Eurotech Training Consultancy Recruitment Fadi Jawad

Cyber Security for Industrial Control Systems

Cyber Security for Industrial Control Systems

Cyber Security for Industrial Control Systems

 

OBJECTIVES

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment.
  • Appreciate the leading International Standards and Governance models for Cyber Security and current best practice.
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breached

WHO SHOULD ATTEND?

This course is suitable to a wide range of professionals but will greatly benefit, those who have involvement and responsibility for security of operational technology, including risk assessors, legal counsel, system engineers, security administration and IT management.

COURSE OUTLINE

Day One: What is Cyber Security?

  • Overview of Cyber Security and Organised Crime
  •  Key Elements of Cyber Crime and Terrorist Targeted Attacks
  •  Technology, Policing, and Investigation of Electronic Crime
  •  Ethical Hacking and Cyber Crime
  •  Civil and Criminal Considerations
  •  Case Study

Day Two: Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 -Information Security Management – Code of Practice
  • ISA99 –  International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities

Day Three: Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Quantifying Security Risks in Commercial Context
  • Establishing Cyber Security Remedial Plan
  • Selecting Security Controls and Best Practice
  • Commercial Considerations for Enhancing Security

Day Four: Cyber Security Controls

  • Detection, Prevention and Offensive Responses.
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE ID and Authentication Control &User Management
  • OTE System Integrity&Data Confidentiality
  • OTE Restricted Data Flow
  • Leading Case Study

Day Five: Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • How to Present a Business Case Document for Cyber Resources
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance

Register for the Course

















Need Help? Chat with us