Cybersecurity Fundamentals for Water and Wastewater Utilities
July 11-12, 2022 | Online :: Central Time
“I thought that the “Cybersecurity Fundamentals for Water and Wastewater Utilities” course was a great tool for people to learn about how cybersecurity best practices and how to prevent major cyber attacks from happening.” Junior Application Specialist, Automated Control Concepts
The new Cybersecurity Fundamentals course for water and wastewater utility professionals will provide a general overview of cybersecurity program development. This online course will give organizational leaders a practical knowledge of basic security measures that can be implemented to address major cyber risks associated with the most common cyber attacks. Water and Wastewater industry leaders attending this course will learn about the most common cyber threats, specific counter measures that can be employed by any organization, and the role organizational culture plays in impacting risk mitigating activities against water and wastewater facilities’ critical infrastructure. Leaders will also develop an understanding of how people, processes and technology all work together to improve cyber defense efforts.
The key take-away from this course is to provide organizational leadership with knowledge needed to be able to ask their team of cyber security professionals the right questions when conducting and internal assessment of their organization’s cybersecurity posture and ability to be resilient to cyber attacks.
- Analyze leading trends in next-gen cyber challenges and innovative solutions
- Discuss social engineering tactics and business email compromise mitigation
- Review risk management methodology and assessments
- Communicate strategies for effective cybersecurity prioritization
- Distinguish important information on cyber contracting and litigation
Monday, July 11, 2022 : Central Time
8:45 – 9:00 a.m.
Log In and Welcome
12:00 – 12:30 p.m.
9:00 a.m. – 4:00 p.m.
Introduction to Cyber Threat for Water and Wastewater Utilities
- The Most Common Cyber Threat Attack Vectors
- Who are the attackers and what do they want?
- The Basics about Advanced Persistent Threat (APT) Teams
- The Water ISAC Best Practices
- Cybersecurity Policy and IT Security Frameworks
- The Types of Assessments and Why You Would Use Them
- Phishing, Vishing, Smishing
- Other Social Engineering Methods
- Being Smart in the Digital World
Business Email and other Media Compromises
- Supply Chain
- Process Control
- Procurement Controls
- Email Security
- Social Media and related Security
Open Discussion on Ransomware and Other Common Malware Variants
General Overview of Technical Counter Measures
- Cybersecurity Hardware
- Cybersecurity Software
- The Cloud
- Basic Enterprise Architecture
General Overview of Defensive Architecture
- Defining Zero Trust
- Secure Access Service Edge (SASE)
- Defense in Depth
Tuesday, July 12, 2022 : Central Time
8:45 – 9:00 a.m.
9:00 a.m. – 12:00 p.m.
Basic Elements of Incident Response (Responding to Cyber Attacks)
- Cyber Incident Management Framework
- Communications Planning
- Cyber Incident Walk Through
- Emergency response plan
- The Triad of Emergency Response Planning – Business Continuity, Disaster Recovery and Cyber Incident Response
- Continuity of operations plan or disaster recovery plan
- Crisis management teams
- Manuel overrides and temporary manual operations
- System redundancy
Assessing Risk and Making Risk-Based Decisions
- Cyber Risks are different from Financial, and Operational Risks
- Using Threat, Cybersecurity Assessments, Audits and Penetration Tests
- Developing meaningful compensating controls
- Creating the Realistic Risk Assessment
Establishing the Value Proposition for Cybersecurity
Wrap up and Adjourn
Dr. Christopher Carter, Chief Information Officer (CIO), a Maryland Water Utility
Dr. Carter is an experienced IT and Cybersecurity leader with a Doctorate in Information Assurance and has cultivated process expertise across diverse mission disciplines. In his current role as the Chief Information Officer for a Maryland Water Utility, where he is the executive responsible for directing and managing the Information Technology Department. He leads a client-focused and process-based unit of staff, consultants, and implementation support specialists, who work to ensure that IT programs and Service Delivery are securely designed and implemented while being fiscally responsible and in full alignment with senior leadership’s strategic goals and objectives. He was formerly the Technical Director for Cybersecurity at Diplomatic Security at the State Department, and has held several other Cybersecurity leadership roles in other civil agencies and the DOD.
