Introduction
This Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems training course cover the most important activities to be performed in a strong defense system against cyberattacks to an ITS. After the recent “supply chain attack” on cybersecurity companies in the USA such as SolarWinds early in December 2020, cyberspace and all it entails including ITS is no longer the same. The SolarWinds cybersecurity breach is perhaps the major one thus far and has demonstrated that no system, no matter how carefully designed, is secure. The scale, significance, and damage of this incident is huge and will likely grow as more details of the breach being discovered.
Although the SolarWinds breach affected only the confidentiality of data, it is just a matter of time before other security properties such as application-related data integrity are also compromised by similar attacks. If data integrity related to any physical real-world functionality such as the ITS infrastructure is compromised this can lead to disastrous consequences in the industry. Cybersecurity requires resilience as well as strong defenses and delegates attending this training course will get a deep understanding of crucial steps to achieve such generic requirements in an ITS environment.
This training course will highlight:
- The ITS Environment and Architecture
- Role of Enterprises, IT, Infrastructure, Autonomous vehicles, Communications, and Data
- ITS Cybersecurity Threats, Vulnerabilities, Risk Assessment and Mitigation
- ITS information monitoring and Incident Response
- Most significant ITS and Cybersecurity Standards
- Current and Future Cybersecurity Practices
Course Objectives of Cybersecurity Monitoring, Event Management, and Incident Response
At the end of this training course, you will learn to:
- Understand the ITS environment and explain its architecture
- List and explain various ITS Cybersecurity Threats and Vulnerabilities
- Perform an ITS Cybersecurity Risk Assessment and develop mitigation strategies
- Develop an ITS monitoring and incident response plan
- List and analyze the most important current and future practices of strong defenses
- List and understand the most significant ITS and Cybersecurity Standards
Training Methodology of Cybersecurity Monitoring, Event Management, and Incident Response
Participants in this training course will receive thorough training using several techniques that include coverage of material, discussions, breakout exercises, videos, and tests. The hands-on breakout exercises will be performed in groups and will enable participants to apply the material to real-world scenarios with active discussions with other members of the group. Pre-tests and post-tests will measure what was learned in this training course.
Organizational Impact of Cybersecurity Monitoring, Event Management, and Incident Response
The organization will benefit from understanding the principles of cybersecurity of ITS systems with an emphasis on monitoring, event management, and incident response and how these can be applied. In light of recent incidents, organizations want to apply the principles of cybersecurity to protect their assets and those of their stakeholders.
The participants on this training course, will:
- Enhance their analytical and problem-solving skills through participation in breakout exercises
- Learn how to analyze the cybersecurity of the Intelligent Transport Systems (ITS) infrastructure
- Be able to apply cybersecurity techniques to implement resilience and strong defenses
- Learn how to perform cybersecurity risk assessments for their organization
- Improve the cybersecurity of their organizations
- Develop cybersecurity plans including those for monitoring, event management, and incident response
- The Organization will become adaptive and improve it's cybersecurity while at the same time serve stakeholders and the public at the highest level
Personal Impact of Cybersecurity Monitoring, Event Management, and Incident Response
The participants will gain or enhance their understanding and application of cybersecurity monitoring, event management, and incident response by:
- Understanding how attacks happen in an IT'S environment
- Identifying attack vectors in existing ITS architectures
- Identifying threats and vulnerabilities in ITS
- Understanding cybersecurity protection frameworks and designing cybersecurity controls
- Developing various cybersecurity plans including information monitoring and incident response
- Applying best practices for event management and incident response
- Apply methods to perform a cybersecurity risk assessment and mitigation
- Recognize the need and benefits of standards
- Prepare for the future cybersecurity attacks and breaches in ITS
Target Audience of Cybersecurity Monitoring, Event Management, and Incident Response
This training course is designed for all the people involved in operations, software, services, mobility ITS infrastructure, traffic and transport planning and organization, IT experts, as well as researchers and consultants involved in cybersecurity, management, big data, communications, project management, and intelligent transport mobility.
This training course is suitable for a wide range of professionals but will greatly benefit:
Course Outlines of Cybersecurity Monitoring, Event Management, and Incident Response
DAY 1
Cybersecurity & Intelligent Transportation (ITS) System Environment
- How cyber-attacks happen
- Industries affected
- The Intelligent Transportation System (ITS) Environment
- Role of Autonomous vehicles
- ITS Architecture
- New mobility platforms
- A Need to Secure ITS
DAY 2
ITS models, Infrastructure, Cybersecurity Threats & Vulnerabilities
- Overview of Cybersecurity
- ITS Models: Operators
ITS systems and infrastructure
- Communication systems, wired, wireless
- Data management, sharing, and governance
- Threats & vulnerabilities in ITS
DAY 3
ITS Cybersecurity Risk Assessment and Mitigation
- Cybersecurity Risk assessment in ITS
- Cybersecurity challenges
- Approaches in ITS cybersecurity
- Cybersecurity protection frameworks: NIST and others
- Cybersecurity Controls
DAY 4
ITS Monitoring and Incident Response
- Penetration Testing for ITS
- Cybersecurity Monitoring
- Event Management
- Incident Response
- Best practices for first responders
DAY 5
ITS & Cybersecurity Standards – Current and Future Practices
- ITS & Cybersecurity Standards
- Good Practices
- Gap Analysis
- Plan of action
- Innovative approaches: AI, blockchain
About Madrid
Madrid is a city that combines its enduring history with its cosmopolitan atmosphere to create a destination that favored amongst tourists from around the world. This is a city that is very much bursting at the seams with life and its vibrant atmosphere, cultural attractions and connection with history ensure travelers have everything they could possibly want from a European city break. At the end of a flight to Madrid, there are sites to see, picturesque streets to roam and, of course, excellent shopping opportunities to explore. Visitors can immerse themselves in Madrid's fantastic local culture, its peerless art scene and world acclaimed fine dining. In fact, there is very little that Madrid doesn't have to offer.
Things to do and places to visit in Madrid
The only problem travelers will encounter during their visit to Madrid is knowing what to do first. Sampling the mouth-watering tapas, strolling through one of the many excellent museums or even simply soaking up the atmosphere are all excellent options. Spend a sunny day wandering through the splendid squares or marvel at the intricate architecture of the churches.With so many options, flights to Madrid are great for people of any age or inclination.
When visiting Madrid, be sure to:
- See the superb collection of art is the Museo del Prado.
- Stroll down the Gran Via.
- Enjoy the atmosphere of the Plaza Mayor.
- Wander through the stunning gardens of the Parque del Buen Retiro.
- See the beautiful mansion of the Museo Lazaro Galdiano.
- Find quirky fashions in the Fuencarral market.
- Try some of the many different tapas dishes.
- Visit the statues of Don Quixote and Sancho Panza in the Plaza de Espana.
- See the breathtaking Basilica de San Francisco El Grande.
- Wander the Casa de Campo park, which is five times the size of Central Park.
- Shop in the luxury boutiques of the Golden Mile.
- Look for bargains at the El Rasto flea market.
- See Picasso's Guernica in the Reina Sofia museum.
- Snack on churros with chocolate.