Cybersecurity Training
|
|
|
- Raymond Fox
- 10 years ago
- Views:
Transcription
1 Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems
2 Expert-led training with real-world application from a global leader in industrial cybersecurity Given the increasing reliance on open standards and interconnectivity in industrial networks and control systems, the risks of cyberattack are growing and present serious threats to economic and national security. Large-scale cyberwarfare through acts of espionage, sabotage, and terrorism could dismantle a nations power grids, transportation and telecommunications systems, financial networks, manufacturing, and government functions. As a widely recognized, world leader in cybersecurity standards development and training, the International Society of Automation (ISA) provides the proven expertise and know-how to help safeguard industrial automation and control systems. As an example, the US government is looking to integrate ISA s industrial automation and control systems standards (ANSI/ISA-62443) as part of its national cybersecurity initiative. ISA s world-renowned cybersecurity experts provide the comprehensive, practical instruction needed to immediately apply your knowledge in the workplace, and through a wide variety of learning formats: One-day classroom courses Multi-day classroom courses Multi-week, online, instructor-assisted courses Live webinars Pre-recorded webinars In addition, to ensure flexibility and to meet varying customer needs, ISA offers cybersecurity training at a variety of locations: at ISA headquarters in North Carolina, at ISA s many regional training centers, and onsite directly at customer facilities. Who is ISA? Founded in 1945, ISA is a global organization that serves automation and control professionals through standards development, certification, education, training, publishing, and technical conferences and events. To learn more about ISA, visit ISA Training: World-class subject-matter expertise ISA s courses are known and respected worldwide for their unbiased, practical approach to technology application. For more than 65 years, ISA has built on its proven track record of identifying the real-world training needs of organizations and automation and control professionals, and working with leading content experts to deliver rapid, customized solutions. Taking an ISA training course will: Enhance on-the-job training Fill in missing knowledge gaps Teach you the Hows and Whys Provide continuing education credits Expand your professional network
3 Table of Contents Introduction to Industrial Automation Security and the ANSI/ISA Standards (IC32C) 4 Introducing the NEW ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program! See page 5 Using the ANSI/ISA Standards to Secure Your Control System (IC32) 6 Cybersecurity for Automation, Control, and SCADA Systems (IC32E) 7 Industrial Networking and Security (TS12) 8 Industrial Automation Cybersecurity: Principles and Application (TS13) 9 Control Systems Security and ANSI/ISA Webinar Series 10 ISA Cybersecurity Tech Pack 11 Save with ISA s Multi-Registration Rate! When you register for more than one course offering in a single registration whether you are registering yourself for two or more different courses, or registering you and at least one colleague for either the same or a different course the ISA Multi-Registration rate can be applied to the additional registrations. Learn more at Who is ISA? Founded in 1945, ISA is a global organization that serves automation and control professionals through standards development, certification, education and training, technical publications, and technical conferences and events. To learn more about ISA, visit
4 Introduction to Industrial Automation Security and the ANSI/ISA Standards Understanding how to secure factory automation, process control, and supervisory control and data acquisition (SCADA) networks is critical if you want to protect them from viruses, hackers, spies, and saboteurs. This one-day course teaches you the basics of the ANSI/ISA ( )-2009, Security for Industrial Automation and Control Systems standard and how it can be applied in the typical factory or plant. YOU WILL BE ABLE TO: Discuss why improving industrial security is necessary to protect people, property, and profits Define the terminology, concepts, and models for electronic security in the IACS environment Define elements of the ANSI/ISA standard for establishing an IACS security program Define the core concepts of risk and vulnerability analysis methodologies Define the concepts of defense in depth and the zone/conduit models of security Explain the basic principles behind policy development and key risk mitigation techniques And more YOU WILL COVER: Understanding the Current Industrial Security Environment How IT and the Plant Floor are Different and How They are the Same Current Security Standards and Practices Creating a Security Program And more COURSE DETAILS: Course No.: IC32C Length: 1 day CEUs: 0.7 Price: $535 ISA Member $565 Affiliate Member $595 Community Member/List $535 Multi-Registration Rate Save on training when you join ISA! ISA members save 20% and ISA Automation Affiliate members save 10% on the Community Member/List price for all ISA training courses and products. Includes ISA Standards: ANSI/ISA ( )-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA ( )-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA ( )-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) 2014 SCHEDULE Research Triangle Park, NC...4 March Part of the ISA FPID Symposium Orlando, FL... 5 August Part of the ISA WWAC Symposium
