SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
ICS Cybersecurity Training
Characteristics and Summary v. 2.07
Revised in 04/22/2019
PAGE INTENTIONALLY LEFT BLANK
Preface
This document aims to present the "ICS Cybersecurity Training".
Intellectual property
All product names mentioned in this document are trademarks of their respective manufacturers.
This document and the information contained here are confidential and proprietary of TI Safe. All property rights
(including, without limitation, trademarks, comercial secrets, etc.) evidenced by or included in attachments or
relative documents are solely for TI Safe. TI Safe provides restricted use of this material to explicitly authorized
employees, customers and business partners through the integrity and confidentiality maintenance agreement.
Unauthorized use, distribution, or reproduction will be considered a violation of property rights and civil or criminal
measures will be applied under applicable law.
Warning
This document is intended to be complete and clear. TI Safe shall not be liable for any damages, financial or
business losses resulting from omissions or imperfections contained herein. This document is subject to change
without advance notice. It is recommended to contact TI Safe for updates and / or additional information.
Contact
TI Safe provides different channels of communication with its customers, suppliers and associates:
Rio de Janeiro, Brazil
Estrada do Pau Ferro 480 , Bloco 1, Loja R, Pechincha
ZIP Code – 22743-051 – Rio de Janeiro, RJ – Brasil
Telefone: +55 (21) 3576-4861
São Paulo, Brazil
Rua Dr. Guilherme Bannitz, nº 126 - 2º andar
Cj 21, CV 9035 - Itaim Bibi – ZIP Code - 04532-060 - São Paulo, SP - Brasil
Telefones: +55 (11) 3040-8656
Salvador, Brazil
Av. Tancredo Neves nº 450 – 16º andar – Edifício Suarez Trade
ZIP Code – 41820-901 – Salvador, BA – Brasil
Telefone: +55 (71) 3340-0633
Lisbon, Portugal
Av. da Liberdade 110, 1269-046 Lisbon, Portugal
Telefone: +351 21 340 4500
e-mail: contato@tisafe.com
website: www.tisafe.com
skype (somente voz): ti-safe
Twitter: @tisafe
Certificate of documentation changes
Version Date Author Description
1.00 03.05.2009 Marcelo Branquinho Generation of the first document
1.01 09.10.2009 Marcelo Branquinho Review and update of inserted topics
1.02 10.13.2009 Marcelo Branquinho Content review for 20 hours
1.03 04.13.2010 Marcelo Branquinho OPC Security Inclusion
1.04 07.19.2011 Marcelo Branquinho Inclusion of new chapters based on information security
and practical demonstrations of attacks on networks and
systems
1.05 07.26.2011 Marcelo Branquinho Conceptual review of the summary
1.06 07.28.2011 Marcelo Branquinho Conceptual review of the summary
1.07 07.30.2011 Marcelo Branquinho Conceptual review of the summary
1.08 08.03.2011 Marcelo Branquinho Conceptual review of the summary
1.09 08.06.2011 Marcelo Branquinho Conceptual review of the summary
1.10 08.10.2011 Marcelo Branquinho Conceptual review of the summary
1.11 08.12.2011 Marcelo Branquinho Conceptual review of the summary
1.12 08.16.2011 Marcelo Branquinho Conceptual review of the summary. Insertion of case
study for CSMS Framework.
1.13 09.06.2011 Marcelo Branquinho Conceptual review of the summary
1.14 04.04.2012 Marcelo Branquinho
e Jan Seidl
Review of several chapters with content addition and
technological update of the training.
1.15 06.027.2012 Marcelo Branquinho Added theoretical reference in the summary.
1.16 10.10.2012 Marcelo Branquinho Added content in the apostille and revised the sequence
of chapters. Chapter 12 created.
1.17 05.09.2013 Marcelo Branquinho Inserted content about one-way security gateways.
1.18 05.21.2013 Marcelo Branquinho Updated content standards with NERC-CIP.
1.19 06.11.2013 Marcelo Branquinho Inserted content about continuous monitoring.
1.20 08.12.2013 Marcelo Branquinho Included ANSI / ISA-100.11a standard and revised
security content in industrial wireless networks.
1.21 09.19.2013 Marcelo Branquinho Change in chapter order and lesson plan.
2.01 11.28.2017 Marcelo Branquinho Conceptual review of the summary according to
ICS.SecurityFramework.
2.02 12.08.2017 Marcelo Branquinho New document layout.
2.03 12.11.2017 Marcelo Pessoa Review of indexing of apostille.
2.04 08.02.2018 Marcelo Branquinho English version revision
2.05 08.13.2018 Marcelo Branquinho Update with new contents.
2.06 02.09.2019 Marcelo Branquinho Update with new contents.
2.07 04.22.2019 Marcelo Branquinho Update with new Cyber Security for Industry 4.0 (IIoT)
chapter.
Summary Data
Training name
ICS Cybersecurity Training
Reasons for the creation of "ICS Cybersecurity Training".
• There was no other similar training in Latin America
• Professional experiences in developing and deploying solutions for ICS Cybersecurity already waved
vulnerabilities in critical infrastructures, and training would disseminate this culture.
Offer justification
The course fills a market segment that has great demand from industries whose infrastructures are critical to the
nations.
