Ok ... so it appears I have been pulled in to this discussion
. I think I am going to respond briefly and then let anyone fire questions at me rather than incorrectly address anything so far.
1. The course that was mentioned to instruct a variety of entities (asset owners, regulators, auditors, cyber security professionals, field techs, engineers, executives) of the challenges within control system environments. I can elaborate more on this if there is interest.
2. My specific background was cyber, then 13 years full time cybersecurity then 6 years ago pulled in to the Bulk Electric System to deal with SCADA/CS cybersecurity issues and the NERC CIP requirements. After dealing with this and still working through it I found it necessary to create some training to help everyone understand the risk.
3. What do we go after in the 2 day training - the PLC, the HMI, OPC or the communications between them. Essentially none of them really run any traditional security controls by default (eg. anti-virus, trusted sessions, firewalls, etc) so it sadly is not very hard.
4. What do I mean by not very hard - well, I have attempted to mimic the 2006 DOE/INL Aurora study. In April I ran the class CNS 366/466 at DePaul University using undergrad and graduate students to see if I can take raw control system and cybersecurity people and have them break in. See
http://www.controleng.com/single-ar...l-networks-and-cyber-security/ed80ef8d31.html
5. I am now running the commercial version of the course - see
http://cybati.org
I will address questions as you have them - we have lots of work to do and I want to help and you can take the class too. But - foremost I want to help.
Matt Luallen