Dr. Carter was formally trained as an architect with a minor in Solar Technologies in Colorado in the early 80s, and maintains deep technical expertise across multiple domains, including Federal and State IT security and IT Service Management. He holds several industry certifications including a CISSP, CISM, ITIL Expert, and Project Management Professional. His specialties include architecture and cybersecurity planning, developing integrated security programs and solving IT service transformation challenges for large public organizations. Dr. Carter has taught a variety of IT courses, including the full set of Cisco CCNP courses, ITIL courses, IT security, and database development courses in the Federal Government.
Christopher’s outside interests are as varied as his education. He is an avid craftsman, having developed expertise in ceramics and having built several acoustic guitars. His other leadership experience includes Toastmasters Club President, Boy Scouts Assistant Scout Master and wilderness expedition leader, SCUBA rescue diver and instructor, and Certified Professional Building designer of solar buildings and integrated green energy systems.
We will be using Microsoft Teams to facilitate your participation in the upcoming event. You do not need to have an existing Teams account in order to participate in the broadcast – the course will play in your browser and you will have the option of using a microphone to speak with the room and ask questions, or type any questions in via the chat window and our on-site representative will relay your question to the instructor.
- IMPORTANT NOTE: After November 30 you will not be able to join a Teams meeting using Internet Explorer 11. Microsoft recommends downloading and installing the Teams app if possible. You may also use the Edge browser or Chrome.
- You will receive a meeting invitation will include a link to join the meeting.
- Separate meeting invitations will be sent for the morning and afternoon sessions of the course.
- You will need to join the appropriate meeting at the appropriate time.
- If you are using a microphone, please ensure that it is muted until such time as you need to ask a question.
- The remote meeting connection will be open approximately 30 minutes before the start of the course. We encourage you to connect as early as possible in case you experience any unforeseen problems.
Please Note: This event is being conducted entirely online. All attendees will connect and attend from their computer, one connection per purchase. For details please see our FAQ
If you are unable to attend at the scheduled date and time, we make recordings available to all registrants for three business days after the event
REGISTER NOW FOR THIS EVENT:
Cybersecurity Fundamentals for Water and Wastewater Utilities
July 11-12, 2022 | Online
|Individual attendee(s) - $ 1195.00 each|
Volume pricing also available
Individual attendee tickets can be mixed with ticket packs for complete flexibility
|Pack of 5 attendees - $ 4,780.00 (20% discount)|
|Pack of 10 attendees - $ 8,365.00 (30% discount)|
|Pack of 20 attendees - $ 14,340.00 (40% discount)|
Your registration may be transferred to a member of your organization up to 24 hours in advance of the event. Cancellations must be received on or before June 10, 2022 in order to be refunded and will be subject to a US $195.00 processing fee per registrant. No refunds will be made after this date. Cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other EUCI event. This credit will be good for six months from the cancellation date. In the event of non-attendance, all registration fees will be forfeited. In case of conference cancellation, EUCIs liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at 303-770-8800
EUCI is accredited by the International Accreditors for Continuing Education and Training (IACET) and offers IACET CEUs for its learning events that comply with the ANSI/IACET Continuing Education and Training Standard. IACET is recognized internationally as a standard development organization and accrediting body that promotes quality of continuing education and training.
EUCI is authorized by IACET to offer 1.0 CEUs for this event.
Upon successful completion of this event, program participants interested in receiving CPE credits will receive a certificate of completion.
Course CPE Credits: 11.0
There is no prerequisite for this Course.
Program field of study: Specialized Knowledge
Program Level: Basic
Delivery Method: Group Internet Based
Advanced Preparation: None
EUCI is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org
Requirements for successful completion of program
Participants must log in each day and be in attendance for the entirety of the course to be eligible for continuing education credit.
PowerPoint presentations and open discussion