This is the first Latin American Traning, with Portuguese and English versions, to teach the application of the
good practices of ANSI/ISA 99 and ISA-IEC 62443 standards for the cyber security of industrial systems and
networks. Fulfills all ISA requirements (details at http://www.isa.org/) for ICS cybersecurity.
Goals
Educate professionals to be capable of identifying risks in industrial networks, as well as recommend the main
countermeasures for them, according to the main international security standards and the ICS.SecurityFramework
methodology developed by TI Safe.
To capacitate professionals to design and deploy the CSMS (Cyber Security Management System) in critical
infrastructure automation networks.
Student Profile
IT or OT professionals with knowledge of operating systems, network protocols, programming languages,
hardware and software. Desirable knowledge in information security and Industrial Control Systems (ICS). English
language proficiency is recommended for watching videos and reading training support material.
Field of activity
ICS Cybersecurity.
Workload and course duration
The course is available in a 20 hours format, divided into 5 periods of 4 classroom hours each.
Theoretical reference
In the preparation of the apostille and materials presented in the training were used technical contents from
several sources of research that are part of the recommended bibliography:
• “Segurança de Automação Industrial e SCADA”, written by TI Safe Team – Elsevier publisher
• “Securing SCADA Systems”, written by Ronald L. Krutz – Wiley publisher.
• “Techno Security's Guide to Securing SCADA” written by Jack Wiles, Ted Claypoole, Phil Drake, Paul
A. Henry, Lester J. Johnson Jr, Sean Lowther, Greg Miles e James H. Windle – Syngress publisher.
• “Protecting Industrial Control Systems from Electronic Threats”, written by Joseph Weiss. Momentum
Press publisher.
• “The Stuxnet Computer Worm and ICS Security”, written by Jackson C. Rebane. Nova Publisher.
• “Inside Cyber Warfare”, written by Jeffrey Carr. O´Reilly publisher.
• “Cyber War: The Next Threat to National Security and What to Do About It”, written by Richard A.
Clarke e Robert Knake. Ecco publisher.
• “Cyberpower and National Security (National Defense University)”, written by Franklin D. Kramer, Stuart
H. Starr e Larry Wentz. NDU Press publisher.
• “A Arte de Enganar”, written by William L. Simon, Kevin Mitnick, Makron Books publisher.
This comprehensive bibliography includes the same technical benchmarks used in the official ICS cybersecurity
training programs of the major North American cyber defense institutes and is based on the recommended content
for training and awareness plans of the ISA/IEC 62443 standard.
Text Books
The training apostilles were prepared in Portuguese and English and distributed in digital format (PDF file). They
are constantly updated and improved. In addition to the mentioned bibliographical references, we have the
important support of the leading companies in the ICS Cybersecurity arena to ensure that we have the insights
on the latest industrial systems defense technologies used today.
Picture: Module 1 cover sheet
One week before the start date of each training, TI Safe will send the data so that enrolled students can download
the apostille and supporting material from the Internet. It is up to each student to print the apostille or take their
laptop or tablet to classes with the apostille in digital format. TI Safe respects the environment and natural
resources and follows strictly the principles of its environmental policy, so it does not print or recommend the
printing of digital files.
Practical Classes and Technical Demonstrations
During the training will be held practical classes and technical demonstrations of attacks and defenses against
simulated automation networks.
For the demonstration of attacks against industrial networks we counted on simulators of automation networks
industrial plants shown in the figure below:
Figure: Industrial Network Simulators used in the ICS Cybersecurity Training
Trainning Agenda
Goals and Contents
Module Goals Contents
Module 1 - Introduction
Presentation of training objectives rules,
instructors and students.
• Brief presentation of
instructors and students.
• Presentation of the training
agenda and objectives,
bibliography and supporting
material.
• About TI Safe.
Module 2 - Risks
Overview of a SCADA system, its
elements, protocols and typical
architecture.
Definition of critical infrastructures, their
importance and presentation of recent
cyberterrorism cases.
Presentation of the types of attackers, the
market that feeds the cyber attacks and
the main challenges for implementation
of cyber security in critical infrastructures
Presentation of techniques for the
elaboration of risk analysis in industrial
networks according to ISA/IEC-62443
standard and the TI Safe´s
ICS.SecurityFramework methodology.
• Overview of an ICS
• Industrial control systems
architecture. The Purdue
model (ISA-95)
• Industrial networks
• SCADA systems
• Industry 4.0
