Why Choose this Training Course?

The threat of Cyber Attacks is widespread and global, which affects individuals, commercial organisations and nation states alike.  The ability to safeguard your organisation and technology from attacks, and more importantly understand how to identify, analyse, respond and investigate cyber-attacks as a security breach is paramount.  The ability for an Information Security Breach resulting in the circumvention of operational technology controls can have disastrous effects, as we have seen with global documented case such as Ukraine Power Station attack in December 2015. 

Attacks are growing in number and sophistication.  The networked control systems are often integrated and reliant with specialist strategic partners underpins your organisational risk and competitive ability.  Furthermore, to effectively detect and deter any cyber attack, you need to understand the nature, motive and ways of perceived cyber threat actors. In doing so and utilising appropriate countermeasures, best practice and management techniques will mitigate the risk of cyber attack and enhance protection to your assets.

Board of directors, corporate officers and chief engineers are starting to understand the implication of Cyber breaches within their commercial organisation and their potential effect to their personal liability.   Therefore, Cyber Security is now promoted and listed as one of the top three Risks an organisation has to manage.

This Anderson training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practice for Cyber Security Response Methods
  • Approaching Cyber Security Response Plans

What are the Goals?

By the end of this Anderson training course, the participants will be able to:

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment.
  • Appreciate the leading International Standards and Governance models for Cyber Security and current best practice.
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches

Who is this Training Course for?

This Anderson training course is suitable to a wide range of professionals but will greatly benefit, those who have involvement and responsibility for security of operational technology, including risk assessors, legal counsel, system engineers, security administration and IT management.

How will this Training Course be Presented?

The Anderson training course will use a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  The course is highly interactive and is carefully designed to provide the best mix of experience, theory and practice in a professional learning environment. The emphasis is on real case studies, and practical applications through “hands-on” action learning.

The Course Content

Day One: What is Cyber Security?

  • Overview of Cyber Security and Organised Crime
  •  Key Elements of Cyber Crime and Terrorist Targeted Attacks
  •  Technology, Policing, and Investigation of Electronic Crime
  •  Ethical Hacking and Cyber Crime
  •  Civil and Criminal Considerations
  •  Case Study

Day Two: Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 -Information Security Management - Code of Practice
  • ISA99 -  International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities

Day Three: Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Quantifying Security Risks in Commercial Context
  • Establishing Cyber Security Remedial Plan
  • Selecting Security Controls and Best Practice
  • Commercial Considerations for Enhancing Security

Day Four: Cyber Security Controls

  • Detection, Prevention and Offensive Responses.
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE ID and Authentication Control &User Management
  • OTE System Integrity&Data Confidentiality
  • OTE Restricted Data Flow
  • Leading Case Study

Day Five: Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • How to Present a Business Case Document for Cyber Resources
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance

The Certificate

  • Anderson Certificate of Completion will be provided to delegates who attend and complete the course

© 2018. Material published by Anderson shown here is copyrighted. All rights reserved. Any unauthorized copying, distribution, use,dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.

Explore our Full Portfolio of Training Courses

Our portfolio of more than 200 training courses are currently designed to address the current training needs of our
clients incorporating latest trends and internationally accepted best practices, in each distinct subject area.

Send to Colleague

© 2018. Material published by ANDERSON shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.





Sending your message. Please wait...

Send Successfully

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

Print Page

© 2018. Material published by ANDERSON shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.





Sending your message. Please wait...

Close

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

Download PDF

© 2018. Material published by ANDERSON shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.

Sending your message. Please wait...

Close

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

We are Social

Join Anderson Training on social platforms

  • P.O Box 74589, Dubai, UAE
    Tax Registration Number:

    100296217100003
  • Tel: +971 4 365 8363
  • Fax: +971 4 360 4759
  • Email: info@anderson.ae

©2018 Anderson Training - All rights reserved