A 1-day Introduction to Security Program requirements for Industrial Automation and Control Systems (IACS) asset owners, COMAH duty holders and those responsible for the security of industrial automation, control and safety systems – collectively known as “operational technology” (OT) to differentiate it from “information technology” (IT).
The course recognises that the optimum approach to security in IACS / OT may be quite different to what might be considered best practice in an IT environment and would encourage both OT professionals and IT professionals looking to gain knowledge of OT cyber security to attend.
The presentation material will compare and contrast OT and IT functions, technologies, and security approaches, identify relevant regulatory frameworks, international standards, and guidance, outline key security concepts, describe the constituent parts of an organisational Security Program, how they are assembled and maintained, and finish with important external interfaces:
There will also be an opportunity for discussion with participants about the key evidence an HSE specialist inspector or cyber security auditor will want to see for OT cyber security, including exploring the following using a simplified case study:
Although primarily intended for engineers and professionals who are responsible for managing or supporting the OT cyber security of COMAH sites, the course will benefit managers and engineers from other manufacturing and utilities organisations where security plays a key role in business continuity and those who are in a supporting role, including system integrators, maintenance providers, consultants, and contractors.
We would also encourage company OT, IT, maintenance and procurement delegates to attend this course together.
Prereading
Although not essential we would recommend that prospective attendees are familiar with the following open-source resources:
To describe in practical terms the activities, artefacts and relationships that make a Security Program, as expected by the UK HSE for COMAH sites and as described in IEC 62443.
All delegates receive:
The Course is delivered over 1 day
![]()
The course can be delivered at a client's premises in a closed session in which part 2 can explore specific circumstances of that client.
If you have any further questions, please contact us and if you wish to proceed, check your diary and reserve a place.

"If this area is new to you, this will be a good intro."
"Definitely worth of attending because you gain useful insight. Since I'm from IT background, it was useful to see the OT side. "
"I have an awareness of standards, the HSE approach and my role"
"I have learned about Cyber Security countermeasures"
"I have learned the importance of cyber security management"
E: support@methodcysec.com. T: 44 (0)1462 713313. W: www.methodcysec.com