5 Be one of the first to earn the ISA99/IEC Cybersecurity Fundamentals Specialist designation! Announcing the NEW ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program ISA has developed a knowledge-based certificate recognition program designed for professionals involved in IT and control system security roles that need to develop a command of industrial cybersecurity terminology and an understanding of the material embedded in the ISA99/IEC standards: ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program. PROGRAM REQUIREMENTS ISA99/IEC Cybersecurity Fundamentals Specialist designations and certificates will be awarded to individuals who meet the following program requirements: Successfully complete an intensive two-day, classroom training course from ISA: Using the ANSI/ISA Standards to Secure Your Industrial Control System (IC32) course information listed on the next page. Earn a passing score on the 75-question multiple-choice exam. PROGRAM PRE-REQUISITES There are no required prerequisites for this program; however, it is highly recommended that applicants have: Three to five years of experience in the IT cybersecurity field with some experience in an industrial setting with at least two years specifically in a process control engineering setting Some level of knowledge or exposure to the ANSI/ISA standards PROGRAM PRE-REQUISITES Understanding the Current Industrial Security Environment How Cyber Attacks Happen Creating a Security Program Risk Analysis Addressing Risk with Security Policy, Organization, and Awareness Addressing Risk with Selected Security Counter Measures Addressing Risk with Implementation Measures Monitoring and Improving the CSMS Designing/Validating Secure Systems RENEWAL Because these are certificates and not certifications, they do not have to be renewed ; however, a certificate will only be considered current for three years. In order to extend the current status of a certificate, you will be required to score 70% or above on a 20-question ISA999/IEC Certificate Knowledge Review Exam. Learn more about this NEW certificate program, eligibility criteria, renewal, and upcoming courses at
6 Using the ANSI/ISA Standards to Secure Your Control System The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. YOU WILL BE ABLE TO: Discuss the principles behind creating an effective long-term security program Interpret the ANSI/ISA industrial security guidelines and apply them to your operation Explain the concepts of defense-in-depth, zone, and conduit models of security Analyze the trends in industrial system security incidents and methods hackers use to attack Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks And more YOU WILL COVER: How Cyberattacks Happen Creating A Security Program Risk Analysis Addressing Risk Monitoring and Improving the CSMS And more CLASSROOM/LABORATORY EXERCISES: Develop a business case for industrial security Conduct security threat analysis Investigate scanning and protocol analysis tools Apply basic security analysis tools software Required for ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program (See page 5.) COURSE DETAILS: Course No.: IC32 Length: 2 Days CEUs: 1.4 Price: $1,205 ISA Member/Group Rate $1,360 Affiliate Member $1,510 Community Member/List $1,205 Multi-Registration Rate Includes ISA Standards and Technical Reports: ANSI/ISA ( )-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA ( )-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA ( )-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) Recommended Resource: ISA Text: Industrial Network Security by David J. Teumin 2014 SCHEDULE Research Triangle Park, NC February; August Burbank, CA April Columbia, IL June Houston, TX December Newark, DE October
7 Cybersecurity for Automation, Control, and SCADA Systems The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) systems and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA standards can be used to protect your critical control systems. You will also explore the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. YOU WILL BE ABLE TO: Identify the principles behind creating an effective long-term security program Interpret the ANSI/ISA industrial security guidelines and apply them to your operation Learn the basics of risk and vulnerability analysis methodologies Explain the principles of security policy development Define the concepts of defense-in-depth, zone, and conduit models of security Analyze the trends in industrial system security incidents and methods hackers use to attack Identify the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks YOU WILL COVER: Week 1/Module 1: Defining Industrial Cybersecurity Week 2/Module 2: Risk Assessment Week 3/Module 3: Threats and Vulnerabilities Week 4/Module 4: Security Policies, Programs, and Procedures Week 5/Module 5: Understanding TCP/IP, Hackers, and Malware Week 6/Module 6: Technical Countermeasures Week 7/Module 7: Architectural and Operational Strategies Week 8: Final Course Examination COURSE MATERIALS: Course Noteset and Syllabus ISA Standards and Technical Reports: ANSI/ISA ( )-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA ( )-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA ( )-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) Recommended Resource: ISA Text: Industrial Network Security by David J. Teumin COURSE DETAILS: Course No.: IC32E Length: 8 Weeks CEUs: 1.4 Price: $1,205 ISA Member/Group Rate $1,360 Affiliate Member $1,510 Community Member/List $1,205 Multi-Registration Rate 2014 SCHEDULE Online...27 January 21 March; 21 July 12 September; 24 March 16 May; 22 September November
