Course Description (1-Day)
The ICS Managers Security Course is designed to equip managerial-level professionals with an understanding of the current cybersecurity challenges in their environments. This knowledge is essential for managing all aspects of security risk in day-to-day operations.
The course provides guidance on identifying and supporting their organizations' cybersecurity and risk mitigation strategies for ICS environments.
The course provides guidance on identifying and supporting their organizations' cybersecurity and risk mitigation strategies for ICS environments.
Course Objectives
By the end of the course, participants will be familiar with:
- Identifying current and emerging threats to ICS environments
- Recognizing vulnerabilities within ICS environments
- Implementing actions to secure these environments and reduce risk
- Preparing for and managing cybersecurity incidents in ICS environments
Course Content
Part 1: Background (Understanding ICS, Threats, and Vulnerabilities)
Part 2: Securing ICS (Strategies for Securing an ICS)
- ICS description and terminology
- ICS vs IT: Differences and similarities
- ICS attack surface
- Introduction to ICS security risks
- Known ICS security incidents
Part 2: Securing ICS (Strategies for Securing an ICS)
- Planning to reduce security risk
- Introduction to cyber incident response
- Operational security
- Vendor management
- Incorporating security into procurement processes
Target Student
If you are a manager responsible for any ICS environment and/or personnel working on securing these systems, including:
It provides a high-level understanding of current cybersecurity risks and threats to ICS environments, as well as strategies for forward planning to mitigate and reduce these risks.
- Business Technical/Engineering/Procurement Lead
- ICS Policy/Decision Maker
- Site/Asset Single Point of Accountability (SPA) for security and/or incident response
- Site/Asset IT Manager
- Site/Asset Physical Security/Facilities Management Professional
It provides a high-level understanding of current cybersecurity risks and threats to ICS environments, as well as strategies for forward planning to mitigate and reduce these risks.
Prerequisites
There are no pre-requisites other than a suitable device to participate in the online course. A handbook of supporting material will be provided.