• What are Critical
Infrastructures?
• Cyber warfare – the 5th
dimension of war
• Characteristics of the new
attackers
• The cybercrime Market
• The Dark Web
• Vulnerabilities in industrial
control systems
• History of cyber attacks to
industrial networks
• Malware, the main hacker´s
weapon
• Cyber security challenges for
industrial control systems
• Basic concepts
• Risk Scenarios
• Classification of critical
infrastructure networks
• Classification method
• Risk analysis
• Controls evaluated in static
analysis
• Physical security analysis
• Dynamic analysis
• Example of Risk Analysis
Report (ACME company)
Module 3 - Planning
Presentation of methods for the
development of an Industrial Cyber
Security Plan.
• Considerations for a
cybersecurity strategy
• Planning for deployment of
cybersecurity
countermeasures in an
industrial network
• ICS Cybersecurity Plan
example (ACME Company)
Module 4 - Controls
Governance and Monitoring:
Presentation of the main international
standards that guide the implementation
of cybersecurity policies in industrial
networks. Basic concepts for the
development of a business continuity
plan (BCP).
Edge Security:
Presentation of Firewalls, VPNs,
unidirectional security gateways and
strategies for security in industrial WiFi
networks.
Industrial Network Protection:
Details of the defense in depth strategy
recommended by ANSI/ISA-99 / ISA
62443 and presentation of the zones and
conduits model
Presentation of cyber security solutions
used for industrial network protection.
Malware Control:
Presentation of the weaknesses of
solutions traditionally used for malware
protection in automation networks.
Malware control in OT networks and
presentation of modern solutions to
prevent malware attacks.
Data Security:
Presentation of threats to access to
computer networks and the weaknesses
of remote access to industrial networks.
Presentation of solution for second factor
of authentication in systems and
industrial applications.
Cybersecurity for Industry 4.0 (IIoT):
Presentation of the challenges of
implementing cyber security for industry
4.0, based on IIoT (Industrial Internet of
Things).
Education and Awareness:
Presentation of concepts to build an
education and awareness plan aiming at
establishing the culture of cyber security
for automation networks.
• Reference standards
• The ANSI/ISA 99 | ISA/IEC
62443 standard
• The NIST 800-82 Guide
• The NERC-CIP standard
• Industrial Internet Consortium
• Automation security policies
• Business Continuity Plan
(BCP)
• Firewall architectures and
DMZ deployment
• Next generation firewalls
• VPNs and Unidirectional
security gateways
• Industrial WiFi security
• Why do security solutions fail?
• Direct attacks on the control
network
• Zones and Conduits Model
• Network segmentation with
NGFW and services
• VLANs
• Industrial firewalls.
• Zero Trust Architecture
• Inventory and asset visibility
with Machine Learning
• The use of antivirus and
patches in OT networks
• Blacklisting x Whitelisting
• Example of solution for
protection against malware
infections in automation
networks
• Threats to access control
• Access Control: Concepts and
Methodologies
• Main authentication
mechanisms.
• Remote access to industrial
networks and SCADA
• Example of solution for second
authentication factor in remote
access to industrial networks.
• What are IoT and IIoT?
• IIoT in Manufacturing.
• IoE - IIoT in energy networks.
• Cloud security.
• Security framework for IIoT.
• Education and awareness plan
• Training and certifications
available on the market
• Awareness-raising methods
• Main international events
Module 5 - Monitoring
Presentation of methods for the
implementation of continuous monitoring
in automation plants, including SIEM
technologies and managed security
services (ICS-SOC).
Presentation of new technologies for ICS
Cybersecurity.
• Continuous monitoring and
trends
• What to monitor in an
automation network?
• Basics and benefits of using
an SIEM tool
• Internal Monitoring Center
• Challenges for implementing a
SOC
• TI Safe ICS-SOC
• Trends in industrial cyber
Security
Module 6 - Pratices
Ensure that the student has contact with
the main hacking techniques and also the
ICS Cybersecurity countermeasures
presented during the training.
• Initial setup of simulators and
attacker machine on Kali Linux
• Web Target Scanning with
Shodan
• Port scanning and services
(Port Scan)
• Scan PLC variables using
Wireshark
• Internal DoS Attack against
PLC
• DoS Attack against IIoT
• Attack throught the values
manipulation of PLC control
variables
• Development of Ciberweapon
for remote control
• Attack on the PLC via
cyberweapon in PDF
• Demonstrations and practices
of cyber security
countermeasures.
• Demonstration of malware
control solution for USB
scanning
• Demonstration of Malware
industrial endpoint protection
• NGFW Log Inspection Demo
• Demonstration of Industrial
Network Protection solution
with Machine Learning
• Demonstration of Industrial
Intelligence using SIEM Tool
PAGE INTENTIONALLY LEFT BLANK