8 Industrial Networking and Security You will learn about the latest developments in networking, including practical tips on designing, implementing, and testing TCP/IP-based networks and how to apply them securely and reliably in an industrial environment. You will discuss the functions and purposes of the elements used to create and protect an industrial network, including switches, routers, firewalls, and intrusion detection/prevention systems. This course will expand your practical knowledge of LAN, WAN, and Web technologies. This course illustrates what is safe and practical for today s plant floor, including Internet technologies such as web servers, TCP/IP, and fiber optics. Special focus will be placed on the questions of security in the industrial setting drawing on the work of the ISA99 standards committee and the National Institute of Standards and Technology (NIST). YOU WILL BE ABLE TO: Identify standards for analog dial-up connections and modems Apply TCP/IP protocols, addressing, and troubleshooting Estimate where web technologies can safely be used for process control Identify security technologies such as firewalls, proxy servers, virus scanning, and intrusion protection Perform basic security scanning on your networks and perform hardening of your computers And more... YOU WILL COVER: TCP/IP Networking Secure Architectures Packets and Protocols Building a Plant Floor Web Server Network Security Issues And more... CLASSROOM/LABORATORY EXERCISES: Use TCP/IP diagnostic tools in Windows-2000/XP Use network analyzers to troubleshoot Configure a security firewall for the plant floor Perform a basic security scan on a target system And more... COURSE DETAILS: Course No.: TS12 Length: 5 days CEUs: 3.5 Price: $2,590 ISA Member/Group Rate $2,915 Affiliate Member $3,240 Community Member/List $2,590 Multi-Registration Rate 2014 SCHEDULE Research Triangle Park, NC February; June Burbank, CA August Houston, TX November The class was excellent in examining vulnerabilities Matthew Davidson, Technician
9 Industrial Automation Cybersecurity: Principles and Application NEW! This advanced course will expand your practical knowledge of cybersecurity technologies as applied to an industrial setting. The course will familiarize you with the latest developments in cybersecurity, including practical guides to design, implementation, and testing industrial networks and applications to ensure their security and reliability in an industrial production environment. Course topics include the use of Internet technologies, web servers, TCP/IPV6, fiber optics, intrusion protection systems (IPS), virtual private networks (VPNs), and cryptography. Note: This is an advanced course with a minimum satisfactory completion of ISA courses TS06 and TS12 (or equivalent in experience/training) as a mandatory prerequisite for successful completion of this course. YOU WILL BE ABLE TO: Apply the TCP/IPV6 protocols, addressing, and troubleshooting Locate web technologies where they can be used securely for process control Develop network security architectures and explain how to use layering and segmentation to improve security Use security technologies such as firewalls, VPNs, virtualization, virus scanning, and intrusion protection from a security perspective Industrially harden and secure your networks and perform team red testing of your systems And more... YOU WILL COVER: TCP/IPV6 Networking Making Networks Secure Secure Architectures Building a Secure Plant Floor Web Server Security Management Practical Cybersecurity Applications And more... CLASSROOM/LABORATORY EXERCISES: Configure industrial network security parameters and settings Use network analyzers/sniffers/scanners to troubleshoot Use web technology to securely display plant data Configure a managed switch/router/firewall/vpn for the plant floor And more... COURSE DETAILS: Course No.: TS13 Length: 4.5 days CEUs: 3.2 Price: $2,590 ISA Member/Group Rate $2,915 Affiliate Member $3,240 Community Member/List $2,590 Multi-Registration Rate Includes ISA Standard: ANSI/ISA ( )-2009, Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) 2014 SCHEDULE Research Triangle Park, NC March; 28 July 1 August Houston, TX October King of Prussia, PA May
