
Protecting Industrial and Automaton Ecosystems.
Compliant. Practical. Proven.
The cyber threat landscape for industrial control systems is evolving fast. At SINDEX 2025 in Bern (Switzerland), Compass Security offers a hacker’s perspective on industrial security standards.
Visit our booth to discover how practical cybersecurity reviews, threat modeling, and penetration tests can secure factory automation, water treatment, or rail networks.
Venue
📅 September, 2 - 4, 2025
📍 BERNEXPO, Bern / Hall 3.0, Booth C34
📢 Presentation at SINDEX Forum (Hall 2.2): The topic and time to follow
Securing the Systems That Drive Your Business
Whether you operate critical infrastructure or build embedded systems, we help you protect what matters most. Without disrupting operations.
We specialize in industrial cyber across:
- Energy & Utilities: Power grids, hydro plants, utilities
- Manufacturing & Automation: OT environments, SCADA & PLC networks
- Transport & Infrastructure: Rail systems, traffic controls
- Machine Integrators & OEMs: Embedded control devices
How You Benefit from Our Expertise
You profit from our 25 years of experience securing internet-exposed systems and services. Compass Security offers the depth of knowledge you can rely on. We apply our expertise to benefit you, helping
- avoid costly redesigns by addressing weaknesses before they disrupt operations,
- prove security maturity to partners and customers through industry-aligned practices,
- strengthen resilience for systems running in the field
Your IEC 62443 Partner
Whether you're just starting your industrial cybersecurity program or strengthening your existing posture, we support you throughout your IEC 62443 compliance journey. From strategy to technical execution.
Standard Area | What We Provide |
62443‑2‑1 Security Programs | Policy gap analysis, program maturity review |
62443‑3‑2 Risk Assessment | Zone modeling, threat/disruption analysis |
62443‑3‑3 System Requirements | Secure design & segmentation validation |
62443‑4‑1 Secure Development | Developer training, secure code review |
62443‑4‑2 Component Testing | Penetration testing and fuzzing of industrial hardware and software components |
We help you identify weaknesses, close security gaps, and meet your IEC 62443 requirements with confidence.
Our Work in Action
We don’t just talk about security, we demonstrate it. Our research, tools, and real-world testing show how industrial systems can be attacked and defended. These examples give you a glimpse into how we think and work:
- Now I See You: Pwning the Synology BC500 Camera, Embedded Firmware Exploitation
- Switching 400'000 Volts with a TCP Paket, IEC 61850, IEC 60870-5-104
- Luring the Threat: Lessons from ICS Honeypots in Ukraine and Germany
- MQTT Security and Memory Leak Analysis, Eclipse Mosquitto
- Bluetooth Low Energy - Protocol, Security & Attacks
Let’s Talk. No Buzzwords, Just Real Impact
Our team is ready to help you:
- Evaluate your ICS security posture
- Conduct realistic attacks on protocols and systems
- Support your IEC 62443 compliance roadmap
Meet with our experts in Bern to discuss your systems, your goals, and how to secure what drives your business.
Book your free ICS consultation at SINDEX:
Get tailored advice. Book your meeting.