Missed a CONNECT module? Watch it on-demand!
Recordings of previous CONNECT modules are available below, complimentary for our customers. These streaming videos are approximately 45 minutes long. Use the form below the course you're interested in and a link will be emailed to you.
Available Cybersecurity Modules
- NEW - Patching for Industrial Control Systems
- RFL CONNECT Vulnerability Assessments in Electric Power Utilities
- Transient Cyber Assets (TCAs) & Removable Media
- Supply Chain Risk Management: Vendor Risk Evaluations (CIP-013)
- Access Management (2016)
- Access Management Part One
- Access Management Part Two
- Baseline Configurations
- BES Cyber Assets
- Bright Lines and System Categorization Part 1
- Bright Lines and System Categorization Part 2
- BES Cyber Assets
- Communication Network Part One
- Communication Network Part Two
- Compliance Management
- Cyber Security Governance Structures
- Cyber Security Introductory Concepts
- Cyber Security Supply Chain Risk
- Defense in Depth
- Documentation and Evidence of Compliance/NERC CIP
- ESPs and PSPs Part One
- ESPs and PSPs Part Two
- Firmware Update Management
- Implementation of NERC CIP V5
- Information Protection "201": Parts 1 and 2
- Information Protection Process (IPP)
- Interactive Remote Access
- Introduction to NERC CIP
- NERC CIP Overview
- NERC CIP V6 Major Changes
- Risk-Based Approach to Cyber Security
- Supply Chain Security
- Supply Chain Security Update
- Supply Chain Management: Parts 1 and 2
- The Future of Network Reliability Through Security Controls
- NEW - Vulnerability Assessments and Operational Technology
- Vulnerability Assessments for Protective Equipment
Looking for more courses? Use the menu to the left to browse courses on other topics.
RFL CONNECT Vulnerability Assessments in Electric Power Utilities
June 24, 2021
Who should attend: Compliance, engineering, IT and security personnel involved in performing vulnerability assessments.
How you will benefit: Learn about differences between vulnerability assessments in business networks and real time operating systems
RFL CONNECT Patching for Industrial Control Systems
June 23, 2022
Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers.
How you will benefit: You will learn the key activities and importance of a patching program for industrial control system components.
Transient Cyber Assets (TCAs) & Removable Media
May 20, 2021, presented by Karl Perman
Who should attend: Compliance, engineering, IT and other security personnel involved with TCAs and RM.
How you will benefit: Attendees will learn about strategies to manage and track TCAs and RM.
Supply Chain Risk Management: Vendor Risk Evaluations (CIP-013)
April 22, 2021, presented by Brian Dob -->
Who should attend: Compliance, security, procurement, IT, engineering and others involved in supply chain risk evaluations.
How you will benefit: Attendees will learn about the components of vendor risk evaluations and coordination of risk evaluations between vendors and regulated entities.
Access Management (2016)
June 22, 2016
This module will focus on methods of access management for protection control devices. You will learn concepts associated with access management for protection control devices. The lessons learned should benefit in your daily work related to NERC CIP.
Note: This module is available as an online stream instead as a download.
Access Management Part One
April 2, 2015
This module focuses on how to establish an effective electronic access management program.
Access Management Part Two
April 16, 2015
This module dives deeper into the types of devices that can be used to establish an effective electronic access management program.
Baseline Configurations
May 18, 2016
This module will focus on the specific device characteristics that make up baseline configurations for NERC CIP. You will learn what constitutes baseline configurations from a NERC CIP perspective. The lessons learned should benefit in your daily work related to NERC CIP.
Note: This module is available as an online stream instead as a download.
BES Cyber Assets
June 14, 2018, presented by Karl Perman
This module will focus on the identification of BES Cyber Assets including the definition of BES Cyber Assets Program.
Who should attend: Individuals with a role in NERC CIP such as compliance, security, and engineers.
How you will benefit:You will learn about NERC CIP-002 and how to identify a BES Cyber Asset.
Module 6: Bright Lines and System Categorization Part 1
Download
Module 7: Bright Lines and System Categorization Part 2
Download
Module 8: Communication Networks Part One
Download
Communication Network Part Two
February 19, 2015
This module provides an overview of gateway devices used in the electric power industry for remote access management and other services.
Compliance Management
May 3, 2017, presented by Karl Perman
This module will focus on compliance management and the implementation of a process driven compliance program.
Who should attend: Individuals with a cybersecurity role such as security analysts, systems analysts, engineers and NERC CIP compliance practitioners.
How you will benefit: You will learn what constitutes compliance management from a NERC CIP perspective and how to develop a process-centric approach.
Cyber Security Governance Structures
April 30, 2015
This module presents two different structures that can establish a governance structure for the Cyber Security function.
Cyber Security Introductory Concepts
November 13, 2014
This module will provide an overview of the Introductory concepts associate with Cyber Security in the Electric Power Industry such as firewalls, vulnerability assessments, ports and services management, patch managemen, security event incident management and incident recovery.