Más contenido relacionado

La actualidad más candente

Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterKomand
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementPriyanka Aash
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityPanda Security
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 

La actualidad más candente (20)

Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 

Similar a TI Safe ICS Cybersecurity Training

Final Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docxFinal Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docxwrite22
 
Cisco - The Security Scoop
Cisco - The Security ScoopCisco - The Security Scoop
Cisco - The Security ScoopDerek Lewis
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxDIPESH30
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
1 fruct genesis_livshitz_v6_17-03-2018
1 fruct genesis_livshitz_v6_17-03-20181 fruct genesis_livshitz_v6_17-03-2018
1 fruct genesis_livshitz_v6_17-03-2018Илья Лившиц
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docxkarisariddell
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design VisionKTN
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Luca Moroni ✔✔
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfInfosec Train
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015AVEVA
 

Similar a TI Safe ICS Cybersecurity Training (20)

Final Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docxFinal Project IoT Security Research Attached Personal data.docx
Final Project IoT Security Research Attached Personal data.docx
 
Cisco - The Security Scoop
Cisco - The Security ScoopCisco - The Security Scoop
Cisco - The Security Scoop
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
1 fruct genesis_livshitz_v6_17-03-2018
1 fruct genesis_livshitz_v6_17-03-20181 fruct genesis_livshitz_v6_17-03-2018
1 fruct genesis_livshitz_v6_17-03-2018
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx1) Explain your thoughts on the future of IoT and the security impli.docx
1) Explain your thoughts on the future of IoT and the security impli.docx
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdf
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 

