Courses & Training

Digital Security 3 – 5 – 10

Educate yourself in Cyber Security, ask questions to leading experts with experience – Then be a star and strengthen your organization! This course is designed to train participants in ‘Digital Security 3 –5 –10’.

The course is divided into three main parts.

One part for “People – Technology – Process”, one for “Identify – Protect – Detect – Respond – Recover” and one for “Priority for actions”.
In each part templates derived from projects that comply with ISO27001/ IEC62443 / NIST are shown and discussed. For the course on Thursday, the attacks of the electric grid in Ukraine in 2015 to 1016 will be used as an example and “common thread” throughout the course and form a basis for the examples.
 

Therethrough, we will identify groupings of people, technology and processes involved in power distribution, related threat scenarios and mitigating measures. In addition, there will be time for questions and answers to ensure that the participants get the most practical information possible out of the course. A summary of the course discussions will be made and shared with the participants. 

The participants will gain understanding on how digital security is as much about people and processes as it is about technology, five functional areas of a digital security frame work and digital security mitigating actions

Digital Security 3  – 5  –  10
3: People –Technology –Processes
– Upon subject completion, the participants will be able to describe how digital security is as much about people and processes as it is about technology
5: Identify –  Protect –Detect – Respond – Recover
 – Upon subject completion, the participants will be able to describe five functional areas of a digital security framework
10: Prioritize top 10 mitigations
– Upon subject completion, the participants will be able to identify and prioritize digital security mitigating actions.

Overall Course Goals:
At the conclusion of this course, the participant will be able to:
• Describe how digital security is as much about people and processes as it is about technology
• Describe five functional areas of a digital security framework
• Identify several digital security mitigating actions.

 Who is the course for: Security for curious engineers, operations and management folks.
The course is held in English

Digital Security 3  – 5  –  10

Host:
Gjermund Slettvold,  Recab – Engineering Group Manager. Responsible for system engineering and technology development. Gjermund Slettvold has extensive experience in systems architecture and design, and holds a Bachelor of Science in Embedded Systems from Buskerud University College in Norway. Prior to Recab, Gjermund spent 10 years with FMC Technologies in various engineering and technical manager roles, with responsibility for design and validation of both subsea and topside systems. 

Erlend Agøy Engum:
Graduated with Masters of Computer Science from the Norwegian University of Science and Technology and MBA at Rice University. In recent years, Erlend has worked with management, design and hands-on implementation of complex technology and has had roles including course instructor, product owner, consultant, system integrator and development lead. He has written several articles and gives regular lectures on cyber security and technology.

Erlend is passionate about creating commercially viable solutions within applicable laws, regulations, standards and best practices, adapted to the customer’s varied operating environments and culture. Has extensive experience from large, complex multinational product- and service providers as well as from start-up companies

Date: – Upcoming

Course cost: 3950 NOK

  • – NOK = 3950
  • – SEK = 3850
  • – DKK = 2800

The course is digital and is held in a locked forum in Recab´s  Go To Webinar platform.
If you want to register more participants at your company – contact us here and we will arrange for registration and invoicing.

Questions, please contact:
Gjermund Slettvold on:  Gjermund.Slettvold@recab.com

Read more about our Cyber Security range