Security Management
Securing Intelligent Transportation Systems
Overview:
Introduction:
This training program provides an in-depth curriculum designed to enhance participants' skills in protecting digital infrastructure within transportation systems. It equips individuals with the knowledge to address cybersecurity threats and ensure the resilience of Intelligent Transportation Systems (ITS) against cyberattacks.
Program Objectives:
By the end of this program, participants will be able to:
-
Identify and describe key cybersecurity threats and vulnerabilities in Intelligent Transportation Systems (ITS).
-
Conduct an ITS cybersecurity risk assessment and develop effective mitigation strategies.
-
Develop an incident response plan and monitoring system for ITS.
-
Evaluate current and future defensive strategies to protect ITS infrastructure.
-
Understand and apply key ITS and cybersecurity standards in practice.
Targeted Audience:
-
Project Managers in transportation systems.
-
Technology Engineers, CTOs, and CIOs.
-
Strategic Development Personnel in transportation.
-
IT and Cybersecurity Professionals.
-
Transport Operators, Engineers, and Managers.
-
Consultants in ITS and Cybersecurity.
Program Outline:
Unit 1:
ITS Cybersecurity Risk Assessment and Mitigation:
-
How to conduct cybersecurity risk assessments for ITS.
-
Identifying and understanding the challenges in ITS cybersecurity.
-
Approaches for protecting ITS from cyber threats.
-
Cybersecurity protection frameworks, such as NIST and others.
-
Implementing cybersecurity controls to safeguard ITS.
Unit 2:
Cybersecurity & The Intelligent Transportation (ITS) System Environment:
-
Understanding how cyber-attacks occur in the ITS environment.
-
Exploring industries impacted by cyber threats in ITS.
-
Overview of the Intelligent Transportation System (ITS) environment.
-
The role of autonomous vehicles in ITS cybersecurity.
-
The architecture of ITS and its cybersecurity needs.
Unit 3:
ITS Monitoring and Incident Response:
-
How to perform penetration testing for ITS to identify vulnerabilities.
-
Setting up cybersecurity monitoring systems for ITS.
-
Managing cybersecurity events in real time.
-
Developing an incident response plan for ITS cybersecurity breaches.
Unit 4:
ITS & Cybersecurity Standards – Current and Future Practices:
-
Understanding ITS and cybersecurity standards.
-
Methods of conducting a gap analysis to identify security weaknesses.
-
Developing a plan of action for enhancing ITS security.
-
Exploring innovative approaches to ITS cybersecurity using AI and blockchain.
-
Evaluating the evolving landscape of ITS and cybersecurity standards.
Unit 5:
ITS Models, Infrastructure, Cybersecurity Threats & Vulnerabilities:
-
Overview of cybersecurity challenges within ITS.
-
Different ITS models and operator considerations.
-
Techniques for examining the infrastructure of ITS and communication systems (wired and wireless).
-
Importance of managing data within ITS, including sharing and governance.
-
Identifying threats and vulnerabilities in ITS infrastructure.