SlideShare a Scribd company logo
1 of 2
Download to read offline
2
OVERVIEW
Cyber Intrusions and Attacks have increased dramatically over the
last decade, exposing sensitive personal and business information,
disrupting critical operations, and imposing high costs on the
economy. In recent years, attackers have also devised novel ways
in which to attack organisations and access data. In the BYOD era,
companies are now giving mobile staff members the option of
bringing their device with them and then using their personal
device to communicate with customers and other employees. Data
retained on these devices has become highly valuable to attackers
as it often contains the credentials for logging into secure areas of
the company network. Also when a device is lost or stolen, it can
put the company at risk of a significant financial loss. Tata Power-
DDL has since 2005 enjoyed great success using IT-Security services
across all processes to secure the Integrity of the Data and User
Services.
.
SESSION PLAN
OBJECTIVE
This training module has been designed to provide holistic
knowledge of IT system loopholes and fixing their security concerns,
especially from a Power Distribution Utility’s point of view. It will
help power sector professionals wanting to develop knowledge and
understanding of cyber security domain applicable to Critical
Information Infrastructure. It will also enable participants to
develop an overview of entire Cybersecurity ecosystem and best
practices to be adopted in their respective organizations.
Security Risk Assessment Concepts
 Ethical Hacking, Penetration Testing and
Vulnerability Auditing.
 Overview of Cybersecurity Control Room
Operations.
Vulnerability Assessment & Prevention
 Overview of Cyber Security Trends worldwide.
 Introduction to Network Security, Application
Security and Cyber Attack Methodology.
 Demonstration of Network and Application
scanning using tools.
Information Security Management System
 Overview of ISO 27001:2013 Information
Security Management System (ISMS), ISMS
Objectives, Clauses and Controls.
 Overview of Audit Process.
 Implementation of Best Practice for ISMS
within organisation.
OT (Operational Technology) Security
 Overview of Cyber Attacks on Critical
Information Infrastructure.
 Details of Cybersecurity Standards and
frameworks for OT Security.
 Introduction to Tools & Technologies available
for securing OT Network.
Information Security Incident Management
 Introduction to Concept of Information
security incident management system.
 Overview of Incident Management process.
Overview of IT Act 2000
 Aims and Objectives of IT Act 2000
 Cyber Appellate Tribunal
CYBER SECURITY
IN POWER
DISTRIBUTION
SECTOR
ONLINE TRAINING PROGRAM
PROGRAM
FEE
DESCRIPTION OF CHARGES UNIT RATE
Cost of Online Training comprising of 2 sessions for upto 30 participants from one company
 Cost per Session – Rs 12,500
 Cost for 2 different sessions – Rs 12,500 x 2 sessions = Rs. 25,000
 Taxes and Levies extra
Rs. 25,000
Cost of Online Training (comprising of 2 sessions) for every additional participant over and above
30 participants from one company excluding applicable taxes and levies
 Cost per Session – Rs 1000
 Cost for 2 different sessions – Rs 500 x 2 sessions = Rs. 1,000
 Taxes and Levies extra
Rs. 1,000
Remarks: Includes Online Training Cost, Course material and Presentations, Certificate of Participation
TRAINING METHODOLOGY
 The Online Training would be conducted on Tata Power-DDL’s WebEx
Event Platform
 Participants can attend the Training through any device like Desktop /
Laptop / Tablet / Smart Phone
 Each Session would be of 2 hour duration including Q&A session to
take up question and points that need more clarity by the participants.
 The presentation would be shared with all participants after the end of
the Program
PLACE 2 or 3 APPROPRIATE IMAGES FOR THE
TRAINING THEME HERE.
IMAGE SIZE AT LEAST
4.5 CM (H) X 8 CM (W) if inserting 2 images
4.5 CM (H) X 5.5 CM (W) if inserting 3 images

