Skip to main content
Search
Menu
Cybersecurity in industrial systems

Cyber security in industrial communication networks ISA/IEC 62443-4

The course covers the cybersecurity requirements in the ISA/IEC 62443-4 standard imposes on components in industrial automation and control systems (IACS). You will also learn how to protect components of such systems from cyberattacks.

Purpose

The purpose of the course is for the course participant to understand the product parts of ISA/IEC 62443-4. They will gain an understanding of the product parts of the ISA/IEC 62443 standard. The requirements for a product, or a component as it is called in the standard, are listed in the parts ISA/IEC 62443-4-1 and ISA/IEC 62443-4-2.

 

Content

The course is divided into three parts, where part one focuses on the general requirements that apply to the entire series of the ISA/IEC 62443 standard. Part two introduces policies and procedures associated with IACS security. Part three reviews system-level requirements, including different safety technologies, system design, risk assessments, and assessment of safety levels provided by the automation system.

Target group

The course is suitable for managers, project managers, and engineers (mainly developers).

Customised course

If the current course date does not suit your company, please contact Ted Strandberg or Antihasree Maroju below to book a customised course.

Occasions

18 September 2024
RISE, Brinellgatan 4, Borås
18 Sep 2024
09:00-16:00
7000 SEK (excluding VAT)
Course
In-person
7
English
Programme
Programme
  • Introduction
  • Terminology and definitions
  •  Requirement specifications
  •  SS EN IEC 62443-4-1
    • Security Management (SM)
    • Specification of safety requirements (SR)
    • Safe by design (SD)
    • Safe Implementation (SI)
    • Security Verification and Validation (SVV)
    • Handling of security-related issues (DMs)
    • Security Update Management (SUM)
    • Safety Guidelines (SG)
  • SS EN IEC 62443-4-2
    • Basic requirements
      • Identification and authentication verification
      • Control of use
      • System Integrity
      • Data Confidentiality
      • Limited flow of data
      • Quick response to events
      • Resource availability
  • Software application requirements
    • Embedded device requirements
    • Requirements for host devices
    • Network device requirements
Anithasree Maroju

Contact person

Anithasree Maroju

TIC-ingenjör

+46 10 722 32 78

Read more about Anithasree

Contact Anithasree
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

* Mandatory By submitting the form, RISE will process your personal data.

Ted Strandberg

Administrator

Ted Strandberg

Projektledare

+46 10 516 60 93

Read more about Ted

Contact Ted
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

* Mandatory By submitting the form, RISE will process your personal data.