Industrial IT Security [English]
Objective
The Industrial IT Security workshop is designed to develop theoretical knowledge and practical skills in the area of IT security in international production enterprises. Starting with an analysis of the current situation, participants and trainers will jointly identify potential risk factors and their impacts on the customer's business, and define a targeted optimization strategy.
Based on case studies, the practical implementation of the requirements via automation and IT systems will be presented and adapted to the specific needs of the participants' organisation. The focus will be on attack and risk scenarios associated with external access to the system (remote access connections), network configuration and firewalls, business continuity scenarios and internal workflows to increase the security level.
Target group
Plant and production managers, IT managers, employees working in IT-related disciplines, IT infrastructure specialists, production staff with access rights to sensitive data, systems and facility management, staff responsible for energy managementPrerequisite
Basic knowledge of IT system components and configuration scenarios as well as basic IT security terminology
Course outline / Topics
Part 1: Introduction into industrial IT security
- History and evolution
- Definition of work area: scope and contents
- Delimitation and comparison with other disciplines in the production enterprise
- Codes and standards: ISA 599/EC 62443/IEC 62443 Namur NE153
Part 2: Security scenarios and IT infrastructure components
- Network layout and communication pathways
- Firewalls, switches and system hardware
- Reduction of system complexity
Part 3: Case study 1 – IT system maintenance in the process industry
- System access and traceability of changes
- Software updates and functional security
- Island solutions versus networked operation
- Workflows and operating procedures for system maintenance
Part 4: Case study 2 – Remote access to live automation and historian systems
- Definition of rules and responsibilities
- Active directory and domain assignment
- Attack scenarios and risk optimization
Part 5: As-is analysis of customer's enterprise and action plan
- Existing system and network components
- Workflows and operating procedures
- Business continuity risk assessment
- Topics for action and further steps to be taken