Más de TI Safe

CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...
CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...
CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...TI Safe
 
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...TI Safe
 
CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...
 CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor... CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...
CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...TI Safe
 
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...TI Safe
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...TI Safe
 
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...TI Safe
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...TI Safe
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...TI Safe
 
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...TI Safe
 
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...TI Safe
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...TI Safe
 
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...TI Safe
 
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...TI Safe
 
CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...
CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...
CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...TI Safe
 
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...TI Safe
 
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...TI Safe
 
Webinar cci por que nao se deve contratar so cs de ti hibridos para proteg...
Webinar cci    por que nao se deve contratar so cs de ti hibridos para proteg...Webinar cci    por que nao se deve contratar so cs de ti hibridos para proteg...
Webinar cci por que nao se deve contratar so cs de ti hibridos para proteg...TI Safe
 
Retrospectiva
RetrospectivaRetrospectiva
RetrospectivaTI Safe
 
Pacote TI Safe ONS Ready v1
Pacote TI Safe ONS Ready v1Pacote TI Safe ONS Ready v1
Pacote TI Safe ONS Ready v1TI Safe
 

Más de TI Safe (20)

CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...
CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...
CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...
 
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...
 
CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...
 CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor... CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...
CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...
 
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
 
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...
 
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...
 
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
 
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...
 
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...
 
CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...
CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...
CLASS 2022 - Nycholas Szucko (Nozomi Networks) - Antifragilidade Cibernética ...
 
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...
 
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...
 
Webinar cci por que nao se deve contratar so cs de ti hibridos para proteg...
Webinar cci    por que nao se deve contratar so cs de ti hibridos para proteg...Webinar cci    por que nao se deve contratar so cs de ti hibridos para proteg...
Webinar cci por que nao se deve contratar so cs de ti hibridos para proteg...
 
Retrospectiva
RetrospectivaRetrospectiva
Retrospectiva
 
Pacote TI Safe ONS Ready v1
Pacote TI Safe ONS Ready v1Pacote TI Safe ONS Ready v1
Pacote TI Safe ONS Ready v1
 

