Is it a good time to do Industrial Cyber ​​Security training?

Of course yes! Here are 4 reasons

 

  1. La DIGITAL TRANSFORMATION (added to today's historical events) is exponentially increasing remote connections (both towards the cloud and towards the field and new generation sensors) and therefore the potential vehicles of attack: thetopic is VERY HOT!
  2. Everyone focuses on SECURITY IT but little about that of FACTORY: you want to find out what are the differences and what threats are you (perhaps) ignoring?
  3. La DISTANCE EDUCATION today it is reality: by holding the course remotely we can adapt to your timing, divide the course into several sessions designed ad hoc for your needs.
  4. The program of COURSE we style it according to YOUR REAL NEEDS: we will verify the starting situation, sector of belonging and set objectives in order to create the course PERFECT FOR YOU! (see the list of selectable "blocks" below)
A one-day specific course on Cyber ​​Security in a factory environment: why?

 

Because la digital transformation it's a process started that no one can stop and as much as it may bring revolutionary improvements, Cyber ​​Security issues must be taken into consideration related to the connection between machines, plant, the enterprise network and the CLOUD.

Leveraging the skills and experience of Enzo M. Tieghi, IT Security and Automation expert with thirty years of experience in the sector, Mario Testino and Maurizio Bini, we have created this course for all those who want to set up a plan for the safety of their systems.

 

Do you want more information?

write to info@servitecno.it
DISCOVER THE PROGRAM OF THE COURSE


Usually we are used to hearing about IT, Information Technology. But when it comes to industry, the key word is OT, Operational Technology, which represents the set of all the "intelligent systems" that manage plant information.

It would be a mistake to think of tackling the issue of industrial system security with the same approach used so far in "business" solutions. Self in the IT field the basic principles of Cyber ​​Security define secure data when RID criteria are met (Confidentiality, Integrity, Availability), in the OT environment the order of these three factors should be read in reverse: le essential characteristics are in fact "Availability" and "Integrity", while Confidentiality is almost an accessory parameter.

Plus Industry4.0 and IIoT, mainly thanks to the introduction of wireless sensors focused on the authentication problems of the connected device and therefore of the given product.

Un work in fact it must first of all be “Always On” and therefore, according to the more or less critical use, the availability of the system must also include the Fault Tolerance. This means having hot redundant systems (at least 2 active in parallel) and restart times reduced to a minimum.

Data integrity, on the other hand, can only be achieved by adopting software solutions designed and developed to guarantee reliability in the data management chain (from the sensor to the computer screen), complete traceability of accesses and precise recording (possibly also with systems of double electronic signature or similar) in case of changes or corrections of data or values ​​(even with a log and Audit Trail).

COURSE PROGRAM

For more info write to info@servitecno.it

A logical consequence of these principles is that solutions expressly designed for this purpose must be used in the industrial sector. The market today offers intelligent devices with IPS/IDS, Firewall, Antimalware functions and above all equipped with advanced filtering, application / protocol / datapackage, White-Listing and Anomaly detection functions: the only techniques that have proved to be truly effective in countering security on networks and control and remote control systems in many industrial sectors.

How to behave then?

This course, of the duration of one day, allows you to acquire the knowledge, in the field of regulations and good practices, necessary to set up a concrete strategy to make (and above all keep) your systems safe.


Content proposal for training course on industrial cyber security for control and remote control systems of plants in industrial environments, utilities, Critical Infrastructures

Il percorso it consists of 1 working day of 8h, on a date to be agreed, at our office or another office to be defined, which will be carried out according to the following educational block scheme (each "Block" is approximately 1h):

Requirements

  • Basic knowledge of Microsoft operating systems
  • Basic knowledge of networks, protocols, …
  • Basic knowledge of industrial automation

Program (1 day)

1 block

  • Introduction to industrial cyber security
  • Differences Safety and Security, ICS/SCADA Security
  • Security in ICT environments and industrial/utility environments
  • Terminology, scenarios and technologies, why and how to protect plants

2 block

  • The security aspects
  • Personnel awareness and training Threats and vulnerabilities of control systems Risk analysis and assessment
  • Cost and resource analysis (ROSI and BIA)
  • The protection of systems on Critical Infrastructure installations

3 block

  • International regulations and best practices International industrial, IEC and ISO standards Introduction to the PDCA (Plan-Do-Check-Act) cycle Assessment methodologies

4 block

  • HW/SW protection methodologies: Antimalware, IDS/IPS, Firewall, etc. Unified risk management with dedicated/specialized UTMs
  • Definition of the electronic perimeter
  • Wired Security Network and Wireless security

5 block

  • Introduction to tools for protecting industrial networks and systems
  • Management of integrated protection systems and their interaction in control and remote control networks
  • Patch and Upgrade Management
  • Infrastructure management and monitoring for SCADA, DCS, PLC, etc

6 block

  • Concepts for network segmentation and segregation of control systems
  • Zoning & Conduit, according to ISA99/IEC62443
  • Consolidation, virtualization and Cloud in control and remote control environments
  • Industrial Internet and use of "mobile" systems
  • Hints at IOT, IIOT system protection policies

Do you want to book a course or get more information?
CONTACT US