Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems
Select Other "city & date"
Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems Course
Introduction:
This training course on Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems (ITS) focuses on essential activities to establish a robust defense system against cyberattacks targeting ITS. The course acknowledges the transformative impact of recent events, particularly the "supply chain attack" on cybersecurity companies like SolarWinds in December 2020. This incident has fundamentally changed the landscape of cyberspace, including the realm of ITS.
Course Objectives:
By the end of this training course, participants will learn to:
- Understand the ITS environment and explain its architecture
- List and explain various ITS Cybersecurity Threats and Vulnerabilities
- Perform an ITS Cybersecurity Risk Assessment and develop mitigation strategies
- Develop an ITS monitoring and incident response plan
- List and analyze the most important current and future practices of strong defenses
- List and understand the most significant ITS and Cybersecurity Standards
Who Should Attend?
This training course is designed for all the people involved in operations, software, services, mobility ITS infrastructure, traffic and transport planning and organization, IT experts, as well as researchers and consultants involved in cybersecurity, management, big data, communications, project management, and intelligent transport mobility.
This training course is suitable for a wide range of professionals but will greatly benefit:
- IT and Cybersecurity Professionals
- Operators and Professionals of Transport Systems
- City governments Involved in Transport Systems
- Enterprises involved in the design of Transport Systems
- Project Managers
- Technology Engineers, Chief Technology Officers (CTOs), and Chief Information Officers (CIOs)
- Strategic Development Personnel
- Transport Operators, Engineers, Managers, and Researchers
- ITS and Cybersecurity Industry Consultants
Course Outlines:
Cybersecurity & the Intelligent Transportation (ITS) System Environment
- How cyber-attacks happen
- Industries affected
- The Intelligent Transportation System (ITS) Environment
- Role of Autonomous vehicles
- ITS Architecture
- New mobility platforms
- A Need to Secure ITS
ITS models, Infrastructure, Cybersecurity Threats & Vulnerabilities
- Overview of Cybersecurity
- ITS Models: Operators
ITS systems and infrastructure - Communication systems, wired, wireless
- Data management, sharing, and governance
- Threats & vulnerabilities in ITS
ITS Cybersecurity Risk Assessment and Mitigation
- Cybersecurity Risk assessment in ITS
- Cybersecurity challenges
- Approaches in ITS cybersecurity
- Cybersecurity protection frameworks: NIST and others
- Cybersecurity Controls
ITS Monitoring and Incident Response
- Penetration Testing for ITS
- Cybersecurity Monitoring
- Event Management
- Incident Response
- Best practices for first responders
ITS & Cybersecurity Standards – Current and Future Practices
- ITS & Cybersecurity Standards
- Good Practices
- Gap Analysis
- Plan of action
- Innovative approaches: AI, blockchain