The threat of Cyber Attacks is widespread and global, and effects individuals, commercial organisations and nation states alike. The ability to safeguard your organisation and technology from attacks, and more importantly understand how to identify, analyse, respond and investigate cyber-attacks as a security breach is paramount. The ability for an Information Security Breach resulting in the circumvention of operational technology controls can have disastrous effects, as we have seen with global documented case such as Ukraine Power Station attack.
Attacks are growing in number and sophistication. The networked control systems are often integrated and reliance with specialist strategic partners underpins your organisational risk and competitive ability. Furthermore, to effectively detect and deter any cyber-attack, you need to understand the nature, motive and ways of perceived cyber threat actors. In doing so and utilising appropriate countermeasures, best practice and management techniques will mitigate the risk of cyber-attack and enhance protection to your assets.
Boards of directors, corporate officers, chief engineers and frontline employees are starting to understand the implication of Cyber breaches within their organisation and their potential effect to their personal liability. Therefore, Cyber Security is a core value for leaders in today’s digital economy environment.
This COPEX training course will feature:
An understanding of Cyber Security issues
Approaches to Cyber Security within an Operational Technology environment.
An introduction to Cyber Security Frameworks
Current Best Practices for Cyber Security Response
Approaching Cyber Security Response Plans
What are the Goals?
By the end of this COPEX training course, the participants will be able to:
Understand Information Security, and how this is deployed in an Operational Technology Environment
Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
Understand the approaches for Crisis and Incident Management for Cyber Security Breaches
Who is this Training Course for?
This COPEX training course is suitable to a wide range of professionals but will greatly benefit:
Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment
Day One: What is Cyber Security?
Overview of Cyber Security for Industries
Cyber Crime and Attacks
Technology, Policing, and Investigation of Electronic Crime
Ethical Hacking and Cyber Crime
Civil and Criminal Considerations
Day Two: Assessing Your Cyber Security Posture
Cyber Security and Risk Assessment
Information Security and Standards
ISO7799 - Information Security Management - Code of Practice
ISA99 - International Standards for Automation Cyber Security Standard
Reducing Your Security Risk and Increasing Your Security Capabilities
Day Three: Cyber Security and Industrial Control Systems Management
Information Security and Operational Technology
Emerging Industrial Technology Trends
Day Four: Cyber Security Controls
Selecting Security Controls and Best Practice
Considerations for Enhancing Security
Detection, Prevention and Offensive Responses
Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow
Day Five: Building a Cyber Response Plan
Defining a Cyber Response Strategy
Composing Cyber Response Plan
Cyber Response Team Compilation and Service Vendor Support
Cyber Preparedness and Corporate Governance
Operational Security Centers
COPEX Certificate of Attendance will be provided to delegates who attend and complete the course
Material published by Copex shown here is copyrighted.
All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.