Case study:
Mining

Leveraging PROTECT+ Threat Intelligence and Threat Response to increase visibility of security threats in a complex global environment.

Case Study 01

CASE 01
MINING

Business Challenge
  • The customer lacked the necessary systems and capability to perform effective incident management and triage and suffered lack of operational visibility of potential security threats within a highly complex global operating environment.
  • IT and OT domain governance were misaligned to the wider corporate system, resulting in increased risk, escalation challenges and a low maturity for managing security events and issues.
Solution
Leveraging the PROTECT+ Threat Intelligence and Threat Response solution:
  • Kinetic IT worked collaboratively with the customer’s IT, OT and cyber security teams to transition event logging from key components of their infrastructure and applications network into a tailored Threat Intelligence and Threat Response solution.
  • Custom parsers were developed, allowing the consumption of events and information from legacy devices and providing ‘whole of network’ visibility and correlation.
Business Challenge
  • The customer lacked the necessary systems and capability to perform effective incident management and triage and suffered lack of operational visibility of potential security threats within a highly complex global operating environment.
  • IT and OT domain governance were misaligned to the wider corporate system, resulting in increased risk, escalation challenges and a low maturity for managing security events and issues.
Solution
Leveraging the PROTECT+ Threat Intelligence and Threat Response solution:
  • Kinetic IT worked collaboratively with the customer’s IT, OT and cyber security teams to transition event logging from key components of their infrastructure and applications network into a tailored Threat Intelligence and Threat Response solution.
  • Custom parsers were developed, allowing the consumption of events and information from legacy devices and providing ‘whole of network’ visibility and correlation.

MINING CASE
KEY OUTCOMES

24x7 access to highly skilled and experienced PROTECT+ resources, supplemented by an interactive customised dashboard for contextualised reporting.

Provision of an enterprise-wide incident management framework and technical playbooks to support resolver groups.

Threat monitoring across all devices within the customer’s environment.

Key Fact 1

PROTECT+ Threat Intelligence

0
Events Processed
Annually
0
Correlated Events
Annually
0
Incidents Handled
Annually
Key Fact 2

PROTECT+ Security Assurance

  • Defined all primary responder incident playbooks and overarching framework.
"Thank you so much for the guidance and support given during the detection of suspicious activity at one of our mine sites. The way the SOC Analyst engaged and guided us through incident response recommendations was fantastic."
Team Leader
Service Desk & Security Operations
Australian Mining & Resource Organisation

Become a
PROTECT+ Partner

Call Now

Click or Tap

Email Now

Click or Tap

Speak with a
PROTECT+ Expert

Call Now

Click or Tap

Email Now

Click or Tap