What is Cyber Security?
Cyber Security in the context of Industrial Automation and Control Systems (IACS) is getting more and more importance. In the age of digitalization, there is nothing more important than protecting data – not just typical company business data, but data related to the industrial production processes too. Worldwide, a permanently increasing number of industrial companies of any size and sector have already been the target of cyber attacks. Many companies are aware that cyber crime poses a danger, but underestimate the costly consequences to their machinery, plant equipment and more important to Safety, Health and Environment (SHE). Industrial or IACS Cyber Security helps in preventing failures, sabotage, or data loss, and thus protect production operations against significant financial losses.
Different standards, frameworks and guidelines define requirements related to IACS Cyber Security, where the international series of standards ISA/IEC 62443 is considered one of the most important ones. To understand the details of ISA/IEC 62443 and its requirements a fundamental knowledge of Cyber Security related topics is of key importance.
Content of this training:
The training course contents consist of the following eight topics:
This course is being provided in cooperation with Phoenix Contact Cyber Security GmbH who is an accepted course provider of the TÜV Rheinland Cyber Security Training Program and will be led by a Cyber Security Trainer (TÜV Rheinland).
The written examination will take place in the morning on the fifth (5th) day of the training.
Participants who attend the training course and exam and pass the exam will receive a “letter of confirmation” from TÜV Rheinland indicating that they have passed the exam.
Time schedule:
For whom?
Technicians, engineers, developers, system integrators, consultants and managers involved in the specification, design, development, maintenance, operations and management of any IACS.
In general for interested persons with a need to understand the requirements and objectives of Cyber Security in the context of IACS.
There are no specific requirements for delegates wishing to attend this training course, however a basic knowledge of IACS, industrial communication networks and IT-/OT interface user knowledge would be beneficial.
What is Cyber Security?
Cyber Security in the context of Industrial Automation and Control Systems (IACS) is getting more and more importance. In the age of digitalization, there is nothing more important than protecting data – not just typical company business data, but data related to the industrial production processes too. Worldwide, a permanently increasing number of industrial companies of any size and sector have already been the target of cyber attacks. Many companies are aware that cyber crime poses a danger, but underestimate the costly consequences to their machinery, plant equipment and more important to Safety, Health and Environment (SHE). Industrial or IACS Cyber Security helps in preventing failures, sabotage, or data loss, and thus protect production operations against significant financial losses.
Different standards, frameworks and guidelines define requirements related to IACS Cyber Security, where the international series of standards ISA/IEC 62443 is considered one of the most important ones. To understand the details of ISA/IEC 62443 and its requirements a fundamental knowledge of Cyber Security related topics is of key importance.
Content of this training:
The training course contents consist of the following eight topics:
This course is being provided in cooperation with Phoenix Contact Cyber Security GmbH who is an accepted course provider of the TÜV Rheinland Cyber Security Training Program and will be led by a Cyber Security Trainer (TÜV Rheinland).
The written examination will take place in the morning on the fifth (5th) day of the training.
Participants who attend the training course and exam and pass the exam will receive a “letter of confirmation” from TÜV Rheinland indicating that they have passed the exam.
Time schedule:
For whom?
Technicians, engineers, developers, system integrators, consultants and managers involved in the specification, design, development, maintenance, operations and management of any IACS.
In general for interested persons with a need to understand the requirements and objectives of Cyber Security in the context of IACS.
There are no specific requirements for delegates wishing to attend this training course, however a basic knowledge of IACS, industrial communication networks and IT-/OT interface user knowledge would be beneficial.