational technology.
Contact
➤ LOCATION
1000 Highland Colony Parkway
Suite 5203
Ridgeland, MS 39157
☎ CONTACT
gwskelton@securityandanalytics.com
601.427.4760
Areas of Practice
ICS / OT Cybersecurity Services
Assessments
Architecture
Segmentation
Risk analysis
CINIMINER Platform
Honeypot
Digital twin
Red/Blue Team testing
Industrial Control Design, Testing, and Cybersecurity
Industrial control systems (ICS) and operational technology (OT) environments require a disciplined engineering approach that integrates system design, validation, and cybersecurity. Unlike traditional IT systems, control environments must maintain safe, reliable, and deterministic operation while interacting with physical processes. Our methodology embeds cybersecurity directly into system architecture, ensuring that security measures support, rather than disrupt, control performance.
We design and evaluate control systems using industry-aligned architectures such as ISA/IEC 62443, incorporating segmentation, secure communications, and resilient control strategies. Through hardware-in-the-loop testing, digital twin modeling, and precise timing analysis, we validate system behavior under both normal and adverse conditions. This includes measuring latency, verifying control loop stability, and ensuring safe operation during faults or degraded states.
By integrating engineering, testing, and cybersecurity into a unified process, we deliver systems that are secure, measurable, and operationally resilient. This approach ensures that cybersecurity controls do not introduce unintended consequences, while enabling organizations to confidently deploy and maintain critical infrastructure systems.
Research & Development
Deterministic security
Timing analysis
Resilience engineeringDatabase design and Developme
Training & Education
Student labs
OT cybersecurity training
Hands-on environmentsre Design, Programming, Testing
Penetration Testing (PenTesting)
Conduct controlled penetration testing of industrial control systems, including PLCs, HMIs, and BAS controllers
Perform network discovery and mapping of OT environments, including identification of unmanaged or legacy devices
Execute protocol-specific assessments for BACnet, Modbus TCP, and other industrial communications
Validate segmentation and zone/conduit implementations aligned with ISA/IEC 62443
Test for unauthorized read/write capabilities and control manipulation risks
Simulate adversary behavior, including lateral movement between IT and OT networks
Perform credential and access control testing for engineering workstations and remote access pathways
Evaluate exposure of field devices and controllers to internal and external networks
Conduct fuzzing and malformed packet testing against industrial protocols (where safe and approved)
Assess the impact of cybersecurity controls on system performance, including latency and timing behavior
Validate logging, alerting, and detection capabilities (e.g., SIEM integration such as Wazuh)
Provide detailed reporting with prioritized remediation actions and engineering-focused risk analysis
“Dedicated to doing the right things right!”
Let's Chat.
Use the form below to contact us regarding your legal enquiry. Please be as detailed as possible. Include your industry along with any specific document requests. To help us best service your enquiry, we recommend that you first describe the issue you’re having before telling us what you want to achieve. You may also email or call us to make an appointment.
For job opportunities, please email us your resume. We’re always looking for new and exceptional talent to lead the firm into uncharted fields of practice.
PRIVACY POLICY
When you submit information to this website via webform, we collect the data requested in the webform in order to track and respond to your submissions. We share this information with Squarespace, our online store hosting provider, so that they can provide website services to us. We also share this information with for storage and with Zapier for data porting.