More Related Content

Similar to Protecting Power Distribution with Cyber Security Training

Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...eSAT Publishing House
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
Webhook Support for Alert Policies
Webhook Support for Alert PoliciesWebhook Support for Alert Policies
Webhook Support for Alert PoliciesIRJET Journal
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentIRJET Journal
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsLiving Online
 

Similar to Protecting Power Distribution with Cyber Security Training (20)

Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Home Automation
Home AutomationHome Automation
Home Automation
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Webhook Support for Alert Policies
Webhook Support for Alert PoliciesWebhook Support for Alert Policies
Webhook Support for Alert Policies
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 

More from Tata Power Delhi Distribution Limited

Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...
Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...
Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...Tata Power Delhi Distribution Limited
 

More from Tata Power Delhi Distribution Limited (20)

Protection, Control and Substation Automation
Protection, Control and Substation AutomationProtection, Control and Substation Automation
Protection, Control and Substation Automation
 
Project Management
Project ManagementProject Management
Project Management
 
Energy Auditing
Energy AuditingEnergy Auditing
Energy Auditing
 
Emerging Technologies in Power Distribution
Emerging Technologies in Power DistributionEmerging Technologies in Power Distribution
Emerging Technologies in Power Distribution
 
Distribution, Protection and Equipment Testing
Distribution, Protection and Equipment TestingDistribution, Protection and Equipment Testing
Distribution, Protection and Equipment Testing
 
Demand Side Management and Energy Efficiency
Demand Side Management and Energy EfficiencyDemand Side Management and Energy Efficiency
Demand Side Management and Energy Efficiency
 
Data Analytics
Data AnalyticsData Analytics
Data Analytics
 
Battery Energy Storage System
Battery Energy Storage SystemBattery Energy Storage System
Battery Energy Storage System
 
Distribution Utility Meet (DUM) 2019 Details
Distribution Utility Meet (DUM) 2019 DetailsDistribution Utility Meet (DUM) 2019 Details
Distribution Utility Meet (DUM) 2019 Details
 
TATA Power-DDL Utility Connect (Issue 05)
TATA Power-DDL Utility Connect (Issue 05)TATA Power-DDL Utility Connect (Issue 05)
TATA Power-DDL Utility Connect (Issue 05)
 
Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...
Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...
Read the Exclusive Stories by Bloomberg Featuring Mr. Sanjay Banga, CEO, TATA...
 
Electrical India- Procurement Strategies for Utilities
Electrical India- Procurement Strategies for UtilitiesElectrical India- Procurement Strategies for Utilities
Electrical India- Procurement Strategies for Utilities
 
PowerLine Magazine- Interview of Chief Commercial, TATA Power-DDL
PowerLine Magazine- Interview of Chief Commercial, TATA Power-DDLPowerLine Magazine- Interview of Chief Commercial, TATA Power-DDL
PowerLine Magazine- Interview of Chief Commercial, TATA Power-DDL
 
TATA Power-DDL Utility Connect (Issue 01)
TATA Power-DDL Utility Connect (Issue 01)TATA Power-DDL Utility Connect (Issue 01)
TATA Power-DDL Utility Connect (Issue 01)
 
TATA Power-DDL Utility Connect (Issue 02)
TATA Power-DDL Utility Connect (Issue 02)TATA Power-DDL Utility Connect (Issue 02)
TATA Power-DDL Utility Connect (Issue 02)
 
TATA Power-DDL Utility Connect (Issue 03)
TATA Power-DDL Utility Connect (Issue 03)TATA Power-DDL Utility Connect (Issue 03)
TATA Power-DDL Utility Connect (Issue 03)
 
TATA Power-DDL Utility Connect (Issue 04)
TATA Power-DDL Utility Connect (Issue 04)TATA Power-DDL Utility Connect (Issue 04)
TATA Power-DDL Utility Connect (Issue 04)
 
Power Distribution Sector Needs Skill Development And Soon
Power Distribution Sector Needs Skill Development And SoonPower Distribution Sector Needs Skill Development And Soon
Power Distribution Sector Needs Skill Development And Soon
 
