Industrial Cyber Security

Start Date End Date Venue Fees (US $)
24 May 2026 Dubai, UAE $ 3,900 Register
20 Sept 2026 Baku, Azerbaijan $ 4,950 Register
29 Nov 2026 Al-Khobar, KSA $ 4,500 Register

Industrial Cyber Security

Introduction

Cyber attacks pose a global threat impacting individuals, businesses, and nations alike. Safeguarding your organization from these threats requires not only the ability to protect your technology but also to effectively identify, analyze, respond to, and investigate cyber incidents. The consequences of an information security breach, such as the notorious attack on the Ukraine power station, can be catastrophic, undermining operational technology controls and exposing critical vulnerabilities. As cyber attacks increase in frequency and sophistication, understanding the nature, motives, and methods of cyber threat actors becomes crucial. Implementing best practices, utilizing appropriate countermeasures, and applying effective management techniques are essential for mitigating these risks and protecting your assets. With cyber security emerging as a core responsibility, leaders—including boards of directors, corporate officers, chief engineers, and frontline employees—must recognize the personal and organizational implications of cyber breaches and integrate robust security measures into their strategies. This Industrial Cyber Security training course will help you understand Information Security, and how this is deployed in an Operational Technology Environment.

This training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practices for Cyber Security Response
  • Approaching Cyber Security Response Plans

Objectives

    By the end of this training course, the participants will be able to:

    • Understand Information Security, and how this is deployed in an Operational Technology Environment
    • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
    • Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
    • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches

Training Methodology

This training course will utilise a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. This training course is interactive and challenges one to think. The tutor will guide and facilitate learning, using direct input, discussions, case studies, exercises and video presentation. The skill sets developed will add value to employees, managers and leaders alike.

Who Should Attend?

This training course is suitable to a wide range of professionals but will greatly benefit:

  • Legal Professionals
  • System Engineers
  • Security Administration
  • Operational Staff
  • Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment

Course Outline

Day 1: What is Cyber Security?

  • Overview of Cyber Security for Industries
  • Cyber Crime and Attacks
  • Technology, Policing, and Investigation of Electronic Crime
  • Ethical Hacking and Cyber Crime
  • Civil and Criminal Considerations

Day 2: Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 - Information Security Management - Code of Practice
  • ISA99 - International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities

Day 3: Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Emerging Industrial Technology Trends
  • Metcaf’s Law
  • Moore’s Law
  • Mirrors World

Day 4: Cyber Security Controls

  • Selecting Security Controls and Best Practice
  • Considerations for Enhancing Security
  • Detection, Prevention and Offensive Responses
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow

Day 5: Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance
  • Operational Security Centers

Accreditation

Related Courses

2026 Training Calendar
Competency Solutions Brochure
PETC Corporate Profile