Headquarters Speyer
An der Hofweide 7
D-67346 Speyer

Phone: +49 6232 91906-0
Fax: +49 6232 91906-100

Industrial IT Security [English]


The Industrial IT Security workshop is designed to develop theoretical knowledge and practical skills in the area of IT security in international production enterprises. Starting with an analysis of the current situation, participants and trainers will jointly identify potential risk factors and their impacts on the customer's business, and define a targeted optimization strategy.

Based on case studies, the practical implementation of the requirements via automation and IT systems will be presented and adapted to the specific needs of the participants' organisation. The focus will be on attack and risk scenarios associated with external access to the system (remote access connections), network configuration and firewalls, business continuity scenarios and internal workflows to increase the security level.

Target group

Plant and production managers, IT managers, employees working in IT-related disciplines, IT infrastructure specialists, production staff with access rights to sensitive data, systems and facility management, staff responsible for energy management


Basic knowledge of IT system components and configuration scenarios as well as basic IT security terminology

Course outline / Topics

Part 1: Introduction into industrial IT security

  • History and evolution
  • Definition of work area: scope and contents
  • Delimitation and comparison with other disciplines in the production enterprise
  • Codes and standards: ISA 599/EC 62443/IEC 62443 Namur NE153

Part 2: Security scenarios and IT infrastructure components

  • Network layout and communication pathways
  • Firewalls, switches and system hardware
  • Reduction of system complexity

Part 3: Case study 1 – IT system maintenance in the process industry

  • System access and traceability of changes
  • Software updates and functional security
  • Island solutions versus networked operation
  • Workflows and operating procedures for system maintenance

Part 4: Case study 2 – Remote access to live automation and historian systems

  • Definition of rules and responsibilities
  • Active directory and domain assignment
  • Attack scenarios and risk optimization

Part 5: As-is analysis of customer's enterprise and action plan

  • Existing system and network components
  • Workflows and operating procedures
  • Business continuity risk assessment
  • Topics for action and further steps to be taken
Industrial IT Security [English]


Industrial IT Security


SpiraTec Inhouse

Type of training





2 days

Course fee

Price on request