Download this Module
Cyber Security Supply Chain Risk
October 29, 2020
Learn about impacts on regulated entities and vendors that supply systems and services to the electric power industry.
Download this Module
Defense in Depth
December 11, 2014
This module reveals the basic concepts of a defense in depth methodology for the protection of operational technology.
Module 5: Documentation and Evidence of Compliance/NERC CIP
Download
ESPs and PSPs Part One
March 5, 2015
This module introduces electronic security perimeters and physical security perimeters, including types of devise typically included in these perimeters and how to define these perimeters.
ESPs and PSPs Part Two
March 26, 2015
This module provides additional details pertaining to electronic security perimeters and physical security perimeters that were introduced in Part One.
Firmware Update Management
May 3, 2018, presented by Karl Perman
This module will focus the key activities and business reasons for having a documented firmware update management program.
Who should attend: Individuals with a role in NERC CIP such as compliance, security, and engineers.
How you will benefit: You will learn about the benefits of having a firmware update management program.
Information Protection "201"
Part 1: April 12, 2017; and Part 2: May 18, 2017, presented by Karl Perman
These modules focus on the NERC CIP-011 including the definition of BES Cyber System Information and the contents of an Information Protection Program, and on how CIP-011 and information protection affects vendors performing work for regulated entities.
Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers. This course is also for individuals who would like an understanding of information protection.
How you will benefit: You will learn about NERC CIP-011 and how to develop an Information Protection Program, and about what constitutes BES Cyber System Information and how the protection of this information will affect those working for a regulated entity as well as vendors.
Information Protection Process (IPP)
April 8, 2016
This module will focus on the safe handling of customer information. This course is for individuals new to NERC CIP.
Note: This module is available as an online stream instead as a download.
Introduction to NERC CIP
October 22, 2014
This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 Program.
Download this Module
Interactive Remote Access
November 19, 2020
You will learn about the risks associated with remote access, access management methods and NERC CIP considerations.
Download this Module
Implementation of NERC CIP V5
October 23, 2014
This module provides an overview of a strategy for the successful implementation of a NERC CIP V5 program.
Download this Module
NERC CIP Overview
March 2, 2016
The fundamentals for understanding basic terminology and concepts presented for those new to NERC CIP. This course is geared towards beginners and is the place to start.
Note: This module is available as an online stream instead as a download.
NERC CIP V6 Major Changes
April 14, 2016
This module will provide an overview of the major NERC CIP V6 changes going forward. The lessons learned should benefit in your planning related to NERC CIP.
Note: This module is available as an online stream instead as a download.
Risk-Based Approach to Cyber Security
June 27, 2019, presented by Karl Perman
This module will focus on having a risk-based approach to cyber security including sample methodology and purpose.
Who should attend: Individuals with a role in cybersecurity or NERC CIP such as compliance, security and engineers.
How you will benefit: You will learn about the purpose of having a risk-based approach to cybersecurity.
Supply Chain Security
March 22, 2018, presented by Karl Perman
This course provides an overview of new (CIP-013) supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.
Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about the new requirements for those involved in the supply chain of critical systems to the electric power industry.
Supply Chain Security Update
April 11, 2019, presented by Karl Perman
Update on the new (CIP-013) supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.
Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about the new requirements for those involved in the supply chain of critical systems to the electric power industry.
Supply Chain Management: Parts 1 and 2
Part 1: March 15, 2017, presented by Karl Perman
Overview of discussions and proposed new supply chain security requirements for regulated entities and the impact on vendors involved in the supply chain.
Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about the proposed new requirements for those involved in the supply chain of critical systems to the electric power industry.
and
Part 2: March 29, 2017, presented by Karl Perman
This module will focus on terms and conditions and training for vendors involved in the supply chain.
Who should attend: Individuals with a role in NERC CIP such as compliance, security, engineers and supply chain professionals.
How you will benefit: You will learn about terms and conditions and training as part of supply chain security.
The Future of Network Reliability Through Security Controls
October 20, 2020
UTC Version.
Vulnerability Assessments and Operational Technology
January 28, 2021
Who should attend: Individuals with a role in utility operations, engineering, maintenance, OT instrumentation or NERC compliance.
How you will benefit: You will learn about the potential impacts of running a vulnerability assessment on operational technology, considerations and an overview of NERC CIP requirements.
Vulnerability Assessments for Protective Equipment
May 2, 2019, presented by Karl Perman
This module will focus on the key activities and purposes of having a vulnerability assessment program for protective equipment.
Who should attend: Individuals with a role in NERC CIP such as compliance, security and engineers.
How you will benefit: You will learn about the benefits of having a vulnerability assessment program.
Download CONNECT Archives
Please fill out the form below to request archives of previous CONNECT modules. You will receive an email with download links for the modules you select.