Cyber Security Training Series
Cyber Security: Technology Review
A very fast paced look at many types of hardware and software involved in security efforts, including keyboard sniffers, Ethernet routers, smart phones, and all sorts of common network devices. It...
Cyber Security: Common Exposures
What are the ways that cyber criminals get into industrial networks? How can you find the vulnerabilities in your systems? There are all sorts of entrance strategies that hackers use. Once you...
Cyber Security: Understanding OSINT
Open source intelligence (OSINT) and social engineering are techniques that hackers use to get information about your networks with the intent of finding weaknesses. Some are technical, but others...
Cyber Security: Control System Cyber Security
Why is security important, and what is going on in the defensive arms race? What are the effects of intrusions? Many intrusions are relatively minor, but what is the worst case for your facility if a...
Cyber Security: Communications Attack Example
An actual demonstration of how an attacker can get between a controller and HMI and override information moving both directions. It isn’t as difficult as you might think.
Cyber Security: Defense Techniques 1
What types of security controls you should put in place, from an operational, physical, and cyber standpoint, including concepts of defense-in-depth. Your efforts have to include all these for...
Cyber Security: Defense Techniques 2
How do you protect the range of devices that serve as hosts, everything from terminal units to PLCs? This process begins by identifying all those things on your networks that are cyber assets using...
Cyber Security: Defense Techniques 3
Everything that communicates has to have a communication pathway. How do you identify those and protect them? It can be wired or wireless, and each approach has its own challenges.
Cyber Security: Common Cyber Asset Security Controls
What security controls should you install on your cyber assets, both in your plant or enterprise level? Considers patches, applications, account management, threat indicators, physical access, and...
Cyber Security: Specific Control System Cyber Exposures
What are the cyber security vulnerabilities unique to industrial networking environments? Much industrial equipment is not well hardened against intrusion, so with that in mind, what can we do to...
Cyber Security: Validating Vendor Security Awareness
As you work with equipment vendors, how do you analyze those companies and determine their mindset relative to security? Some companies are better than others, so how can you make that determination?...
Cyber Security: Cyber Asset Vulnerability Assessments
How do you determine where you are on the security spectrum? Without an effective plan, such an evaluation can be painfully difficult and leave you no better off. Some simple guidelines can keep you...
Cyber Security: Cyber Security Resources
Once you’ve finished the series, here are some useful resources that can help keep your ongoing efforts focused and effective.