Limes Academy / Industrial Security Training

Secure digitalization for technicians and decision makers

In addition to increased security requirements for manufacturers, system integrators and operators of industrial plants, technical changes in the area of industrial security have become a new challenge. The rapid change includes the fact that industrial security today functions completely differently than the familiar world of automation of the past decades. Limes Security provides clarity and generates guidelines for action and competence for the correct handling of security issues in an industrial environment.

Training contents

The training contents have been selected based on the experience gained from many industrial projects and are aimed at the challenges facing the industry in practice. Our training courses impart the security basics (foundation) urgently needed by industrial personnel as well as advanced knowledge for decision-makers and technicians and special topics (additions). Through practical examples and war stories from our trainers, you develop all the skills required for secure digitization in industry.

ICS
212
2 days

OT Security Management

  • Security standards and application areas
    • Procurement: BDEW Whitepaper, INL Procurement Language
    • Cyber Security Frameworks: NIST 800-82, NIST CSF, NERC CIP, IEC 62443
    • ISO 27000 and ISO 27019
    • Comparison of ISO 27001/2 and IEC 62443-2-1
  • Risk analysis methodology and execution according to IEC 62443-3-2
  • Industrial Security Program Development according to IEC 62443-2-4
  • Social Engineering In-Depth

OT Security Management

  • Security standards and application areas
    • Procurement: BDEW Whitepaper, INL Procurement Language
    • Cyber Security Frameworks: NIST 800-82, NIST CSF, NERC CIP, IEC 62443
    • ISO 27000 and ISO 27019
    • Comparison of ISO 27001/2 and IEC 62443-2-1
  • Risk analysis methodology and execution according to IEC 62443-3-2
  • Industrial Security Program Development according to IEC 62443-2-4
  • Social Engineering In-Depth

OT Security Management

  • Security standards and application areas
    • Procurement: BDEW Whitepaper, INL Procurement Language
    • Cyber Security Frameworks: NIST 800-82, NIST CSF, NERC CIP, IEC 62443
    • ISO 27000 and ISO 27019
    • Comparison of ISO 27001/2 and IEC 62443-2-1
  • Risk analysis methodology and execution according to IEC 62443-3-2
  • Industrial Security Program Development according to IEC 62443-2-4
  • Social Engineering In-Depth

OT Security Management

  • Security standards and application areas
    • Procurement: BDEW Whitepaper, INL Procurement Language
    • Cyber Security Frameworks: NIST 800-82, NIST CSF, NERC CIP, IEC 62443
    • ISO 27000 and ISO 27019
    • Comparison of ISO 27001/2 and IEC 62443-2-1
  • Risk analysis methodology and execution according to IEC 62443-3-2
  • Industrial Security Program Development according to IEC 62443-2-4
  • Social Engineering In-Depth
ICS
223
1 day

Incident Handling Essentials

  • Introduction to Security Incident Handling: Basics and terms
  • The lifecycle of an incident in six steps
  • Technical and organizational prerequisites: How do I prepare for incident handling?
  • Asset Identification and Network Security
  • Monitoring: What role do tools play in detection?
  • Rules of conduct in case of an incident “DO’s and DON’Ts”
  • Case Study: CrashOverride and TRISIS
  • CERTs & Co.: Where can I get information about threats and external assistance?

Incident Handling Essentials

  • Introduction to Security Incident Handling: Basics and terms
  • The lifecycle of an incident in six steps
  • Technical and organizational prerequisites: How do I prepare for incident handling?
  • Asset Identification and Network Security
  • Monitoring: What role do tools play in detection?
  • Rules of conduct in case of an incident “DO’s and DON’Ts”
  • Case Study: CrashOverride and TRISIS
  • CERTs & Co.: Where can I get information about threats and external assistance?

Incident Handling Essentials

  • Introduction to Security Incident Handling: Basics and terms
  • The lifecycle of an incident in six steps
  • Technical and organizational prerequisites: How do I prepare for incident handling?
  • Asset Identification and Network Security
  • Monitoring: What role do tools play in detection?
  • Rules of conduct in case of an incident “DO’s and DON’Ts”
  • Case Study: CrashOverride and TRISIS
  • CERTs & Co.: Where can I get information about threats and external assistance?

Incident Handling Essentials

  • Introduction to Security Incident Handling: Basics and terms
  • The lifecycle of an incident in six steps
  • Technical and organizational prerequisites: How do I prepare for incident handling?
  • Asset Identification and Network Security
  • Monitoring: What role do tools play in detection?
  • Rules of conduct in case of an incident “DO’s and DON’Ts”
  • Case Study: CrashOverride and TRISIS
  • CERTs & Co.: Where can I get information about threats and external assistance?

Dates

09.-11.04.2019, Linz

SEC.302 Secure Coding.net

Register

Show other trainings

In-house trainings

Contact us for an in-house training at your preferred date

Contact us