Service Offerings

  • Advisement and governance
  • Diagnostic assessments and penetration testing
  • Incident response and disaster recovery
  • Key use case analysis and implementation
  • Program design and implementation
  • Technology design and implementation
  • Training, mentoring and staff augmentation

Today’s hardware and software offer advanced capabilities never before thought possible. This digital world is lifting connectivity and data growth to new heights. Taking advantage of these capabilities and information gives your organization a competitive advantage, but it also opens you up to new threats.

Whether it’s keeping the electricity or water flowing, protecting intellectual property, or simply protecting the image of your brand, every industry has different threats that must be mitigated with cybersecurity measures.

We study and understand the threat actors for critical infrastructure. We couple this with our engineering foundation to maintain a deep knowledge of your underlying assets and operations. This allows us to assess your current posture and advance your cybersecurity program by building around the technologies you have invested in already. Our services are modular, designed to be OT-specific and retrofitted to support any IT environment. Our experience in building out integrated cybersecurity programs allows us to work with internal or third-party services for a robust program that scales as your business grows.

Strategic considerations for modernizing OT networks

IT and OT networks have traditionally been isolated from one another. But bringing the two together offers exponential business value. Understanding the drivers and considering the technical aspects of integration allow for a successful and effective modernized network.

Read more

Compliance is an important aspect of many cybersecurity plans. In a standard security maturity model, compliance is the first stage and we closely follow legislation on new and changing regulations to keep you up to speed as you work toward protecting your infrastructure and developing a risk-based program for your organization.

Building and running a truly integrated cybersecurity program is challenging. We guide you through those obstacles to secure your organization now and into the future.

Grid architecture: Crossing the chasm between concept and implementation
Today’s technology is disrupting the edge of the grid. As the flow of power moves in multiple directions and the edge of the grid blurs, it becomes apparent that grid design will need to change to meet future needs.
Read more
Matt Morris, 1898 & Co., Part of Burns & McDonnell
Matt Morris
Director, Cybersecurity

Send Us a Note

*Denotes Required Field

1898 & Co. needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Because the future won’t wait.