Cybersecurity

Lead SCADA Security Manager

This four-day training develops the capability to assess risk in SCADA and broader Industrial Control Systems (ICS) environments and translate that risk into a practical protection program.

4 daysExam includedPhysical classroomOnline classroomSelf-study
2,500+ professionals trained100 % pass rate120+ countries600+ organisations
Confirmed
PECB
Available year-round
Language
EN
Format
Self-study
Self-study
  • Lifetime access to official PECB training course material (PDF)
  • Official PECB online certification exam
  • Official PECB certification
  • One free retake exam
No date works for you?
Request a private or flexible session

Key takeaways

Explain how SCADA/ICS security priorities differ from traditional IT security
Structure a SCADA security program with clear scope, governance, and risk ownership
Design segmentation and defensive architecture patterns that fit OT constraints
Operationalize incident management and link it to business continuity objectives
Run a testing approach that is safe for production ICS and produces actionable outcomes

Your trainer for this course

Alexis HIRSCHHORN
Alexis HIRSCHHORN

ISO 22301 Lead Implementer · ISO 27001 Lead Implementer · CISSP® Exam Bootcamp · CISM® Exam Bootcamp · ISO 27701 Lead Auditor

Expert in Information and Cyber Security, Cloud Security, Risk Management and Governance Consulting for large multinational corporations, government entities and international organizations Management Systems Certified Lead Auditor

25 years of hands-on experience in information security, cloud cybersecurity, and AI governance. Advisory work with major multinationals, government bodies, and international organizations across multiple countries. Certified ISO 42001 Lead Implementer, CAIP, CISSP®, CISM®, CISA®, and PECB Certifying Auditor. PECB Certified Trainer.
100+ISO 27001 implementations
200+Organisations audited
25+Years of experience
12Certifications
Meet all our trainers →
PECB
Lead SCADA Security Manager · Titanium Partnerhighest PECB accreditation levelTitanium Partner

Page contents

Course Description

Industrial control systems now operate in an environment of persistent cyber risk, regulatory scrutiny, and increasing operational complexity. Once isolated, SCADA environments are today interconnected with corporate IT, third party vendors, and remote access solutions. This convergence has fundamentally changed the threat landscape. Attacks on ICS environments now target availability, safety, and physical processes, not just data.

This training addresses the real challenge faced by professionals responsible for securing SCADA systems: how to design and manage security without compromising operational continuity. Participants work through the full lifecycle of a SCADA security program, from understanding system characteristics and threats to designing governance structures, secure architectures, and control frameworks aligned with NIST SP 800-82.

Rather than focusing on abstract controls, the course emphasizes decision making in industrial contexts. Participants analyze how risks differ across PLCs, DCS environments, and supervisory systems, and how management, operational, and technical controls interact in practice. Network segmentation, defense in depth, and resilience engineering are addressed as design problems, not checklist items.

Abilene Academy delivers this course through practitioner led instruction, grounded in real industrial environments. Security testing, incident handling, and business continuity integration are approached from a governance perspective, enabling participants to oversee complex security activities without introducing operational instability.

By the end of the training, participants are prepared to lead SCADA security programs that balance security, safety, and availability in high consequence environments.

    • Understand and explain the purpose and risks to SCADA systems, Distributed Control Systems and Programmable Logic Controllers;
    • Understand the risks faced by these environments and the appropriate approaches to manage such risks;
    • Develop the expertise to support a pro-active SCADA Security program, including policies and vulnerability management;
    • Define and design network architecture incorporating defense in advanced security controls for SCADA;
    • Explain the relationship between management, operational and technical controls in a SCADA Security program;
    • Improve the ability to design resilient and high availability SCADA systems;
    • Learn how to manage a program of effective security testing activities.

Professional Testimonials

Had a great experience learning with Abilene Academy, it has been an extremely long time since I have attended an external formal training outside of the business organization I work in. I found this training to be truly beneficial for me to attend. the overall delivery of the course by Henri was superb, he kept us well engage despite having half of the room online and half face to face. The communication from the advisors from the initial enquiry regrading the course up until now has also been great! definitely recommending to my colleagues. Thank you!
TG

Tracey Gillett

Crisis and Operations Management

TUI
Henri and Alexis conducted a focused, intensive four-day ISO/IEC 27001 Lead Implementer Course of immediate relevance to The Global Fund. Participants representing both IT and Risk are now better prepared to design and operationise a corporate ISMS.
AT

Andreas Tamberg

Senior advisors enterprise risk management

The Global Fund
Another stellar training course run by Abilene, thank you for the outstanding organization and logistics. The PECB training material is very rich, well presented with clear explanations and notes.
SB

Simon Baynes

BCMS Manager

MSC MEDITERRANEAN SHIPPING COMPANY SA

Frequently Asked Questions

How is SCADA/ICS security different from traditional IT security?

