Loading
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

InformationInformation
This content is not available in your selected language.
Rockwell Automation logo
Products
Hardware
What's New in Hardware Circuit & Load Protection Condition Monitoring Connection Devices Distributed Control Systems Drives Energy Monitoring Human Machine Interface (HMI) Independent Cart Technology Industrial Computers & Monitors Industrial Control Products Input/Output Modules Lighting Control
Motion Control Motor Control Network Security & Infrastructure Power Supplies Programmable Controllers Push Buttons & Signaling Devices Relays & Timers Safety Instrumented Systems Safety Products Sensors & Switches Signal Interface
Software
 
What's New in Software Purchase Software Subscriptions Cloud Software
 
Design
Studio 5000 FactoryTalk Logix Echo Emulate3D Digital Twin Arena Simulation FactoryTalk Design Studio FactoryTalk Vault
 
Analytics & Data
FactoryTalk Analytics FactoryTalk Historian FactoryTalk Analytics LogixAI FactoryTalk DataMosaix DataReady FactoryTalk Energy Manager Thingworx IIoT FactoryTalk Transaction Manager FactoryTalk Analytics VisionAI FactoryTalk Analytics Pavilion8
HMI
FactoryTalk View FactoryTalk Optix Software FactoryTalk Optix Platform
 
MES
Plex MES Plex Connected Worker FactoryTalk ProductionCentre FactoryTalk PharmaSuite Plex MES for Food & Beverage FactoryTalk CPGSuite Plex Quality Management System Plex Enterprise Resource Planning Plex Asset Performance Management Plex Production Monitoring Finite Scheduler FactoryTalk EIHub
 
Performance Monitoring
FactoryTalk Metrics OEE
 
Thin Client Management
ThinManager
Maintenance
Fiix CMMS FactoryTalk Analytics GuardianAI FactoryTalk AssetCentre FactoryTalk Remote Access Emonitor
 
Process
PlantPAx FactoryTalk Batch
 
Industrial Communications
FactoryTalk Linx
 
XR/Augmented Reality
Vuforia
Product Directory Allen-Bradley FactoryTalk
Services
Lifecycle Services
Learn About Our End-to-End Services
 
Production Automation
Overview Coordinated Drive System Solutions Packaged Solutions
Digital Operations
Overview
Industrial Cybersecurity
Cybersecurity Industrial Network Infrastructure Pre-Engineered Network Solutions
Production Optimization
Asset Optimization Services Overview Equipment Repair Equipment Remanufacturing Repair and Inventory Agreements Integrated Service Agreements Remote Support & Monitoring Onsite & Field Services Safety Services Training Services
Loading
Solutions & Industries
Solutions
Advanced Motion & Robotics Asset Management Cybersecurity Data Operations & Analytics Digital Thread Digital Transformation HMI / SCADA Industrial Automation Control Industrial Components New Capacity Networks & Infrastructure
On-Machine Solutions Packaged Solutions Process Solutions Production Automation Production Operations Management Safety Solutions  Scalable Control & Visualization Smart Manufacturing Sustainability Solutions Workforce Enablement
 
Solutions for
OEMs
Industries
Automotive & Tire Cement Chemical Entertainment Fiber & Textiles Food & Beverage Household & Personal Care Hydrogen Infrastructure Life Sciences Marine
Metals Mining Oil & Gas Power Generation Print & Publishing Pulp & Paper Semiconductor Warehouse & Fulfillment Waste Management Water Wastewater
Loading
View Case Studies
Support
Documentation
Technical Documentation Center Product Drawings & Wiring Diagrams Product Certifications Release Notes Technical Specifications
Product Support
Downloads Selection & Configuration Management
Training
Webinars Workforce Development Training Instructor-led Courses Certificate Programs Job Aids Training Workstations Learning+ Training Subscriptions
Contact Us
TechConnect Support Customer Care Software Portal Help General Inquiries
TechConnect Support
Man with headset providing customer service support
TechConnect Support

Get the knowledge and assistance for solving your technical challenges.

