CINXE.COM

Railway Cybersecurity Training | Protecting Trains and Infrastructure

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Railway Cybersecurity Training | Protecting Trains and Infrastructure</title> <meta name="description" content="Explore in-depth insights into railway cybersecurity to safeguard passengers, protect train systems, and secure critical infrastructure. Training, and updates on railway cybersecurity."> <meta name="keywords" content="railway cybersecurity, railway cybersecurity training, train cybersecurity, railway infrastructure security, critical infrastructure protection, cybersecurity for trains, railway cybersecurity news, railway safety, train system security"> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": " https://www.railway-cybersecurity.com" }, { "@type": "ListItem", "position": 2, "name": "NIS 2 Directive, training for the railway industry", "item": " https://www.railway-cybersecurity.com/NIS_2_Rail_Transport_Training.html" }, { "@type": "ListItem", "position": 3, "name": "Critical Entities Resilience Directive (CER) training for the railway industry", "item": "https://www.railway-cybersecurity.com/CER_Directive_Training.html" }, { "@type": "ListItem", "position": 4, "name": " Railway Cybersecurity Links", "item": " https://www.railway-cybersecurity.com/Railway_Cybersecurity_Links.html " }, { "@type": "ListItem", "position": 5, "name": "Cyber Risk GmbH", "item": "https://www.cyber-risk-gmbh.com" } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of cybersecurity training for the railway industry in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="n6kPt5tcxuEtapWnUguAED_qddJQEb21QxHAMdGKD_A"> <style> .wrapper-banner { background: url("Background_120.jpg"); background-size: cover; background-position: center; } </style> <meta name="msvalidate.01" content="3992470AA0B488CE9CF07B1CD73A76D7"> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.disinformation.ch/"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.railway-cybersecurity.com" target="_blank">Index</a></li> <li><a href="https://www.railway-cybersecurity.com/Railway_Cybersecurity_Training.html" target="_blank">Railway Cybersecurity Training </a></li> <li><a href="https://www.railway-cybersecurity.com/Railway_Board_Cybersecurity_Training.html" target="_blank">Board Training </a></li> <li><a href="https://www.railway-cybersecurity.com/NIS_2_Rail_Transport_Training.html" target="_blank">NIS 2 Training</a></li> <li><a href="https://www.railway-cybersecurity.com/CER_Directive_Training.html" target="_blank">CER Training</a></li> <li><a href="https://www.railway-cybersecurity.com/Railway_Cybersecurity_ENISA_2021.html" target="_blank">ENISA Good Practices</a></li> <li><a href="https://www.railway-cybersecurity.com/Rail_Cyber_Security_Guidance.html" target="_blank">Cybersecurity Guidance</a></li> <li><a href="https://www.railway-cybersecurity.com/Railway_cybersecurity.html" target="_blank">Railway Cybersecurity</a></li> <li><a href="https://www.railway-cybersecurity.com/Railway_Cybersecurity_Links.html" target="_blank" >Links</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cybersecurity training for the Railway Sector</h3> <br> <br> <p class="text-left"><b>Overview</b></p> <p class="text-left"> For decades, when we were using the words “railway security”, we were usually referring to the protection and safeguarding of railway property, to the removal of any obstruction in the movement of trains, to the identification of potential situations where crime can take place against railway property or passengers, or the use of a train for criminal purposes or terrorism.</p> <p class="text-left">Cybersecurity is the new challenge for the railway industry.</p> <p class="text-left">Customers and employees of the railway industry expect that the same level of protection extends to the digital assets that reside on railway systems, including their personal and financial information. The industry is obliged to respect this expectation, especially after the new privacy regulations, including the General Data Protection Regulation (GDPR).</p> <p class="text-left">The railway industry must comply with cyber security and privacy laws and regulations, and must follow international standards and best practices that protect customers and employees.</p> <p class="text-left">A new cybersecurity culture is necessary. It refers to the knowledge, beliefs, perceptions, attitudes, assumptions, norms, values, and expectations of customers regarding cybersecurity. Managers and employees must be involved in the prevention, detection, and response to deliberate malicious acts that target systems, persons, and data.