Implementing Industrial Cyber Security

Implementing Industrial Cyber Security

Traditionally, “cyber-attacks” have affected mostly corporate networks or personal devices.

For many years, PLCs were very difficult to access remotely. So, industrial Control and SCADA Systems were usually safe.
However, with the advancement of the internet and the increasing number of systems that require automation, more and more ICS and SCADA systems are being connected to the internet. This creates a new attack surface for threat actors.
In this course,
we are going to talk about Cyber Security. What is Cyber Security, and why is it so important?
we will discuss specific ways to protect your industrial network as well as “ICS-specific malware” and cyber-attacks.

Implementing Industrial Cyber Security
  • 1. Implementing Industrial Cyber Security - Introduction

    Traditionally, “cyber-attacks” have affected mostly corporate networks or personal devices.

    For many years, PLCs were very difficult to access remotely. So, industrial Control and SCADA Systems were usually safe.
    However, with the advancement of the internet and the increasing number of systems ...

  • 2. What is Cyber Security?

    We are going to talk about Cyber Security. What is Cyber Security, and why is it so important?

    In short, Cyber Security involves measures taken to make digital environments secure.

    In this video, you will learn about Cyber Security concerns, such as data theft, data manipulation, or asset dest...

  • 3. Implementing Cyber Security Controls in an ICS Environment – Identify

    The National Institute of Standards and Technology has identified five categories of defensive cyber security activities known as the NIST Cyber Security Framework: Identify, Protect, Detect, Respond, and Recover.
    In this video and the three following videos, we will discuss the aspects of this c...

  • 4. Implementing Cyber Security Controls in an ICS Environment – Protect

    In this video, we will discuss the second step of the NIST framework: Protect.
    The purpose of this step is to take preventative measures in protecting our industrial control systems.

  • 5. Implementing Cyber Security Controls in an ICS Environment - Detect

    In this video, we will discuss the third step of the NIST framework, which is called “Detect”.
    After identifying and protecting your devices, you will want to have systems in place to monitor them in order to ensure that the protections are working properly and to detect any unusual activity.

  • 6.Implementing Cyber Security Controls in an ICS Environment - Respond & Recover

    In this video, we will discuss the two steps of the NIST framework: “Respond” and “Recover”

    Responses to a cyber-attack may include restoring backups, changing firewall rules, blocking IP addresses, modifying permissions, or using automated intrusion prevention systems to block suspicious traffi...