10 Control Systems Security and ANSI/ISA Webinar Series Improve your ANSI/ISA knowledge with these 90-minute, live webinars! Save up to 25% when you register for all three webinars in this series at one time! To take advantage of the series pricing, you must call ISA Customer Service at to register as this offer is not available online. Cybersecurity Risk Assessment for Automation Systems Course No.: IC32CW1 Dates: 19 March and 18 June Risk analysis is an important step in creating a cybersecurity plan for your automation system. Risk analysis not only identifies security vulnerabilities but also provides the business case for the countermeasures that reduce risk. This webinar introduces control engineers to the concepts of risk analysis and how they are applied to industrial manufacturing and control systems based on the ANSI/ ISA standards. This webinar is also valuable for IT professionals who wish to learn the special considerations for performing risk analysis on automation systems. Using Firewalls and Security Zones on the Plant Floor Course No.: IC32CW2 Dates: 26 March and 25 June The network firewall is one of the most important tools in any cybersecurity designer s toolbox. This webinar introduces the industrial controls engineer to the world of firewall system design, focusing on how these devices can be effectively deployed on the typical plant floor to help meet the ANSI/ISA security standards. A Tour of the ANSI/ISA Security Standards Course No.: IC32CW3 Dates: 2 April and 9 July This webinar introduces you to the ANSI/ISA Security for Industrial Automation and Control Systems standards and how these are organized. You will be given a brief introduction to the terminology, concepts, and models of ANSI/ISA cybersecurity and elements of creating a cybersecurity management system. WEBINAR DETAILS (PER SEMINAR): You can provide these live quality seminars at your location for an unlimited number of participants for one low site fee: Pricing (per site): $235 ISA Member $265 Affiliate Member $295 Community Member/List $235 Multi-Registration Rate Can t attend? Missed the live events? Recorded versions of these sessions are also available, and are free for ISA members. New for 2014! Watch for our Industrial Cybersecurity Boot Camp for Managers Coming Soon!
11 ISA Cybersecurity Tech Pack Improve cybersecurity defenses and better confront the growing dangers of cyberwarfare with the ISA Cybersecurity Tech Pack. As a widely recognized, world leader in cybersecurity standards development, training and educational resources, ISA provides the proven technical expertise and know-how to help safeguard industrial automation and control systems. In fact, ISA and its sister organization, the Automation Federation, are currently assisting the Obama administration and US federal agency officials in developing the initial version of a national cybersecurity framework as called for by President Obama in February of this year. WHAT IS INCLUDED IN THE ISA CYBERSECURITY TECH PACK? The ISA Cybersecurity Tech Pack combines critical industry technical papers and PowerPoint presentations written and presented by world-renowned cybersecurity and automation systems experts. The Tech Pack also contains notable ISA technical publications, including the popular Industrial Network Security book by David Teumim and ISA s new book, Industrial Automation and Control Systems Security Principles by Ronald Krutz. As an added bonus, we have rounded out the Tech Pack with a collection of informative cybersecurity articles from InTech magazine. TECHNICAL PAPERS: Cyber Security Implications of SIS Integration with Control Networks Practical Nuclear Cyber Security Establishing an Effective Plant Cybersecurity Program LOGIIC Benchmarking Process Control Security Standards Stronger than Firewalls: Strong Cyber-Security Protects the Safety of Industrial Sites Integrated Perimeter and Critical Infrastructure Protection with Persistent Awareness Applying ISA/IEC to Control Systems Establishing an Effective Plant Cybersecurity Program Getting Data from a Control System to the Masses While Maintaining Cybersecurity The Case for Data Diodes Reconciling Compliance and Operation with Real Cyber Security in Nuclear Power Plants Wastewater Plant Process Protection Process Hazard Analysis Water/Wastewater Plant Process Protection: A different approach to SCADA cyber security Using Cyber Security Evaluation Tool (CSET) for a Wastewater Treatment Plant Improving Water and Wastewater SCADA Cyber Security An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist TECHNICAL BOOKS: Industrial Automation and Control Systems Security Principles by Ronald L. Krutz Industrial Network Security, Second Edition by David J. Teumim INTECH MAGAZINE ARTICLES: ISA Fully Engaged in Cybersecurity Leveraging DoD wireless security standards for automation and control 13 ways through a firewall: What you don t know can hurt you Defense in Depth Executive Corner: What s on YOUR mind? The Final Say: Securing industrial control systems Uninterruptible power supplies and cybersecurity Physical Security 101: Evolving defense in depth Web Exclusive: Control network secure connectivity simplified The Final Say: Network security in the Automation world Executive Corner: Defense in depth: It s more than just the technology Web Exclusive: Stuxnet: Cybersecurity Trojan horse Capitalize on ISA s leadership in cybersecurity by ordering this compilation of valuable cybersecurity technical papers, publications, and InTech articles containing the practical insights you can immediately apply in the workplace. To learn more about or purchase the Cybersecurity Tech Pack, visit CYBETechPack
12 Bring ISA cybersecurity training right to you! All of ISA s cybersecurity training courses can be taught at your company location through ISA s Onsite Training. Contact ISA at or at [email protected] for more information. Founded in 1945, the International Society of Automation ( is a leading, global, nonprofit organization that is setting the standard for automation by helping over 30,000 worldwide Members and other professionals solve difficult technical problems, while enhancing their leadership and personal career capabilities. Based in Research Triangle Park, North Carolina, ISA develops standards, certifies industry professionals, provides education and training, publishes books and technical articles, and hosts conferences and exhibitions for automation professionals. ISA is the founding sponsor of the Automation Federation ( EP International Society of Automation 67 T.W. Alexander Drive P.O. Box Research Triangle Park, NC Get the security and data communications training you need from the ANSI/ISA experts!
Cybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
Industrial Communications Training
Standards Certification Education & Training Publishing Conferences & Exhibits Industrial Communications Training Optimizing the flow and value of real-time data Expert-led training with real-world application
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Three Simple Steps to SCADA Systems Security
Three Simple Steps to SCADA Systems Security Presented by: Gabe Shones, PE / Gilbert Kwan, PE Insert Photo Here Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Session 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Cybersecurity in a Mobile IP World
Cybersecurity in a Mobile IP World Alexander Benitez, Senior Scientist, ComSource Introduction by Robert Durbin, Cybersecurity Program Manager, ComSource Introduction ComSource s cybersecurity initiative
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Plant Maintenance Training
Standards Certification Education & Training Publishing Conferences & Exhibits Plant Maintenance Training Reducing downtime and improving plant performance Expert-led training with real-world application
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Redesigning automation network security
White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
IACS Network Security and the Demilitarized Zone
CHAPTER 6 IACS Network Security and the Demilitarized Zone Overview This chapter focuses on network security for the IACS network protecting the systems, applications, infrastructure, and end-devices.
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
CCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
The rocky relationship between safety and security
The rocky relationship between safety and security Best practices for avoiding common cause failure and preventing cyber security attacks in Safety Systems Abstract: An industry practice reflected in the
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
Computer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
SCADA Cyber Security
SCADA Cyber Security Information on Securing SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
May/June 2014. Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight. www.isa.
May/June 2014 A PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATION Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight www.isa.org/intech Top ten differences
Industrial Security in the Connected Enterprise
Industrial Security in the Connected Enterprise Presented by Rockwell Automation 2008 Cisco Systems, Inc. and Rockwell Automation, Inc. All rights reserved. THE CONNECTED ENTERPRISE Optimized for Rapid
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
CCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Securing The Connected Enterprise
Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012
Tofino Security exida Consulting LLC White Paper Version 1.0 Published February 16, 2012 Contents Executive Summary... 1 Step 1 Assess Existing Systems... 1 Step 2 Document Policies & Procedures... 3 Step
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.
Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
PLC Security for Water / Wastewater Systems
INDUSTRIAL INTERNET IN ACTION CASE STUDY PLC Security for Water / Wastewater Systems EXECUTIVE SUMMARY You have likely never worried about the possibility of a high school geek doing some programming that
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
Federal Aviation Administration
Federal Aviation Administration Current Contract Security Capabilities Prepared by: FAA Telecommunications Infrastructure (FTI)-2 Program Office, AJM-3170 Date: October 5, 2015 1 Table of Contents 1.0
IT courses For Senior Managers
Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led
How To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Resilient and Secure Solutions for the Water/Wastewater Industry
Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager
How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Roadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
