665a1fd76879577d21e45d83 Training For Identifying Control System Incidents

Training for identifying control system incidents as being cyber-related

May 31, 2024
The peer-reviewed Micro Learning Module “Identifying Control System Cyber Incidents” was written in response to the lack of industry being able to identify control system incidents as being cyber-related

Each time I provide numbers of control system cyber incidents, I get feedback from OT cybersecurity experts and others “demanding” detailed information. The most recent case was my comment that there have been more than 150 control system cyber incidents in water/wastewater. Because of the lack of industry being able to identify control system incidents as being cyber-related, I wrote a peer-reviewed Micro Learning Module, “Identifying Control System Cyber Incidents”, based on my database of control system cyber incidents I started collecting in 2000 to as recently as June 2024. I would be happy to provide training to those interested in how to identify control system incidents as being cyber-related using actual cases histories from the different sectors.

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.