onway Logoonway.ch

CySec in Public Transport, Part 2

ISMS workshop together with Compass Security to implement cybersecurity measures in the areas of systems, networks and applications. THIS COURSE IS HELD IN GERMAN.

Registration

CySec in Public Transport, Part 2

Event
Event Logo

In cooperation with our partner Compass Security, we are pleased to offer you a workshop in which we enable you to implement security policies through an information security management system (ISMS) and to understand their impact on operations and processes. In addition, we impart the necessary domain knowledge for the implementation of cybersecurity measures in the areas of systems, networks and applications.

Cybersecurity in Public Transport – Need for Action and Solutions

Cybersecurity is becoming increasingly important in public transport. The integrity and availability of data are crucial for smooth operations. Railway companies and infrastructure managers must therefore take measures to protect facilities, systems and vehicles containing information technology systems from unauthorized access and to meet today's requirements. This requires a clear allocation of responsibilities in the area of cybersecurity, regular security audits and risk-based measures to ensure appropriate information security.

Topics

  • Processes Information Security Management System (ISMS) | Security Monitoring | Supplier Management | Dealing with Cloud Service Providers | Business Continuity Management | Employee Management | Asset Management | Roles and Responsibilities | Data Protection and Privacy | Access Control
  • Innovation and Change Management Requirements for IT and OT Measures | Cloud Development Environment (Test Data) | CI/CD Pipelines (Automated Software Delivery Process) | Application Security Testing (DAST/SAST) | Security Audits & CISO Clearance | Use of cryptographic methods
  • Operation of Systems and Network
  • Availability | Identity Management/Authentication | Segmentation/Zoning | Configuration & Change Management | Remote Work | Vulnerability Management | Asset Management | Installing Software on OT Systems | System Integrity | Endpoint & OT Device Protection | Monitoring & Security Alerts | Incident Management | Tamper Resistance (Physical Protection) | Penetration Testing

Theoretical concepts are illustrated using demonstrations and practical examples. Participants are actively involved in workshops to develop and implement content based on company scenarios.

Course preparation

A questionnaire on the topic of "Cybersecurity in the company" forms the basis for the workshops and the mutual exchange. The time required for this is about 2 to 3 hours.

Prerequisites

Target group

Duration and effort

Teaching methods

Speakers

Cost

Registration

Workshop information as PDF

Here you can download the workshop flyer:

Registration

Register directly here for workshops on days 1 and 2.