</p> <p class="text-left">During the past decades, the railway industry has made substantial investments in information technology solutions that contribute to improved operational efficiency, safety, and customer satisfaction. The more complex and interconnected the systems, the more awareness and training is required for all managers and employees that use these systems.</p> <p class="text-left"> Important threats for the railway industry are cyber criminals with financial motivation, politically-motivated groups, state-sponsored agents and groups, terrorists, but also disgruntled or terminated employees with access to the systems. </p> <p class="text-left">Railway operators often report low cybersecurity awareness and differences in culture, especially among safety and operations personnel. Cybersecurity awareness for all managers and employees in the railway industry is necessary, in order to make information security considerations an integral part of every job.</p> <br> <p class="text-left"> <b> Course synopsis, recommended training modules</b></p> <p class="text-left"><b>Introduction.</b></p> <p class="text-left">- Railway stakeholders must strike a balance between operational requirements, business competitiveness and cybersecurity.</p> <p class="text-left">- Important developments in the railway industry after the new privacy regulations, including the General Data Protection Regulation (GDPR).</p> <p class="text-left">- Understanding the challenges.</p> <p class="text-left">An overview of some of the attacks described below, that are suitable for the objectives of the training. At the end of the presentation we will cover one or more of these attacks in depth.</p> <p class="text-left">- March 2022, the Italian State Railways (FS) and its subsidiaries Trenitalia and Italian Rail Network (RFI) suffered a ransomware cyber-attack which disrupted ticket sales at stations, passenger information screens and tablets used by railway staff. </p> <p class="text-left">- 2008, attackers derailed four tram trains in Lodz, Poland by means of TV remote.</p> <p class="text-left">- 2011, attackers stopped the train signaling system for two days in the North Western of United States.</p> <p class="text-left">- 2013, the Belgian national railway published personal information of several customers, it was a mistake.</p> <p class="text-left">- 2022, the Romanian National Directorate of Cyber Security said that multiple public and private sector websites were hit with DDoS attacks. The victims included the ministry of defense, border police, national railway company, and the OTP Bank. </p> <p class="text-left">- 2021, Transnet Port Terminals (TPT), South Africa’s state-run ports operator and freight rail monopoly, had its rail services disrupted after a hack by unknown actors. </p> <p class="text-left">- July 2021, Iran’s transport and urbanization ministry was the victim of a cyber attack that caused delays and cancellations of hundreds of trains across Iran.</p> <p class="text-left">- 2017, a major wave of ransomware infections hits media organizations, train stations, airports, and government agencies in Europe. The malware used leaked NSA-linked exploits. Ukrainian police reported that the ransomware was a cover for a phishing campaign undertaken by the same actor to gain remote access to financial and confidential data. </p> <p class="text-left"> - 2015-2016, United Kingdom, four cyberattacks, considered as part of a reconnaissance operation before an APT (Advanced Persistent Threat) attack, probably led by a national state threat actor. </p> <p class="text-left"> - May 2017, Deutsche Bahn was a victim of the WannaCry ransomware. </p> <p class="text-left"> - October 2017, attack that affected the Sweden Transport Administration (Trafikverket) via its two internet service providers, TDC and DGC. The attack reportedly affected the IT system that monitors trains' locations. It also took down the federal agency's email system, website, and road traffic maps. Customers during this time were unable to make reservations or receive updates on the delays. </p> <p class="text-left"> - May 2018, Denmark, an attack impacted the ticketing systems of DSB. The Danish travelers could not purchase tickets from ticket machines, the online application, website, and certain station kiosks. </p> <p class="text-left"> - March 2020, United Kingdom, the email addresses and travel details of about 10.000 people who used the free Wi-Fi provided in UK railway stations have been exposed online. The database contained 146 million records, including personal contact details and dates of birth. </p> <p class="text-left"> - July 2020, Spanish Infrastructure Manager ADIF has been hit by a ransomware not affecting critical infrastructure but exposing gigabytes of personal and business data.