Learn More about TechConnect
Compatibility and Downloads (PCDC) Knowledgebase Literature Library Engage Online Community
Sales & Partners
How to Buy
Find a Partner Find a Sales Office
 
Our PartnerNetwork
PartnerNetwork Program Distributor Partners Licensed Developers
Original Equipment Manufacturer (OEM) Partners System Integrator Partners Technology Partners
What is the PartnerNetwork™?
Two people interacting using tablet
What is the PartnerNetwork™?

Our Rockwell Automation PartnerNetwork™ program gives our customers access to the best people, products, services and solutions to meet manufacturing goals and bring The Connected Enterprise to life.

Explore Now
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Resources
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

Select country or region
  • Denmark
  • Argentina
  • Australia
  • Belgique | Belgium
  • Brasil
  • Canada
  • Colombia
  • Czech Republic
  • Deutschland
  • España
  • Finland
  • France
  • Hungary
  • India
  • Indonesia
  • Ireland
  • Israel
  • Italia
  • México
  • Netherlands
  • New Zealand
  • Norway
  • Poland
  • Portugal
  • Puerto Rico
  • Romania
  • Russia
  • Schweiz | Suisse
  • Singapore
  • South Africa
  • Sweden
  • Turkey
  • Ukraine
  • United Arab Emirates
  • United Kingdom
  • United States
  • Österreich
  • 中国
  • 台灣, 中國
  • 日本
  • 한국
Select language
  • English
  • Deutsch
  • Español
  • Français
  • Italiano
  • Português
  • 日本語
  • 简体中文
  • 繁體中文
  • 한국어
Sign In Create an Account
Why Create an Account?
Create bills of materials, submit repair quotes, register products and more!

Manage your e-communication subscription preferences.

Manage your user profile.
Welcome, {0}
Residing Location
My Account Sign Out
Recent searches
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
Suggested searches
  • SearchSearch HistoryHistory
Most relevant results
View all search results Chevron RightChevron Right
Blog | Cybersecurity
Recent ActivityRecent Activity
3 minute read

How to Achieve Your Target Cybersecurity Posture

Assess risk and identify gaps in your program with cybersecurity assessments.

Share This:

LinkedInLinkedIn
XX
FacebookFacebook
PrintPrint
EmailEmail
Focus is on two male employees viewing monitor with data

Every company’s journey to become more secure is unique. The factors that may impact your target security profile include operating risk, unique operating workflows, policies, procedures, risk tolerance, and more.

Unfortunately, it is impossible to become 100-percent risk free. The goal should be to establish a tolerable level of risk based upon your unique operating environments.

The journey to improve your industrial security strength, or posture, may seem complex, and for good reason. With many different methodologies, industrial standards, and available technologies on the market, the path forward may not be clear. You may wonder: "Where do we start?"

One way to begin this journey is through the use of security assessments. In its simplest form, a security assessment is a structured measurement of the security posture of a system or organization.

When used appropriately, assessments can be an extremely effective method to evaluate your current security posture, identify the gap between your current state and ideal target state, and lay out clear steps to achieve your target security posture.

Cybersecurity Preparedness Assessment
Female Project Manager and Male Engineer Standing Wearing Safety Jackets, Hard Hats, Work in Workshop, Talking, Using Digital Tablet and Monitoring CNC Machinery Assembly Line, Modern Factory: Female Project Manager and Male Engineer Standing Wearing Safety Jackets, Hard Hats, Work in Workshop, Talking, Using Digital Tablet and Monitoring CNC Machinery Assembly Line
Assessment
Cybersecurity Preparedness Assessment

It's not a question of if your business will be subjected to a cybercrime, it's when. Take this quiz to evaluate your cybersecurity preparedness.

Take the Assessment

Types of Assessments

The phrase "security assessment" can mean many different things, so it's important to properly scope the assessment based on the intent of the initiative. The most common types of assessments may each yield different findings that can impact the steps you take in your security program.

