Course details
Seminar content
What you will learn
Course Introduction
Cyber attacks pose a global threat impacting individuals, businesses, and nations alike. Safeguarding your organization from these threats requires not only the ability to protect your technology but also to effectively identify, analyze, respond to, and investigate cyber incidents. The consequences of an information security breach, such as the notorious attack on the Ukraine power station, can be catastrophic, undermining operational technology controls and exposing critical vulnerabilities.
As cyber attacks increase in frequency and sophistication, understanding the nature, motives, and methods of cyber threat actors becomes crucial.
Implementing best practices, utilizing appropriate countermeasures, and applying effective management techniques are essential for mitigating these risks and protecting your assets.
With cyber security emerging as a core responsibility, leaders—including boards of directors, corporate officers, chief engineers, and frontline employees—must recognize the personal and organizational implications of cyber breaches and integrate robust security measures into their strategies.
This Industrial Cyber Security training course will help you understand Information Security, and how this is deployed in an Operational Technology Environment.
This training course will feature:
- An understanding of Cyber Security issues
- Approaches to Cyber Security within an Operational Technology environment.
- An introduction to Cyber Security Frameworks
- Current Best Practices for Cyber Security Response
- Approaching Cyber Security Response Plans
Training Objectives
By the end of this training course, the participants will be able to:
- Understand Information Security, and how this is deployed in an Operational Technology Environment
- Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
- Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
- Understand the approaches for Crisis and Incident Management for Cyber Security Breaches
Who should Attend?
This training course is suitable to a wide range of professionals but will greatly benefit:
- Legal Professionals
- System Engineers
- Security Administration
- Operational Staff
- Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment
Benefits
Why attend this seminar
- Build current, practical knowledge in it management and cyber security.
- Translate the course ideas into actions you can use immediately at work.
- Review real schedule options across 10 venues and live dates.
- Connect course detail, venue, and category routes in one workflow.
Methodology
How the course is delivered
- Structured seminar input and guided discussion.
- Applied examples using current business situations.
- Focused explanations based on the stored overview and outline.
- Clear next steps for implementation after the course.
Target audience
Who this is for
- Professionals responsible for it management and cyber security.
- Managers, specialists, and team leads who need applied skills.
- Participants looking for a focused route into Industrial Cyber Security.
Seminar details
Detailed outline
Day One: What is Cyber Security?
- Overview of Cyber Security for Industries
- Cyber Crime and Attacks
- Technology, Policing, and Investigation of Electronic Crime
- Ethical Hacking and Cyber Crime
- Civil and Criminal Considerations
Day Two: Assessing Your Cyber Security Posture
- Cyber Security and Risk Assessment
- Information Security and Standards
- ISO7799 - Information Security Management - Code of Practice
- ISA99 - International Standards for Automation Cyber Security Standard
- Reducing Your Security Risk and Increasing Your Security Capabilities
Day Three: Cyber Security and Industrial Control Systems Management
- Information Security and Operational Technology
- Emerging Industrial Technology Trends
- Metcaf’s Law
- Moore’s Law
- Mirrors World
Day Four: Cyber Security Controls
- Selecting Security Controls and Best Practice
- Considerations for Enhancing Security
- Detection, Prevention and Offensive Responses
- Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
- OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow
Day Five: Building a Cyber Response Plan
- Defining a Cyber Response Strategy
- Composing Cyber Response Plan
- Cyber Response Team Compilation and Service Vendor Support
- Cyber Preparedness and Corporate Governance
- Operational Security Centers
Dates and locations
Available seminar dates
| Date | City | Duration | Price | |
|---|---|---|---|---|
| 20 - 24 April 2026 | London - U.K | 5 Days | €4,200.- | Book now |
| 4 - 8 May 2026 | Munich - Germany | 5 Days | €3,450.- | Book now |
| 15 - 19 June 2026 | Amsterdam - Netherlands | 5 Days | €4,250.- | Book now |
| 20 - 24 July 2026 | Istanbul - Turkey | 5 Days | €2,850.- | Book now |
| 3 - 7 August 2026 | Rome - Italy | 5 Days | €4,250.- | Book now |
| 7 - 11 September 2026 | Istanbul - Turkey | 5 Days | €2,850.- | Book now |
| 12 - 16 October 2026 | Vienna - Austria | 5 Days | €4,250.- | Book now |
| 9 - 13 November 2026 | Barcelona - Spain | 5 Days | €3,850.- | Book now |
