OT CBPRS Introduction


An introduction to OT Cybersecurity Best Practices Requirements Specification (CBPRS) Toolkit by M Yousuf Faisal.

Alternatively watch on Youtube.

Who's this Course for?


This course is primarily for anyone interested in buying the OT-CBPRS Toolkit to understand what best practices are covered.


Note: This is a complimentary training for IT & OT/ICS practitioners working at an Asset owners / End user environments that have purchased OT-CBPRS toolkit.

What you'll learn?


OT Security Best Practices mapped around OT Project Lifecycle stages from procurement to decommissioning.

Covers best practices and their rationale for addressing risks from multiple industry guidelines, standards and regulations.

A walk through of all OT-CBPRS requirements, the relevant guidance and how to use the OT CBPRS toolkit.

OT Security Foundations
OT Security Foundations

Starts with building the foundations with definitions, acronyms used throughout, concepts around cybersecurity activities throughout project lifecycle secure by design, defense and in depth and more.

Roles & Shared Responsibility
Roles & Shared Responsibility

Provides an overview of the different stakeholders involved, shared responsibilities between them, throughout the OT project lifecycle stages as per industry best practices (e.g. ISA/IEC 62443).

Reference Industry Guidance
Reference Industry Guidance

References to important links for greenfield implementations / brownfield upgrades for systems and components for security certification validation, and guidance from procurement to decommission.

OT Security Governance

OT Security Governance

Covers OT cybersecurity controls around governance, policy, risks, supply chain, awareness & measuring effectiveness from people, process and technology perspective.

OT Security Controls

OT Security Controls

Covers OT cybersecurity controls across identification, prediction, protection and detection from people, process and technology perspective.


OT Security Operations

OT Security Operations

Covers OT cybersecurity controls across detection, monitoring, response and recovery from people, process and technology perspective.

Author/Instructor: M. Yousuf Faisal

(EMBA, B.E Electrical, ISA/IEC 62443 cybersecurity certified, CNSSP, ISO 27001 Lead Auditor, CISSP, CISM, CISA)


Bringing more than two decades of professional industry experience in technology & Cybersecurity, while working both at an end user environment and as a cybersecurity advisor / consultant (serving clients globally). Have experience building and growing GRC, PCI & OT / Emerging Tech consulting practices across APAC.

Am on a mission on helping individuals and organizations to secure their career & digital transformation journey and the future of smart things. Hope to see you within the Securing Things learners community. It's a great day to start Securing Things for a Smart & Safer Society.


LinkedIn https://www.linkedin.com/in/yousufzubairi

X - https://X.com/@SecuringThings

Curriculum

The curriculum block is dynamic. As you add curriculum to your course, you'll see it automatically populate here.

EXAMPLE

This course is closed for enrollment.

Securing Things Newsletter


Don't just stop here.


Subscribe to Securing Things Newsletter for continuing your IT, OT/ICS, IIOT, IOT and AI Cybersecurity learning journey further, all year long.