Financial Express: 24×7 power for all Indians - Sanjay Banga
Financial Express: 24×7 power for all Indians - Sanjay BangaFinancial Express: 24×7 power for all Indians - Sanjay Banga
Financial Express: 24×7 power for all Indians - Sanjay Banga
 
Cable Healing through Vacuum and Gas
Cable Healing through Vacuum and GasCable Healing through Vacuum and Gas
Cable Healing through Vacuum and Gas
 

Recently uploaded

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 

Protecting Power Distribution with Cyber Security Training

  • 1. 2 OVERVIEW Cyber Intrusions and Attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy. In recent years, attackers have also devised novel ways in which to attack organisations and access data. In the BYOD era, companies are now giving mobile staff members the option of bringing their device with them and then using their personal device to communicate with customers and other employees. Data retained on these devices has become highly valuable to attackers as it often contains the credentials for logging into secure areas of the company network. Also when a device is lost or stolen, it can put the company at risk of a significant financial loss. Tata Power- DDL has since 2005 enjoyed great success using IT-Security services across all processes to secure the Integrity of the Data and User Services. . SESSION PLAN OBJECTIVE This training module has been designed to provide holistic knowledge of IT system loopholes and fixing their security concerns, especially from a Power Distribution Utility’s point of view. It will help power sector professionals wanting to develop knowledge and understanding of cyber security domain applicable to Critical Information Infrastructure. It will also enable participants to develop an overview of entire Cybersecurity ecosystem and best practices to be adopted in their respective organizations. Security Risk Assessment Concepts  Ethical Hacking, Penetration Testing and Vulnerability Auditing.  Overview of Cybersecurity Control Room Operations. Vulnerability Assessment & Prevention  Overview of Cyber Security Trends worldwide.  Introduction to Network Security, Application Security and Cyber Attack Methodology.  Demonstration of Network and Application scanning using tools. Information Security Management System  Overview of ISO 27001:2013 Information Security Management System (ISMS), ISMS Objectives, Clauses and Controls.  Overview of Audit Process.  Implementation of Best Practice for ISMS within organisation. OT (Operational Technology) Security  Overview of Cyber Attacks on Critical Information Infrastructure.  Details of Cybersecurity Standards and frameworks for OT Security.  Introduction to Tools & Technologies available for securing OT Network. Information Security Incident Management  Introduction to Concept of Information security incident management system.  Overview of Incident Management process. Overview of IT Act 2000  Aims and Objectives of IT Act 2000  Cyber Appellate Tribunal CYBER SECURITY IN POWER DISTRIBUTION SECTOR ONLINE TRAINING PROGRAM
  • 2. PROGRAM FEE DESCRIPTION OF CHARGES UNIT RATE Cost of Online Training comprising of 2 sessions for upto 30 participants from one company  Cost per Session – Rs 12,500  Cost for 2 different sessions – Rs 12,500 x 2 sessions = Rs. 25,000  Taxes and Levies extra Rs. 25,000 Cost of Online Training (comprising of 2 sessions) for every additional participant over and above 30 participants from one company excluding applicable taxes and levies  Cost per Session – Rs 1000  Cost for 2 different sessions – Rs 500 x 2 sessions = Rs. 1,000  Taxes and Levies extra Rs. 1,000 Remarks: Includes Online Training Cost, Course material and Presentations, Certificate of Participation TRAINING METHODOLOGY  The Online Training would be conducted on Tata Power-DDL’s WebEx Event Platform  Participants can attend the Training through any device like Desktop / Laptop / Tablet / Smart Phone  Each Session would be of 2 hour duration including Q&A session to take up question and points that need more clarity by the participants.  The presentation would be shared with all participants after the end of the Program PLACE 2 or 3 APPROPRIATE IMAGES FOR THE TRAINING THEME HERE. IMAGE SIZE AT LEAST 4.5 CM (H) X 8 CM (W) if inserting 2 images 4.5 CM (H) X 5.5 CM (W) if inserting 3 images