Method Functional Safety
support@methodcysec.com

Introduction to Cyber Security for Industrial Automation and Control Systems Training Course

A 1-day Introduction to Security Program requirements for Industrial Automation and Control Systems (IACS) asset owners, COMAH duty holders and those responsible for the security of industrial automation, control and safety systems – collectively known as “operational technology” (OT) to differentiate it from “information technology” (IT).

The course recognises that the optimum approach to security in IACS / OT may be quite different to what might be considered best practice in an IT environment and would encourage both OT professionals and IT professionals looking to gain knowledge of OT cyber security to attend.

Course Content

Part 1.

The presentation material will compare and contrast OT and IT functions, technologies, and security approaches, identify relevant regulatory frameworks, international standards, and guidance, outline key security concepts, describe the constituent parts of an organisational Security Program, how they are assembled and maintained, and finish with important external interfaces:

Part 2.

There will also be an opportunity for discussion with participants about the key evidence an HSE specialist inspector or cyber security auditor will want to see for OT cyber security, including exploring the following using a simplified case study:

Who should attend

Although primarily intended for engineers and professionals who are responsible for managing or supporting the OT cyber security of COMAH sites, the course will benefit managers and engineers from other manufacturing and utilities organisations where security plays a key role in business continuity and those who are in a supporting role, including system integrators, maintenance providers, consultants, and contractors.
We would also encourage company OT, IT, maintenance and procurement delegates to attend this course together.

Prereading

Although not essential we would recommend that prospective attendees are familiar with the following open-source resources:

After this training course you will be able to

To describe in practical terms the activities, artefacts and relationships that make a Security Program, as expected by the UK HSE for COMAH sites and as described in IEC 62443.

What you will get

All delegates receive:

Course Options

Classroom

Classroom Training

The Course is delivered over 1 day

In-House

Live Online Training

The course can be delivered at a client's premises in a closed session in which part 2 can explore specific circumstances of that client.

Course Enquiries

If you have any further questions, please contact us and if you wish to proceed, check your diary and reserve a place.



See other OT Cyber Security training courses

Cyber Security IT OT Offer
Understanding and managing OT Cyber Security is a “team” effort and to maximise the potential learning from this course we would actively encourage joint attendance from both your OT and IT departments.


Check your diary and reserve a place

Live Online Learning
Classroom Learning
On Demand Learning
On Demand Learning
TUV 61511 course rating Course rating 87.4%

Recent delegate comments:

"If this area is new to you, this will be a good intro."

"Definitely worth of attending because you gain useful insight. Since I'm from IT background, it was useful to see the OT side. "

"I have an awareness of standards, the HSE approach and my role"

"I have learned about Cyber Security countermeasures"

"I have learned the importance of cyber security management"

Read more comments.

E: support@methodcysec.com. T: 44 (0)1462 713313. W: www.methodcysec.com

Address: Method Cyber Security Ltd. Method House, Davis Crescent, Hitchin, SG5 3RB
Phone: +44 (0)1462 713313 Email: support@methodcysec.com Website:

Terms and Conditions | Privacy Policy. Registered In England 11335896. VAT No. GB 96 3453 69. Site © Copyright Method Cyber SecurityLtd 2026