Operational Technology, Resilient Ecosystems and Infrastructure Protection
Enhancing cybersecurity proficiancy of Western Balkans administrations
The training series developed in cooperation with the Netherlands' Ministry of Foreign Affairs and the National Cyber Security Centre consists of three integral parts, each designed to enhance different aspects of cybersecurity proficiency among participants from the Western Balkans within the context of Critical Infrastructures (CI) and Critical Information Infrastructures (CII). Participants will gain critical theoretical knowledge, practical skills, and awareness necessary to address the evolving challenges in cybersecurity.
1. Operational Technology
Duration: 1,5 days
This segment focuses on the specific security needs related to operational technology (OT), which is increasingly targeted in cyberattacks due to its critical role in controlling physical processes in industries like manufacturing, energy and utilities. The training aims to strengthen skills in protecting and securing OT environments from potential cyber threats.
*Focus on the integration and protection of operational technology within cybersecurity framework.
*Explore dependencies and the impact of cascading risks in operational settings.
*Practical sessions on developing resilient strategies and responses to cyber threats in operational technologies.
2. Cyber Resilient Ecosystems
Duration: 1,5 days
Participants will learn how to build and maintain cyber-resilient ecosystems that can withstand and quickly recover from cyber incidents. This part of the training emphasizes the importance of resilience planning and strategies to ensure continuity and reliability in the face of cyber disruptions.
- Innovative approaches to ecosystemic-thinking in cybersecurity.
- Lessons from natural ecosystems applied to cyber challenges to foster robust public-private partnerships and strengthen regional cyber resilience.
- Hands-on exercises for mapping and establishing cyber resilient ecosystems for organisations, specific regions like industrial areas, harbors, airports, or targeted sectors.
3. Critical Information Infrastructure Protection
Duration: 1 day
This training focuses on protecting critical information infrastructure, which is essential for the functioning of a society and economy. Topics include risk assessment, protection strategies and the implementation of security measures designed to protect vital digital assets and services from cyber threats.
- Essential insights into the relationship between CI and CII under cybersecurity perspectives.
- Detailed discussion on the needs for protection amid a continuously changing cyber environment.
- Focus on four key areas: Understanding CI and CII, Asset management, and building secure communities.
- Practical exercises aimed at developing comprehensive strategies for protecting critical information infrastructure.