Protecting Power Distribution with Cyber Security Training
1. 2
OVERVIEW
Cyber Intrusions and Attacks have increased dramatically over the
last decade, exposing sensitive personal and business information,
disrupting critical operations, and imposing high costs on the
economy. In recent years, attackers have also devised novel ways
in which to attack organisations and access data. In the BYOD era,
companies are now giving mobile staff members the option of
bringing their device with them and then using their personal
device to communicate with customers and other employees. Data
retained on these devices has become highly valuable to attackers
as it often contains the credentials for logging into secure areas of
the company network. Also when a device is lost or stolen, it can
put the company at risk of a significant financial loss. Tata Power-
DDL has since 2005 enjoyed great success using IT-Security services
across all processes to secure the Integrity of the Data and User
Services.
.
SESSION PLAN
OBJECTIVE
This training module has been designed to provide holistic
knowledge of IT system loopholes and fixing their security concerns,
especially from a Power Distribution Utility’s point of view. It will
help power sector professionals wanting to develop knowledge and
understanding of cyber security domain applicable to Critical
Information Infrastructure. It will also enable participants to
develop an overview of entire Cybersecurity ecosystem and best
practices to be adopted in their respective organizations.
Security Risk Assessment Concepts
Ethical Hacking, Penetration Testing and
Vulnerability Auditing.
Overview of Cybersecurity Control Room
Operations.
Vulnerability Assessment & Prevention
Overview of Cyber Security Trends worldwide.
Introduction to Network Security, Application
Security and Cyber Attack Methodology.
Demonstration of Network and Application
scanning using tools.
Information Security Management System
Overview of ISO 27001:2013 Information
Security Management System (ISMS), ISMS
Objectives, Clauses and Controls.
Overview of Audit Process.
Implementation of Best Practice for ISMS
within organisation.
OT (Operational Technology) Security
Overview of Cyber Attacks on Critical
Information Infrastructure.
Details of Cybersecurity Standards and
frameworks for OT Security.
Introduction to Tools & Technologies available
for securing OT Network.
Information Security Incident Management
Introduction to Concept of Information
security incident management system.
Overview of Incident Management process.
Overview of IT Act 2000
Aims and Objectives of IT Act 2000
Cyber Appellate Tribunal
CYBER SECURITY
IN POWER
DISTRIBUTION
SECTOR
ONLINE TRAINING PROGRAM
2. PROGRAM
FEE
DESCRIPTION OF CHARGES UNIT RATE
Cost of Online Training comprising of 2 sessions for upto 30 participants from one company
Cost per Session – Rs 12,500
Cost for 2 different sessions – Rs 12,500 x 2 sessions = Rs. 25,000
Taxes and Levies extra
Rs. 25,000
Cost of Online Training (comprising of 2 sessions) for every additional participant over and above
30 participants from one company excluding applicable taxes and levies
Cost per Session – Rs 1000
Cost for 2 different sessions – Rs 500 x 2 sessions = Rs. 1,000
Taxes and Levies extra
Rs. 1,000
Remarks: Includes Online Training Cost, Course material and Presentations, Certificate of Participation
TRAINING METHODOLOGY
The Online Training would be conducted on Tata Power-DDL’s WebEx
Event Platform
Participants can attend the Training through any device like Desktop /
Laptop / Tablet / Smart Phone
Each Session would be of 2 hour duration including Q&A session to
take up question and points that need more clarity by the participants.
The presentation would be shared with all participants after the end of
the Program
PLACE 2 or 3 APPROPRIATE IMAGES FOR THE
TRAINING THEME HERE.
IMAGE SIZE AT LEAST
4.5 CM (H) X 8 CM (W) if inserting 2 images
4.5 CM (H) X 5.5 CM (W) if inserting 3 images