Último

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

TI Safe ICS Cybersecurity Training

  • 1. ICS Cybersecurity Training Characteristics and Summary v. 2.07 Revised in 04/22/2019
  • 3. Preface This document aims to present the "ICS Cybersecurity Training". Intellectual property All product names mentioned in this document are trademarks of their respective manufacturers. This document and the information contained here are confidential and proprietary of TI Safe. All property rights (including, without limitation, trademarks, comercial secrets, etc.) evidenced by or included in attachments or relative documents are solely for TI Safe. TI Safe provides restricted use of this material to explicitly authorized employees, customers and business partners through the integrity and confidentiality maintenance agreement. Unauthorized use, distribution, or reproduction will be considered a violation of property rights and civil or criminal measures will be applied under applicable law. Warning This document is intended to be complete and clear. TI Safe shall not be liable for any damages, financial or business losses resulting from omissions or imperfections contained herein. This document is subject to change without advance notice. It is recommended to contact TI Safe for updates and / or additional information. Contact TI Safe provides different channels of communication with its customers, suppliers and associates: Rio de Janeiro, Brazil Estrada do Pau Ferro 480 , Bloco 1, Loja R, Pechincha ZIP Code – 22743-051 – Rio de Janeiro, RJ – Brasil Telefone: +55 (21) 3576-4861 São Paulo, Brazil Rua Dr. Guilherme Bannitz, nº 126 - 2º andar Cj 21, CV 9035 - Itaim Bibi – ZIP Code - 04532-060 - São Paulo, SP - Brasil Telefones: +55 (11) 3040-8656 Salvador, Brazil Av. Tancredo Neves nº 450 – 16º andar – Edifício Suarez Trade ZIP Code – 41820-901 – Salvador, BA – Brasil Telefone: +55 (71) 3340-0633 Lisbon, Portugal Av. da Liberdade 110, 1269-046 Lisbon, Portugal Telefone: +351 21 340 4500 e-mail: contato@tisafe.com website: www.tisafe.com skype (somente voz): ti-safe Twitter: @tisafe
  • 4. Certificate of documentation changes Version Date Author Description 1.00 03.05.2009 Marcelo Branquinho Generation of the first document 1.01 09.10.2009 Marcelo Branquinho Review and update of inserted topics 1.02 10.13.2009 Marcelo Branquinho Content review for 20 hours 1.03 04.13.2010 Marcelo Branquinho OPC Security Inclusion 1.04 07.19.2011 Marcelo Branquinho Inclusion of new chapters based on information security and practical demonstrations of attacks on networks and systems 1.05 07.26.2011 Marcelo Branquinho Conceptual review of the summary 1.06 07.28.2011 Marcelo Branquinho Conceptual review of the summary 1.07 07.30.2011 Marcelo Branquinho Conceptual review of the summary 1.08 08.03.2011 Marcelo Branquinho Conceptual review of the summary 1.09 08.06.2011 Marcelo Branquinho Conceptual review of the summary 1.10 08.10.2011 Marcelo Branquinho Conceptual review of the summary 1.11 08.12.2011 Marcelo Branquinho Conceptual review of the summary 1.12 08.16.2011 Marcelo Branquinho Conceptual review of the summary. Insertion of case study for CSMS Framework. 1.13 09.06.2011 Marcelo Branquinho Conceptual review of the summary 1.14 04.04.2012 Marcelo Branquinho e Jan Seidl Review of several chapters with content addition and technological update of the training. 1.15 06.027.2012 Marcelo Branquinho Added theoretical reference in the summary. 1.16 10.10.2012 Marcelo Branquinho Added content in the apostille and revised the sequence of chapters. Chapter 12 created. 1.17 05.09.2013 Marcelo Branquinho Inserted content about one-way security gateways. 1.18 05.21.2013 Marcelo Branquinho Updated content standards with NERC-CIP. 1.19 06.11.2013 Marcelo Branquinho Inserted content about continuous monitoring. 1.20 08.12.2013 Marcelo Branquinho Included ANSI / ISA-100.11a standard and revised security content in industrial wireless networks. 1.21 09.19.2013 Marcelo Branquinho Change in chapter order and lesson plan. 2.01 11.28.2017 Marcelo Branquinho Conceptual review of the summary according to ICS.SecurityFramework. 2.02 12.08.2017 Marcelo Branquinho New document layout. 2.03 12.11.2017 Marcelo Pessoa Review of indexing of apostille. 2.04 08.02.2018 Marcelo Branquinho English version revision 2.05 08.13.2018 Marcelo Branquinho Update with new contents. 2.06 02.09.2019 Marcelo Branquinho Update with new contents. 2.07 04.22.2019 Marcelo Branquinho Update with new Cyber Security for Industry 4.0 (IIoT) chapter.
