Course Schedules

Classroom 7 Sessions
Online / Live
Live

No dates scheduled

Introduction

The threat posed by cyber attacks is pervasive and global, impacting individuals, commercial organizations, and nation states alike. Safeguarding your organization and technology from such attacks, and understanding how to detect, analyze, respond to, and investigate cyber incidents, is crucial. The repercussions of an information security breach, such as the documented case of the Ukraine Power Station attack, underscore the importance of robust defenses.

Cyber attacks are increasing both in frequency and sophistication. Integrated networked control systems and reliance on strategic partners further underscore organizational risks and competitive vulnerabilities. To effectively combat cyber threats, it is essential to comprehend the motives and methods of cyber threat actors. Implementing best practices, management techniques, and appropriate countermeasures can mitigate these risks and bolster asset protection.

Leaders across organizations—from boards of directors to corporate officers, chief engineers, and frontline employees—are increasingly aware of the implications of cyber breaches. Recognizing the potential personal liability involved, cyber security has become a cornerstone value in today's digital economy environment.

This Anderson training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practices for Cyber Security Response
  • Approaching Cyber Security Response Plans

What are the Goals?

By the end of this training course, participants will be able to:

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
  • Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches

Who is this Training Course for?

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • Legal Professionals
  • System Engineers
  • Security Administration
  • Operational Staff
  • Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment

How will this Training Course be Presented?

This Anderson training course will use a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. The training course is highly interactive and is carefully designed to provide the best mix of experience, theory and practice in a professional learning environment. The emphasis is on real case studies, and practical applications through “hands-on” action learning.

Course Content

Day 1

What is Cyber Security?

  • Overview of Cyber Security for Industries
  • Cyber Crime and Attacks
  • Technology, Policing, and Investigation of Electronic Crime
  • Ethical Hacking and Cyber Crime
  • Civil and Criminal Considerations
Day 2

Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 - Information Security Management - Code of Practice
  • ISA99 - International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities
Day 3

Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Emerging Industrial Technology Trends
  • Metcaf’s Law
  • Moore’s Law
  • Mirrors World
Day 4

Cyber Security Controls

  • Selecting Security Controls and Best Practice
  • Considerations for Enhancing Security
  • Detection, Prevention and Offensive Responses
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow
Day 5

Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance
  • Operational Security Centers

The Certificate

Recognition
  • Anderson Certificate of Completion for delegates who attend and complete the training course
  • Anderson Professional Certification (APC)® Certificate will be provided to delegates who successfully completes and pass the APC assessment

Accreditation

Anderson Professional Certification
Anderson Professional Certification (APC)® are series of courses designed by industry leaders to build and enhance critical professional skills needed to succeed in today’s most in-demand fields and help you develop a mastery of skills in a certain area.
Get In Touch

Still Have Questions?

Can’t find what you are looking for? Contact us and we’ll be happy to assist you with course details, corporate bookings, or technical support.

Expand Your Skills

Related Training Courses