IT and ICS Security Assurance

Consultant | Training | Solutions
Fedco International, PT.

Welcome to Fedco - IT and ICS Security Consultant

Continual Improvement in ISO 27001 PDCA Life Cycle

  • Posted by fedco
  • On October 13, 2015
  • 0 Comments
  • deming wheel, information security life cycle, iso 27001, PDCA cycle
The soul of continual improvement has been the fundamental of any ISO standards, including Information Security Management System standard, ISO 27001.
Read More
 

IT and SCADA ICS Certified Cyber Security Courses

  • Posted by fedco
  • On October 12, 2015
  • 0 Comments
CERTIFIED ISO 27001 LEAD AUDITOR This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan […]
Read More
 

Oil and Gas Cyber Security: The Mammoth Cost Of Not Being Prepared

  • Posted by fedco
  • On July 28, 2015
  • 0 Comments
  • cyber security, ics security, it security, oil and gas cyber security
Cyber Security within the oil and gas industry is a threat that is, in many cases, being ignored. It has a direct effect in the creation of government regulation and legislation, can have deep financial impact and – in some cases – can even cost lives. The US ICS-CERT recognises these trends and are listing […]
Read More
 

PECB International Signs a Partnership Agreement with PT. Fedco International

  • Posted by fedco
  • On June 14, 2015
  • 0 Comments
  • ISO certification, ISO Partnership, ISO training, ISO training and certification
“We are very thrilled to work with our new partner PT. Fedco International,” said Elizabeth Bradshaw, Managing Director of PECB International. Montreal, Canada, May 24, 2015 –(PR.com)– PECB International, a well-known ISO standards certification provider, has signed a partnership agreement with PT. Fedco International. Joint forces will make sure that organizing and distribution of PECB […]
Read More
 

IT Security Assurance Lifecycle

  • Posted by fedco
  • On April 17, 2015
  • 0 Comments
  • it security, it security assurance, it security assurance lifecycle
IT security assurance lifecycle is consist of several entities that drive the achievement of the secure IT environment during the system lifecycle. 
Read More
 

Information Technology Security

  • Posted by fedco
  • On January 8, 2015
  • 0 Comments
  • it security
The term Information Technology security is actually a broad term that can cover a lot of things, from network infrastructure into personal internet security.  As the fundamental approach, we can divide the Information Technology security into two main domain, there are: 1. Corporate Domain 2. Personal Domain More or less the corporate domain of Information […]
Read More
 

Information Technology Security Policy

  • Posted by fedco
  • On January 8, 2015
  • 0 Comments
  • it security policy
The process and activities that the employees doing within the company should adhere to the deployed standard and regulation. The company will always want to ensure that every business activities that performed related to the company is following its standard and regulation, including for the Information Technology security segment. The Information Technology security assurance is […]
Read More
 

Targeted Cyber Intrusion Detection and Mitigation Strategies

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • cyber security strategy, intrusion detection and prevention system
Overview Sophisticated and targeted cyber intrusions against owners and operators of industrial control systems across multiple critical infrastructure sectors have increased in recent months. ICS-CERT developed the following guidance to provide basic recommendations for owners and operators of critical infrastructure to mitigate the impacts of cyber attacks and enhance their network security posture. This guidance applies to organizations whose […]
Read More
 

Bash Shell Vulnerabillity – Security Threats to LINUX/UNIX Machine

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • bash shell vulnerability, security vulnerabilities
A bug discovered in the widely used GNU Bourne Again Shell (Bash), the common command-line shell used in most Linux/UNIX operating systems and Apple’s Mac OS X. The command interpreter poses a critical security risk to Unix and Linux systems since this flaw could allow an attacker to remotely execute shell commands by attaching malicious code […]
Read More
 

Are You Still Using Windows Server 2003 in Your Industrial Control System (ICS) Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • it security, windows security
It is (will be) the end of Windows Server 2003 support from Microsoft. Starting from July 14, 2015 the following support will no longer available for this Operating System, there are: 1. Security patches that help protect PCs from harmful viruses, spyware, and other malicious software 2. Assisted technical support from Microsoft 3. Software and content updates For […]
Read More