</p> <br> <p class="text-left"><b>Who is the “attacker”?</b></p> <p class="text-left">- Countries, competitors, criminal organizations, small groups, individuals, employees, insiders, service providers.</p> <p class="text-left">- Hacktivists and the railway industry.</p> <p class="text-left">- Professional criminals and information warriors.</p> <p class="text-left">- Cyber-attacks against passengers, baggage, cargo, catering, systems, staff, and all persons having authorized access to systems and data.</p> <br> <p class="text-left"><b>How do the adversaries plan and execute the attack?</b></p> <p class="text-left">- Step 1 – Collecting information about persons and systems.</p> <p class="text-left">- Step 2 – Identifying possible targets and victims.</p> <p class="text-left">- Step 3 – Evaluation, recruitment, and testing.</p> <p class="text-left">- Step 4 - Privilege escalation.</p> <p class="text-left">- Step 5 – Identifying important clients and VIPs.</p> <p class="text-left">- Step 6 – Critical infrastructure.</p> <br> <p class="text-left"><b>Employees and their weaknesses and vulnerabilities.</b></p> <p class="text-left">- Employee collusion with external parties.</p> <p class="text-left">- Blackmailing employees: The art and the science.</p> <p class="text-left">- Romance fraudsters and webcam blackmail: Which is the risk for the railway industry?</p> <br> <p class="text-left"><b>What must be protected?</b></p> <p class="text-left">- Best practices for all employees that provide services and have authorized access to systems and data. </p> <p class="text-left">- What to do, what to avoid.</p> <p class="text-left">- From client satisfaction vs. cyber security, to client satisfaction as the result of cyber security.</p> <br> <p class="text-left"><b>Social Engineering.</b></p> <p class="text-left">- Reverse Social Engineering.</p> <p class="text-left">- Common social engineering techniques</p> <p class="text-left">- 1. Pretexting.</p> <p class="text-left">- 2. Baiting.</p> <p class="text-left">- 3. Something for something.</p> <p class="text-left">- 4. Tailgating.</p> <br> <p class="text-left"><b>Phishing attacks.</b></p> <p class="text-left">- Spear-phishing.</p> <p class="text-left">- Clone phishing.</p> <p class="text-left">- Whaling – phishing for executives.</p> <p class="text-left">- Smishing and Vishing Attacks.</p> <br> <p class="text-left"><b>Cyber Hygiene.</b></p> <p class="text-left">The online analogue of personal hygiene.</p> <p class="text-left">- Preparing and maintaining records.</p> <p class="text-left"> - Entering and retrieving data into computer systems and devices.</p> <p class="text-left"> - Researching and compiling reports from outside sources.</p> <p class="text-left"> - Maintaining and updating files. </p> <p class="text-left"> - Responding to emails and questions by telephone and in person.</p> <p class="text-left"> - Ensuring that sensitive files, reports, and other data are properly tracked.</p> <p class="text-left"> - Dealing with personnel throughout the company as well as external parties, customers, suppliers, service providers.</p> <br> <p class="text-left"><b>Case studies.</b></p> <p class="text-left"> We will discuss the mistakes and the consequences in one or more of the following case studies: </p> <p class="text-left">- March 2022, the Italian State Railways (FS) and its subsidiaries Trenitalia and Italian Rail Network (RFI) ransomware cyber-attack. </p> <p class="text-left">- 2008, attackers derailed four tram trains in Lodz.</p> <p class="text-left">- 2011, signaling system in the North Western of United States.</p> <p class="text-left">- 2013, the Belgian national railway mistake.</p> <p class="text-left">- 2021, Transnet Port Terminals (TPT), South Africa’s state-run ports operator and freight rail monopoly. </p> <p class="text-left">- July 2021, Iran’s transport and urbanization ministry, cancellations of hundreds of trains across Iran.