| 14 - 18 December 2026 | Rome - Italy | 5 Days | €4,250.- | Book now |
| 6 - 10 April 2026 | Istanbul - Turkey | 5 Days | €2,850.- | Book now |
| 11 - 15 May 2026 | Vienna - Austria | 5 Days | €4,250.- | Book now |
| 8 - 12 June 2026 | Barcelona - Spain | 5 Days | €3,850.- | Book now |
| 6 - 10 July 2026 | Rome - Italy | 5 Days | €4,250.- | Book now |
| 10 - 14 August 2026 | Munich - Germany | 5 Days | €3,450.- | Book now |
| 14 - 18 September 2026 | Amsterdam - Netherlands | 5 Days | €4,250.- | Book now |
| 5 - 9 October 2026 | London - U.K | 5 Days | €4,200.- | Book now |
| 16 - 20 November 2026 | Istanbul - Turkey | 5 Days | €2,850.- | Book now |
| 7 - 11 December 2026 | Vienna - Austria | 5 Days | €4,250.- | Book now |
| Date | Duration | Price | |
|---|---|---|---|
| 20 - 24 April 2026 | 5 Days | €2,250.- | Book now |
| 4 - 8 May 2026 | 5 Days | €2,250.- | Book now |
| 15 - 19 June 2026 | 5 Days | €2,250.- | Book now |
| 20 - 24 July 2026 | 5 Days | €2,250.- | Book now |
| 3 - 7 August 2026 | 5 Days | €2,250.- | Book now |
| 7 - 11 September 2026 | 5 Days | €2,250.- | Book now |
| 12 - 16 October 2026 | 5 Days | €2,250.- | Book now |
| 9 - 13 November 2026 | 5 Days | €2,250.- | Book now |
| 14 - 18 December 2026 | 5 Days | €2,250.- | Book now |
| 6 - 10 April 2026 | 5 Days | €2,250.- | Book now |
| 11 - 15 May 2026 | 5 Days | €2,250.- | Book now |
| 8 - 12 June 2026 | 5 Days | €2,250.- | Book now |
| 6 - 10 July 2026 | 5 Days | €2,250.- | Book now |
| 10 - 14 August 2026 | 5 Days | €2,250.- | Book now |
| 14 - 18 September 2026 | 5 Days | €2,250.- | Book now |
| 5 - 9 October 2026 | 5 Days | €2,250.- | Book now |
| 16 - 20 November 2026 | 5 Days | €2,250.- | Book now |
| 7 - 11 December 2026 | 5 Days | €2,250.- | Book now |
Course certificate
Certificate awarded on completion
Every participant who completes this seminar receives a professional course certificate from INFORAMTECH.
- Participants receive an INFORAMTECH certificate for completing Industrial Cyber Security.
- The certificate recognises attendance and successful participation in the seminar.
- It can support professional development records within it management and cyber security and related functions.
Information about
Frequently asked questions
When is my seat confirmed?
Your seat is confirmed once full payment has been received.
Do you offer group discounts?
Yes, we offer the following discounts for group bookings:
- 2 participants: 20% discount
- 3 participants: 35% discount
- 5 or more participants: 50% discount
Can discounts be combined with other offers?
No, discounts cannot be combined unless explicitly stated.
What payment methods do you accept?
We accept bank transfers, credit/debit cards, and selected online payment methods.
When do I need to pay?
Full payment must be completed before the course start date to secure your participation.
Is VAT included in the course fee?
VAT treatment depends on your location and status:
- EU Companies (with valid VAT number): VAT may be reverse charged (0%)
- EU Individuals (without VAT number): VAT is applicable based on local regulations
- Non-EU Participants: VAT is generally not applicable (0%)
Can I get a VAT invoice?
Yes, all participants receive an official invoice. EU companies must provide a valid VAT number.
Can I cancel my registration?
Yes, cancellations must be submitted in writing.
What is your refund policy?
- More than 14 days before the course: Full refund
- 7-14 days before the course: 50% refund
- Less than 7 days before the course: No refund
Can I transfer my seat to another person?
Yes, substitutions are allowed at no extra cost if requested before the course start date.
What happens if the course is postponed or canceled?
We reserve the right to reschedule or cancel a course due to unforeseen circumstances. In such cases, you may:
- Transfer to another date
- Receive full refund
Will I receive a certificate?
Yes, all participants will receive a certificate of completion after attending the course.
Is attendance mandatory?
Yes, full attendance is required to receive certification.
Are your courses online or in-person?
We offer both in-person and virtual (live online) training options.
Will course materials be provided?
Yes, all participants receive training materials in digital format.
Are travel and accommodation included?
No, participants are responsible for their own travel and accommodation unless otherwise stated.
Can you deliver customized or in-house training?
Yes, we offer tailored training programs based on your organization's needs.
How can I contact you for support?
You can reach us via email info@inforamtech.uk or through our contact form. Our team will respond promptly.
Testimonials
The structure of Industrial Cyber Security made the topic practical and easy to apply immediately.
The venue and date options made planning the right session straightforward.
Clear content, relevant examples, and useful follow-up topics for the next training step.
Related courses
Course
Cybersecurity Audit Essentials
Course
Auditing a Cybersecurity Programme
Course
Cybersecurity and Enterprise Resilience
Course