Overview
Cyber Strategy for ICS Environments is an intensive cybersecurity training session tailored for executives and senior managers in OT/ICS-based industries. It equips participants with the knowledge and skills needed to effectively manage cyber incidents specific to operational technology environments.
Objectives
By the end of this course, leaner will be able to:
- Understand roles and responsibilities during a cyber incident in OT/ICS environments
- Learn key elements of decision-making in cybersecurity specific to OT/ICS industries
- Acquire knowledge of threat detection and mitigation relevant to OT/ICS systems
- Review common cyber-response strategies applicable to OT/ICS environments
- Gain first-hand experience in managing cybersecurity incidents in OT/ICS-based organizations
Prerequisites
- Basic background knowledge of information security concepts and solutions
- Familiarity with operational technology (OT) and industrial control systems (ICS) environments
- Understanding of cybersecurity challenges unique to OT/ICS industries
- Willingness to engage in intensive cybersecurity training specific to OT/ICS environments
- Participation from executive leadership, senior management, and the CISO recommended