Powered by

about this training

The rise of digitalization has led to more interconnected rail systems. While this has propelled our trains and metros forward at some seriously high speed, it has also dramatically expanded the threat landscape.

During this training, you will encounter with the private world of railroad systems and technologies. You will learn about the essential functions of a modern railroad network and network architecture considerations. From there, we will wear our red hat and look at that from the attacker’s point of view: attack vectors, low-hanging fruits, attractive targets, and possible damage. In the end, you will understand the railroad cybersecurity risks along with the perspective of the railroad operations’ unusual challenges.

Our world is adopting new railroad technologies and services to offer a better, faster, easier, and more connected transport experience. It is our duty to keep those services and infrastructure safe and secure for all the passengers, but also keep those available for a stable economy and proper way of life.

Key Takeaways

  • What are the cybersecurity challenges of the railroad industry?
  • How does the railroad systems environment look?
  • Introduction to major railroad technologies (CBTC, ERTMS, PTC…)
  • What is the typical architecture of a railroad network?
  • Attack vectors on a railroad network
  • Attack scenarios on a railroad network
  • Railroad operational culture and constraints that impact cybersecurity
  • What are the best practices for cybersecurity approach?

who should attend

Cybersecurity professionals who want to expand their knowledge to a less known ICS world with special cybersecurity needs and considerations.

Railroad professionals who want to dive into the cybersecurity dimension of their environment.

Attendees should have a basic understanding of the cybersecurity terminology and the cyber kill chain basic phases.

To attend this training you'll need a Hack The Railroad Conference & Training Pass