</p> <p class="text-left">- 2017, ransomware infections hit media organizations, train stations, airports, and government agencies in Europe. </p> <p class="text-left"> - 2015-2016, United Kingdom, four cyberattacks, probably led by a national state threat actor. </p> <p class="text-left"> - May 2017, Deutsche Bahn, WannaCry ransomware. </p> <p class="text-left"> - October 2017, Sweden Transport Administration (Trafikverket). </p> <p class="text-left"> - May 2018, Danish travelers could not purchase tickets from ticket machines, the online application, website, and certain station kiosks. </p> <p class="text-left"> - March 2020, United Kingdom, Wi-Fi provided in UK railway stations. </p> <p class="text-left"> - July 2020, Spanish Infrastructure Manager ADIF hit by ransomware.</p> <p class="text-left">- What has happened?</p> <p class="text-left">- Why has it happened?</p> <p class="text-left">- Which were the consequences?</p> <p class="text-left">- How could it be avoided?</p> <br> <p class="text-left">Closing remarks and questions.</p> <br> <p class="text-left"><b>Target Audience</b></p> <p class="text-left">The program has been designed for all managers and employees working in the railway industry that have authorized access to systems and data. They may work:</p> <p class="text-left">- for a railway undertaking (RU), in charge of providing services for the transport of goods and/or passengers by rail, and </p> <p class="text-left"> - for an infrastructure manager (IM), in charge of establishing, managing, and maintaining railway infrastructure and fixed installation, including traffic management, control-command and signalling, but also station operation and train power supply. </p> <p class="text-left">They are in the scope of the EU NIS 2 Directive (directive on security of network and information systems), as operators of essential service (OES).</p> <p class="text-left">The program is beneficial to suppliers and service providers, employees responsible for reviewing schedules and maintaining communication with crew members of trains, train operators, engineers, train crew members responsible for operational and safety duties, station managers and agents, and revenue protection officers. </p> <br> <p class="text-left"> <b>Duration</b></p> <p class="text-left"> One hour to half day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.</p> <br> <p class="text-left"><b>Delivery format of the training program</b></p> <p class="text-left"><b>a. In-House Instructor-Led Training program</b> - designed and tailored for persons working for a specific company or organization (Board members, executive management, risk managers and employees etc.). In all In-House Instructor-Led Training programs an instructor from Cyber Risk GmbH that is approved by the Client travels to the location chosen by the Client and leads the class according to the needs of the Client and the Contract.</p> <p class="text-left"><b>b. Online Live Training program</b> - synchronous (real time, not pre-recorded) training program that takes place in a live virtual meeting room using platforms like Zoom, Webex, Microsoft Teams etc. In all Online Live Training programs, instructors from Cyber Risk GmbH that are approved by the Client tailor the method of delivery (interactive, non-interactive, etc.) to the needs of the Client, lead the virtual class, and answer questions according to the needs of the Client and the Contract.</p> <p class="text-left"><b>c. Video-Recorded Training program</b> - professional, pre-recorded training program. Instructors from Cyber Risk GmbH that are approved by the Client tailor the training content according to the needs of the Client and the Contract, and they record the training content in a professional studio. The training material (including any subsequent updates) is licensed by Cyber Risk GmbH to the Client for training purposes. Clients can incorporate the recorded videos to their internal learning system. Video-Recorded Training programs include Orientation Video Training and Compliance Video Training programs. </p> <br> <p class="text-left"> <b>Instructor</b></p> <p class="text-left">Our instructors are professionals with extensive, real-world experience in their respective fields. They are equipped to deliver full-time, part-time, or short-form programs, all customized to suit your specific requirements. Beyond teaching, our instructors provide hands-on guidance, offering real-world insights that help bridge the gap between theory and practice. You will always be informed ahead of time about the instructor leading your program. </p> <br> <p class="text-left"><b>Terms and conditions</b></p> <p class="text-left"> You may visit: <a href="https://www.cyber-risk-gmbh.com/Terms.html" target="_blank">https://www.cyber-risk-gmbh.com/Terms.html</a> </p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> </div> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10