Security Risk Assessment MSD0054 en
Security Risk Assessment MSD0054 en
Security Risk Assessment MSD0054 en
com
GM International in cooperation with TVC Functional Safety Services are pleased to recommend the TÜV Rheinland Cyber Security Training
Program, a unique opportunity to provide evidence of competency in Cyber Security from an internationally recognized organisation. The CySec
Specialist (TÜV Rheinland) certificate program demonstrates competency with respect to assessing and specifying Industrial Automation Control
and Safety System (IACS) Security and provides a skill set enabling staff to fulfill responsibilities and to perform activities to recognised standards of
competence, in order to:
− reduce the risk of a successful cyber attack
− satisfy legal and regulatory requirements
− meet the organisation’s system security and business objectives
By understanding:
• The principles and concepts in the internationally agreed standard • The concept and principle of reducing risks to As Low As Reasonably
IEC 62443 Practicable (ALARP)
• The concepts and principles behind international standards that cover • Understanding how and when to apply qualitative, semi quantitative and
the area of cyber security and how and when to apply them including: quantitative risk assessment techniques and methods
- Security Risk Assessment (SRA) - IEC 61511-1 2nd Edition • How to calibrate, prepare and apply popular security risk determination
- Cybersecurity Management System (CSMS) and SRA – IEC 62443 methodologies, such as Attack Trees
- Network and Information Systems (NIS) • The Interface between SRA and the Cybersecurity Requirements
• Defining Tolerable risk criteria for Security Specification
COURSE OBJECTIVES
The objective of the course is to provide participants with a fundamental understanding of the principles of IACS Cybersecurity Risk Assessment in
the process industries according to IEC 62443 and to understand:
• The role and the process of Security Risk Assessment (SRA) in gaining an understanding of the security risks on the facility and their potential
consequences.
• The concept of Security Level – Targets (SL-T) and the Cyber Security Requirements Specification (CSRS)
• The relationship between SL-T and CSRS to the design and implementation of security countermeasures that are capable and able to achieve the
security requirements needed of the determined security level.
Successful participants, who have sufficient experience and have passed both the Cybersecurity fundamentals and Security Risk Assessment exams,
will be eligible for the prestigious CySec Specialist (TÜV Rheinland) certificate in Security Risk Assessment.
COURSE PROVIDER
TVC FUNCTIONAL SAFETY SERVICES FZ-LLC (tinovc.com)
Our team of industry-leading experts are providing worldwide Functional Safety and IACS Cybersecurity Training and Consultancy Services for
equipment manufacturers, consultancy organizations, EPC’s, End Users in the Oil & Gas, Chemical, Petrochemical, Pharmaceutical, LNG, Mining, Refining
and Petroleum Industries. We are delivering consultancy support to all activity phases of the safety lifecycle and have translated our over 30 years’
industrial experiences in practical training courses using our hands-on examples of our expertise to bring the theoretical and practical aspects together
in an understandable fashion. TVC is an accepted course provider under the TÜV Rheinland Functional Safety and Cyber Security Training Program.
The brand TVC has gained recognition in the Process Industry as the most practical & simple explained training courses and seminars conducted in a
professional manner.
• Course dates: check here In accordance with the TÜV Rheinland Functional Safety and Cyber
• Course language: English Security Training Program:
• Duration: 3,5 day
• Course exam date: check here • A minimum of 3 to 5 years’ experience in a related field (e.g. Control &
Instrumentation, process engineering, IT/OT, functional safety or cyber
Day 4 consists of a three-hour examination based on a mixture of security).
multiple choice and open SRA questions.
• University degree or equivalent engineering experience and
The course is based around a practical case study that will be responsibilities as certified by employer or engineering institution.
developed across the three days of the course taking the
delegate through the SRA process. The course is a modular
structure of classroom tuition followed by a case study practical,
which will take the participant through the SRA process as
identified in IEC 62443-3-2.
• Course material For more detailed information or any other question please
• Registration fees and certificate of attendance contact: [email protected]
• Upon successful completion of the exam a CySec Specialist
(TÜV Rheinland) - Risk Assessment certificate and a listing on
the TÜV Rheinland website
www.gminternational.com
PRE-READING INFORMATION
At the beginning of the course there will be a brief overview of Cyber Security Fundamentals, with the topics covered being: Network Basics, Network
Security Basics, Industrial Protocols and Creating a CSMS Program, with a focus on IEC 62443-2-1:2009.
1. The first being a multiple-choice exam covering elements both from the course itself and these cyber security
fundamentals. As such, you will receive a slide deck containing information about these fundamentals, 2 weeks before the course
commences and when we have received payment. It is therefore highly recommended that these slides are read before the start of the
course.
2. The second exam will be an open question exam, covering the information taught within the course.
- IEC 62443, specifically the documents IEC 62443-2-1, IEC 62443-3-1 and the draft IEC 62443-3-2.
Beyond this there are no further required or recommended books for the security course. However, there are other sources of information that can
be read to enhance your understanding of the subject area.
The book Security PHA Review: For Consequence-Based Cybersecurity by Ed Marszal and Jim McGlone, describes a similar technique to the
technique taught on the course and therefore, may be useful for gaining a fuller understanding of the material. It is, however, not required for the
course.
Additional Reading
Other material, including white papers and other books, such as Hacking Exposed: Industrial Control Systems by Bodungen, C.E, et. Al and Industrial
Network Security 2nd Edition by Knapp, E.D, et, al, may be mentioned during the course relating to specific areas or questions. Where appropriate,
information will be provided on the source of this information.
www.gminternational.com
TRAINING PROGRAM
Day 2 Agenda
Further develops on the concepts, principles and techniques carried out in
day one and the case study work by taking the output from the High-Level
SRA and evaluates the risks based on their likelihood and consequence
and prioritises them for examination in the Detailed-Level SRA. The second
day also includes an explanation of what outputs would be expected
from the High-Level SRA. The principles and activities of the Zoning and
Conduit sections of the IEC 62443 will also be explained. The topics
covered are:
• The required outputs from the High-Level SRA
• Requirements of IEC 62443 with relation to the Zone and Conduit
exercise.
• Trust Boundaries, Entry Points and further benefits of the Zone and
Conduit exercise
• Allocation of IACS to Zone
- Network Segmentation
- System Architecture
• Allocation of Zones Exercise – Session 3 MSD0054 REV.0 (04/2021)