  1. Vulnerability Assessment: Identifies known vulnerabilities that exist within an environment, in an effort to put an action plan in place to remediate them.
  2. Gap Analysis: Identifies the gap between an organization's existing security posture and the ideal target state of its security posture. Gap analyses are typically in consideration of a corporate or industry standard and are intended to clearly define the steps required to achieve the desired target security posture.
  3. Risk Assessment: Provides a more holistic view of an organization's security posture. A risk assessment combines elements of a vulnerability assessment and gap assessment to identify and assess known risks against the risk tolerance of the organization and its ideal security posture.
  4. Security Audit: This assessment-based service audits an organization's security posture and practices against a given industry standards or requirements body, usually to help ensure compliance such as NERC-CIP or other standards.

Bear in mind that while the above are common types of security assessments, it’s important to begin with an understanding of the intended objective prior to making a selection. This will be critical to help ensure proper expectations are both aligned and met, and the most effective assessment is selected to progress your cybersecurity program.

Be Realistic

When considering which type of assessment is right for your organization, remember that an assessment is a snapshot of one point in time. It should not be viewed as the sole solution to an organization’s security program. Rather, it is like a regular check-up to confirm maintenance, management, and technical controls are appropriate for your intended risk tolerance.

If you’re dealing with restricted budgets and limited resources and cannot perform an assessment across the entire organization, you may want to take a “representative sample” approach, which reduces the scope of the assessment to a portion of your organization that will offer a baseline.

Putting it all together

Security assessments can be effective tools to evaluate your current security posture, but must be properly selected, scoped, and paired with an actionable roadmap that lays out clear, actionable steps to achieve your target security profile. The right provider can help you with assessments and building a robust security program.

Learn More About Our Cybersecurity Solutions
Video Player
Chevron DownChevron Down Chevron DownChevron Down
Practical Approach to Industrial Cybersecurity
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.
Video
Cybersecurity Incident Response Plan: Ready to Respond

We integrate industrial security software from providers who understand operational functions within industry protocols, help secure your network and respond to incidents.

Published April 29, 2019


Quade Nettles
Quade Nettles
Product Manager for Cybersecurity Services, Rockwell Automation
Quade Nettles manages services associated with cyber security at Rockwell Automation. Quade’s primary responsibility is to develop the strategic roadmap for industrial cyber security services, which include consultative services like risk assessments and 24x7 managed support services. Since joining Rockwell Automation in 2012, Quade has held various positions with increasing responsibility in both technical and project management roles. Prior to his current position Quade served as a Global Program Manager of a cyber security program. Quade holds Bachelor of Business degree in Computer Information Systems from the University of Toledo and a Master of Business Administration degree from Cleveland State University.
Connect:
EmailEmail
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe

Recommended For You

Loading
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Com... Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right
  5. Chevron LeftChevron Left Improve Your Industrial Cybersecurity Strength Chevron RightChevron Right
Company
About Us Careers Diversity, Ethics and Integrity Engage Online Community Investor Relations Modern Slavery Statement Sustainability Trust Center
 
News & Events
Newsroom Press Releases Automation Fair Upcoming Events
 
Trending Topics
Cybersecurity Digital Transformation Smart Manufacturing The Connected Enterprise®
 
Training
Webinars Workforce Development Training
 
PartnerNetwork
Find a Partner What is the PartnerNetwork?
 
Our Brands
Allen-Bradley FactoryTalk LifecycleIQ Services
Contact Us
TechConnect Support Customer Care General Inquiries How to Buy Report Ethical Concerns
Insights
ROKStudios Management Perspectives Results Achieved Case Studies Blogs Automation Today Podcasts
BlogRockwell Automation's Blog
DK | EN
Legal Notices
Privacy & Cookies Policy
Email Preferences
Cookie Settings
Accessibility Settings
© 2025 Rockwell Automation
Rockwell Automation Home
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose