Security Experts:

Connect with us

Hi, what are you looking for?



Dragos Raises $1.2 Million to Counter ICS Cyber Threats

Dragos, a startup focused on protecting industrial control systems (ICS) from cyber threats, has raised $1.2 million from startup studio DataTribe.

Dragos, a startup focused on protecting industrial control systems (ICS) from cyber threats, has raised $1.2 million from startup studio DataTribe.

Founded by a small group of former NSA intelligence officers with experience in ICS security, Dragos offers a network asset discovery and visualization tool called CyberLens. The tool was developed specifically for control systems environments, which often require deep packet inspection through passive network scanning or data collection.

However, CyberLens will not be the primary focus of the company as it moves forward, the company’s chief executive says.

Robert M. Lee, co-founder and CEO of Dragos, said that the company will be putting the capital to use to build a new Threat Operations Center (TOC) and expand into other areas.

Co-founders Jon Lavender and Justin Cavinee first teamed up with Lee while working in the U.S. Intelligence Community where they established a mission focused on identifying nation-states carrying out attacks and cyber espionage against critical infrastructure.

“We built a TOC while in the Intel community to identify nation states targeting critical infrastructure and it was very successful, so we are doing the same thing while developing Intel, analytics and technologies to help automate analyst efforts so that small teams can scale to protect more infrastructure,” Lee told SecurityWeek.

“We will have a threat hunting team that also does incident response, malware analysis, and threat intelligence,” he said.

The company is also developing a data pipeline product that is easily managed and configured that allows customers to collect host, network and relevant ICS data that can be accessed via a single, searchable interface for events and abnormalities. “We’re giving them, in essence, a lightweight industrial SIEM,” Lee said.

“There is a lack of visibility and insight into the cyber threats targeting infrastructure networks,” Lee said in a statement. “We aim to hunt down these threats while developing solutions to return value to infrastructure operators and owners.”

Lee says the company’s first key hires will be announced in the weeks and months ahead.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Serious vulnerabilities found in Econolite EOS traffic controller software can be exploited to control traffic lights, but the flaws remain unpatched.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.


A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.


Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.