Skip to main content
Search
Menu
Cybersecurity in industrial systems

Cyber security in industrial communication networks ISA/IEC 62443-4

The course covers the cybersecurity requirements in the ISA/IEC 62443-4 standard imposes on components in industrial automation and control systems (IACS). You will also learn how to protect components of such systems from cyberattacks.

Purpose

The purpose of the course is for the course participant to understand the product parts of ISA/IEC 62443-4. They will gain an understanding of the product parts of the ISA/IEC 62443 standard. The requirements for a product, or a component as it is called in the standard, are listed in the parts ISA/IEC 62443-4-1 and ISA/IEC 62443-4-2.

 

Content

The course is divided into three parts, where part one focuses on the general requirements that apply to the entire series of the ISA/IEC 62443 standard. Part two introduces policies and procedures associated with IACS security. Part three reviews system-level requirements, including different safety technologies, system design, risk assessments, and assessment of safety levels provided by the automation system.

Target group

The course is suitable for managers, project managers, and engineers (mainly developers).

Customised course

If the current course date does not suit your company, please contact Ted Strandberg or Antihasree Maroju below to book a customised course.

Occasions

12 mars 2025
RISE, Brinellgatan 4, Borås
12 Mar 2025
09:00-12:00
4000 SEK (excluding VAT)
Unlimited
In-person
English
Programme
Programme
  • Introduction
  • Terminology and definitions
  •  Requirement specifications
  •  SS EN IEC 62443-4-1
    • Security Management (SM)
    • Specification of safety requirements (SR)
    • Safe by design (SD)
    • Safe Implementation (SI)
    • Security Verification and Validation (SVV)
    • Handling of security-related issues (DMs)
    • Security Update Management (SUM)
    • Safety Guidelines (SG)
  • SS EN IEC 62443-4-2
    • Basic requirements
      • Identification and authentication verification
      • Control of use
      • System Integrity
      • Data Confidentiality
      • Limited flow of data
      • Quick response to events
      • Resource availability
  • Software application requirements
    • Embedded device requirements
    • Requirements for host devices
    • Network device requirements
Ted Strandberg

Contact person

Ted Strandberg

Projektledare

+46 10 516 60 93

Read more about Ted

Contact Ted
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

* Mandatory By submitting the form, RISE will process your personal data.

Anithasree Maroju

Administrator

Anithasree Maroju

TIC-ingenjör

+46 10 722 32 78

Read more about Anithasree

Contact Anithasree
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

* Mandatory By submitting the form, RISE will process your personal data.