SCADA/ICS security prioritizes safety and availability under operational constraints, so controls must be engineered to avoid disrupting physical processes.

In SCADA/ICS, security must be compatible with safe and continuous operations.

Christophe MAZZOLA

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

SCADAICSOT securityavailability

How do you scope a SCADA security program without disrupting operations?

Scope the program around critical functions, the most exposed access paths, and the changes that are safe to implement within OT operational constraints.

A SCADA program succeeds when scope matches operational reality.

Ramesh PAVADEPOULLE

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

program scopeSCADA security programgovernanceOT operations

Which SCADA network controls usually reduce risk the fastest?

Risk often drops fastest by tightening remote access, improving segmentation, and controlling pathways to engineering and administrative functions.

In SCADA, controlling pathways often matters more than adding tools.

Christophe MAZZOLA

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

network securitysegmentationremote accessSCADA architecture

How should security testing be performed in SCADA/ICS environments?

SCADA/ICS testing must be planned to avoid operational impact, using controlled methods, clear authorization, and safe scoping before any intrusive activity.

In SCADA, a good test is one that improves security without creating outages.

Christophe MAZZOLA

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

security testingpenetration testingICS safetyOT change windows

Who benefits most from this course, and who may not be a good fit?

It best fits professionals who influence SCADA/ICS risk decisions, architecture, or operations, while those seeking purely software-focused security skills may need a different path.

SCADA security is most effective when security and operations share a common model of risk.

Tania POSTIL

ISO 27001 Lead Implementer • Lead Cybersecurity Manager

target audiencerole fitSCADA engineersrisk managers

Last updated:

Train with practitioners. Pass with confidence.

Abilene Academy is the only PECB Titanium Partner in Switzerland — the highest accreditation tier in the industry — delivering certified training in information security, data protection, AI governance, and GRC compliance. 99% exam pass rate. 2,500+ professionals trained across 120+ countries and trusted by 600+ organizations. Multilingual programmes available.

99%
Exam pass rate
2,500+
Professionals trained
120+
Countries reached
Titanium
The only PECB Titanium Partner in Switzerland
Certification included
Multilingual
EN · FR · ES · DE · IT and more

Trusted by 600+ organisations in 120 countries

  • Airbus logoAirbus
  • Altis logoAltis
  • BCEAO logoBCEAO
  • BCV logoBCV
  • Cargolux logoCargolux
  • Cartier logoCartier
  • Cofco Intl logoCofco Intl
  • Confédération SuisseConfédération Suisse
  • Council of Europe logoCouncil of Europe
  • Dell logoDell
  • Deloitte logoDeloitte
  • Devillard logoDevillard
  • Ebay logoEbay
  • Engie logoEngie
  • Etat de Fribourg logoEtat de Fribourg
  • Etihad Airways logoEtihad Airways
  • Eumetsat logoEumetsat
  • EY logoEY
  • Framatome logoFramatome
  • G42 logoG42
  • Gavi logoGavi
  • Republique et canton de Genève logoRepublique et canton de Genève
  • Groupe Mutuel logoGroupe Mutuel
  • HSBC logoHSBC
  • International atomic energy agency logoIAEA
  • IATA logoIATA
  • IBM logoIBM
  • international Labour organization logoILO
  • IMD logoIMD
  • KPMG logoKPMG
  • Kudelski Security logoKudelski Security
  • Loterie Romande logoLoterie Romande
  • MSC logoMSC
  • Nagra logoNagra
  • nespresso logoNespresso
  • Nestlé logoNestlé
  • Novartis logoNovartis
  • Payot SA logoPayot SA
  • Philips logoPhilips
  • PSA PanamaPSA Panama
  • PWC logoPWC
  • Richemont logoRichemont
  • Roche logoRoche
  • RTS Radio Télévision SuisseRTS
  • Santander logoSantander
  • SAP logoSAP
  • https://www.skyguide.ch/Skyguide
  • Société Générale logoSociete Generale
  • Swisscom logoSwisscom
  • SyzSyz
  • The Global fund logoThe Global fund
  • UNGSC logoUNGSC
  • International computing center logoUNICC

We use cookies to improve your experience

Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.