Course
Data/Business
Continuing Education

Cybersecurity - Security Gap Reporting in Energy

0 credit hours

Credits awarded upon completion

Self-Paced

Progress at your own speed

12 hours

Estimated learning time

About the Course

Description

This course will help learners to identify the current state of an energy organization's technology
infrastructure and its existing security controls, and map out where the organization's network
stands when compared to the Purdue Model. You will then map the information to a report, use
a risk rating matrix to determine the risk each gap poses, and determine the probability of
occurrence and impact of the gap. Finally, you will develop a roadmap to plan out the
implementation timelines for each solution. The findings and recommendations will be entered
into a standardized reporting format that will enable it to be referenced by Management.

Topics

  • Introduction IT vs OT, SANS Security Controls & NERC CIP Systems Hardening, Network Architecture Design, NIST 800-82r3 Existing Security Measures Alignment with the Purdue Model Identifying gaps from a stakeholder workshop Gap Analysis: Risk Rating Matrix Gap Analysis: Identifying Recommendations & Bringing it all together Prioritizing Findings Implementation Roadmap and Assessment

Sections

Schedule

Asynchronous

Delivery method

Online

Deliverables

  • 0 Credits

    Academic Excellence

    Earn necessary number of credit hours for completing this content

Outcomes

Identified the key factors in the current state of an energy organization’s technology infrastructure, including completion of a system overview, identification of any existing security measures and aligning the current available systems and security measures with the Purdue model.

Conducted a gap analysis using a risk rating matrix to identify the impact and probability of an identified gap and recommend a fix to plug the identified gaps.

Prioritized the implementation of the identified recommendations

Developed an implementation roadmap

Converted findings into concise bites of information for inclusion in the Security Gap

Assessment template

Drew up a conclusion to the findings from the report and recommended gap fixes

Summarized the entirety of the report into an Executive Summary for use by decision makers to make time-sensitive decisions on implementing recommended gap fixes

Outcomes Image