  • 5. Summary Data Training name ICS Cybersecurity Training Reasons for the creation of "ICS Cybersecurity Training". • There was no other similar training in Latin America • Professional experiences in developing and deploying solutions for ICS Cybersecurity already waved vulnerabilities in critical infrastructures, and training would disseminate this culture. Offer justification The course fills a market segment that has great demand from industries whose infrastructures are critical to the nations. This is the first Latin American Traning, with Portuguese and English versions, to teach the application of the good practices of ANSI/ISA 99 and ISA-IEC 62443 standards for the cyber security of industrial systems and networks. Fulfills all ISA requirements (details at http://www.isa.org/) for ICS cybersecurity. Goals Educate professionals to be capable of identifying risks in industrial networks, as well as recommend the main countermeasures for them, according to the main international security standards and the ICS.SecurityFramework methodology developed by TI Safe. To capacitate professionals to design and deploy the CSMS (Cyber Security Management System) in critical infrastructure automation networks. Student Profile IT or OT professionals with knowledge of operating systems, network protocols, programming languages, hardware and software. Desirable knowledge in information security and Industrial Control Systems (ICS). English language proficiency is recommended for watching videos and reading training support material. Field of activity ICS Cybersecurity. Workload and course duration The course is available in a 20 hours format, divided into 5 periods of 4 classroom hours each.
  • 6. Theoretical reference In the preparation of the apostille and materials presented in the training were used technical contents from several sources of research that are part of the recommended bibliography: • “Segurança de Automação Industrial e SCADA”, written by TI Safe Team – Elsevier publisher • “Securing SCADA Systems”, written by Ronald L. Krutz – Wiley publisher. • “Techno Security's Guide to Securing SCADA” written by Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson Jr, Sean Lowther, Greg Miles e James H. Windle – Syngress publisher. • “Protecting Industrial Control Systems from Electronic Threats”, written by Joseph Weiss. Momentum Press publisher. • “The Stuxnet Computer Worm and ICS Security”, written by Jackson C. Rebane. Nova Publisher. • “Inside Cyber Warfare”, written by Jeffrey Carr. O´Reilly publisher. • “Cyber War: The Next Threat to National Security and What to Do About It”, written by Richard A. Clarke e Robert Knake. Ecco publisher. • “Cyberpower and National Security (National Defense University)”, written by Franklin D. Kramer, Stuart H. Starr e Larry Wentz. NDU Press publisher. • “A Arte de Enganar”, written by William L. Simon, Kevin Mitnick, Makron Books publisher. This comprehensive bibliography includes the same technical benchmarks used in the official ICS cybersecurity training programs of the major North American cyber defense institutes and is based on the recommended content for training and awareness plans of the ISA/IEC 62443 standard. Text Books The training apostilles were prepared in Portuguese and English and distributed in digital format (PDF file). They are constantly updated and improved. In addition to the mentioned bibliographical references, we have the important support of the leading companies in the ICS Cybersecurity arena to ensure that we have the insights on the latest industrial systems defense technologies used today. Picture: Module 1 cover sheet One week before the start date of each training, TI Safe will send the data so that enrolled students can download the apostille and supporting material from the Internet. It is up to each student to print the apostille or take their laptop or tablet to classes with the apostille in digital format. TI Safe respects the environment and natural resources and follows strictly the principles of its environmental policy, so it does not print or recommend the printing of digital files.
  • 7. Practical Classes and Technical Demonstrations During the training will be held practical classes and technical demonstrations of attacks and defenses against simulated automation networks. For the demonstration of attacks against industrial networks we counted on simulators of automation networks industrial plants shown in the figure below: Figure: Industrial Network Simulators used in the ICS Cybersecurity Training Trainning Agenda
  • 8. Goals and Contents Module Goals Contents Module 1 - Introduction Presentation of training objectives rules, instructors and students. • Brief presentation of instructors and students. • Presentation of the training agenda and objectives, bibliography and supporting material. • About TI Safe. Module 2 - Risks Overview of a SCADA system, its elements, protocols and typical architecture. Definition of critical infrastructures, their importance and presentation of recent cyberterrorism cases. Presentation of the types of attackers, the market that feeds the cyber attacks and the main challenges for implementation of cyber security in critical infrastructures Presentation of techniques for the elaboration of risk analysis in industrial networks according to ISA/IEC-62443 standard and the TI Safe´s ICS.SecurityFramework methodology. • Overview of an ICS • Industrial control systems architecture. The Purdue model (ISA-95) • Industrial networks • SCADA systems • Industry 4.0 • What are Critical Infrastructures? • Cyber warfare – the 5th dimension of war • Characteristics of the new attackers • The cybercrime Market • The Dark Web • Vulnerabilities in industrial control systems • History of cyber attacks to industrial networks • Malware, the main hacker´s weapon • Cyber security challenges for industrial control systems • Basic concepts • Risk Scenarios • Classification of critical infrastructure networks • Classification method • Risk analysis • Controls evaluated in static analysis • Physical security analysis • Dynamic analysis • Example of Risk Analysis Report (ACME company) Module 3 - Planning Presentation of methods for the development of an Industrial Cyber Security Plan. • Considerations for a cybersecurity strategy • Planning for deployment of cybersecurity countermeasures in an industrial network • ICS Cybersecurity Plan example (ACME Company)
  • 9. Module 4 - Controls Governance and Monitoring: Presentation of the main international standards that guide the implementation of cybersecurity policies in industrial networks. Basic concepts for the development of a business continuity plan (BCP). Edge Security: Presentation of Firewalls, VPNs, unidirectional security gateways and strategies for security in industrial WiFi networks. Industrial Network Protection: Details of the defense in depth strategy recommended by ANSI/ISA-99 / ISA 62443 and presentation of the zones and conduits model Presentation of cyber security solutions used for industrial network protection. Malware Control: Presentation of the weaknesses of solutions traditionally used for malware protection in automation networks. Malware control in OT networks and presentation of modern solutions to prevent malware attacks. Data Security: Presentation of threats to access to computer networks and the weaknesses of remote access to industrial networks. Presentation of solution for second factor of authentication in systems and industrial applications. Cybersecurity for Industry 4.0 (IIoT): Presentation of the challenges of implementing cyber security for industry 4.0, based on IIoT (Industrial Internet of Things). Education and Awareness: Presentation of concepts to build an education and awareness plan aiming at establishing the culture of cyber security for automation networks. • Reference standards • The ANSI/ISA 99 | ISA/IEC 62443 standard • The NIST 800-82 Guide • The NERC-CIP standard • Industrial Internet Consortium • Automation security policies • Business Continuity Plan (BCP) • Firewall architectures and DMZ deployment • Next generation firewalls • VPNs and Unidirectional security gateways • Industrial WiFi security • Why do security solutions fail? • Direct attacks on the control network • Zones and Conduits Model • Network segmentation with NGFW and services • VLANs • Industrial firewalls. • Zero Trust Architecture • Inventory and asset visibility with Machine Learning • The use of antivirus and patches in OT networks • Blacklisting x Whitelisting • Example of solution for protection against malware infections in automation networks • Threats to access control • Access Control: Concepts and Methodologies • Main authentication mechanisms. • Remote access to industrial networks and SCADA • Example of solution for second authentication factor in remote access to industrial networks. • What are IoT and IIoT? • IIoT in Manufacturing. • IoE - IIoT in energy networks. • Cloud security. • Security framework for IIoT. • Education and awareness plan • Training and certifications available on the market • Awareness-raising methods • Main international events
  • 10. Module 5 - Monitoring Presentation of methods for the implementation of continuous monitoring in automation plants, including SIEM technologies and managed security services (ICS-SOC). Presentation of new technologies for ICS Cybersecurity. • Continuous monitoring and trends • What to monitor in an automation network? • Basics and benefits of using an SIEM tool • Internal Monitoring Center • Challenges for implementing a SOC • TI Safe ICS-SOC • Trends in industrial cyber Security Module 6 - Pratices Ensure that the student has contact with the main hacking techniques and also the ICS Cybersecurity countermeasures presented during the training. • Initial setup of simulators and attacker machine on Kali Linux • Web Target Scanning with Shodan • Port scanning and services (Port Scan) • Scan PLC variables using Wireshark • Internal DoS Attack against PLC • DoS Attack against IIoT • Attack throught the values manipulation of PLC control variables • Development of Ciberweapon for remote control • Attack on the PLC via cyberweapon in PDF • Demonstrations and practices of cyber security countermeasures. • Demonstration of malware control solution for USB scanning • Demonstration of Malware industrial endpoint protection • NGFW Log Inspection Demo • Demonstration of Industrial Network Protection solution with Machine Learning • Demonstration of Industrial Intelligence using SIEM Tool