Upcoming Sessions

21-25 Jul 2025Dubai - UAE$5,950
15-19 Dec 2025Dubai - UAE$5,950

The training course is also available in Online format. Discover the dates

View Online format

TRAINING COURSE OVERVIEW

The threat posed by cyber attacks is pervasive and global, impacting individuals, commercial organizations, and nation states alike. Safeguarding your organization and technology from such attacks, and understanding how to detect, analyze, respond to, and investigate cyber incidents, is crucial. The repercussions of an information security breach, such as the documented case of the Ukraine Power Station attack, underscore the importance of robust defenses.

Cyber attacks are increasing both in frequency and sophistication. Integrated networked control systems and reliance on strategic partners further underscore organizational risks and competitive vulnerabilities. To effectively combat cyber threats, it is essential to comprehend the motives and methods of cyber threat actors. Implementing best practices, management techniques, and appropriate countermeasures can mitigate these risks and bolster asset protection.

Leaders across organizations—from boards of directors to corporate officers, chief engineers, and frontline employees—are increasingly aware of the implications of cyber breaches. Recognizing the potential personal liability involved, cyber security has become a cornerstone value in today's digital economy environment.

This Anderson training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practices for Cyber Security Response
  • Approaching Cyber Security Response Plans

TRAINING COURSE OBJECTIVES

By the end of this training course, participants will be able to:

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
  • Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches

DESIGNED FOR

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • Legal Professionals
  • System Engineers
  • Security Administration
  • Operational Staff
  • Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment

LEARNING METHODS

This Anderson training course will use a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  The training course is highly interactive and is carefully designed to provide the best mix of experience, theory and practice in a professional learning environment. The emphasis is on real case studies, and practical applications through “hands-on” action learning.

Download Course Brochure in Pdf format
Download Course Brochure

TRAINING COURSE OVERVIEW

The threat posed by cyber attacks is pervasive and global, impacting individuals, commercial organizations, and nation states alike. Safeguarding your organization and technology from such attacks, and understanding how to detect, analyze, respond to, and investigate cyber incidents, is crucial. The repercussions of an information security breach, such as the documented case of the Ukraine Power Station attack, underscore the importance of robust defenses.

Cyber attacks are increasing both in frequency and sophistication. Integrated networked control systems and reliance on strategic partners further underscore organizational risks and competitive vulnerabilities. To effectively combat cyber threats, it is essential to comprehend the motives and methods of cyber threat actors. Implementing best practices, management techniques, and appropriate countermeasures can mitigate these risks and bolster asset protection.

Leaders across organizations—from boards of directors to corporate officers, chief engineers, and frontline employees—are increasingly aware of the implications of cyber breaches. Recognizing the potential personal liability involved, cyber security has become a cornerstone value in today's digital economy environment.

This Anderson training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practices for Cyber Security Response
  • Approaching Cyber Security Response Plans

TRAINING COURSE OBJECTIVES

By the end of this training course, participants will be able to:

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
  • Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches

DESIGNED FOR

This Anderson training course is suitable to a wide range of professionals but will greatly benefit:

  • Legal Professionals
  • System Engineers
  • Security Administration
  • Operational Staff
  • Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment

LEARNING METHODS

This Anderson training course will use a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  The training course is highly interactive and is carefully designed to provide the best mix of experience, theory and practice in a professional learning environment. The emphasis is on real case studies, and practical applications through “hands-on” action learning.

Day One: What is Cyber Security?

  • Overview of Cyber Security for Industries
  • Cyber Crime and Attacks
  • Technology, Policing, and Investigation of Electronic Crime
  • Ethical Hacking and Cyber Crime
  • Civil and Criminal Considerations

Day Two: Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 - Information Security Management - Code of Practice
  • ISA99 - International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities

Day Three: Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Emerging Industrial Technology Trends
  • Metcaf’s Law
  • Moore’s Law
  • Mirrors World

Day Four: Cyber Security Controls

  • Selecting Security Controls and Best Practice
  • Considerations for Enhancing Security
  • Detection, Prevention and Offensive Responses
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow

Day Five: Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance
  • Operational Security Centers

The Certificate

    Anderson Certificate of Completion will be provided to delegates who attend and complete the course

Info & In-house Solution

For more information about this course, call or email us at:

Call us: +971 4 365 8363

Email: info@anderson.ae

Request for a Tailor-made training and educational experience for your organization now:

Request for In-house

Callback Request

    Related Courses

    Callback Request

      Category/venue filter

      Share