NERC CIP

  • CIP V5 Titles:
    • CIP V5 Base Training – Cyber Security
    • CIP V5 Information Handling
    • CIP V5 Electronic Access Controls
    • CIP V5 Physical Access Controls Including Visitor Management
    • CIP V5 Cyber Security Incidents, Response and Recovery
    • CIP V5 Condensed Responsive Course
    Cyber Security Micro Learning Titles:
    • Tailgating
    • Phishing
    • HTTPS
    • Spear Phishing
    • Email
    • Clean Desk
    • Handling Passwords
    • Pop Ups
    • Removable Media
    • Password Handling
    • Open WiFi
    • Printouts
    • Malicious Attachments
    • Spyware
    • Handling Confidential Material
    • Shoulder Surfing
    • USB Key Drop
    • Home WiFi
    • Computer Installs
    • Social Engineering
    • Chain Mail
    • Dumpster Diving
    • CEO Scam
    • Keylogger
    • Lock Your Phone
    • Privacy
    • Ransomware
    • Telephone Scams

    Quarterly Security Safety Awareness Poster

    Quarterly Security Awareness Newsletter

NERC CIP SECURITY E-LEARNING SERIES

The primary objective of this education series is to present contemporary security content in a new and exciting way. The courses provide an engaging learning experience that incorporates text, voice, video, animation, simulation, interactive sessions, testing and time-stamped reporting.

The NERC CIP Security E-Learning Series is a complete awareness and training program that promotes, maintains and reinforces critical security principles. The program incorporates not only training, but also a variety of other security awareness aides such as company branded posters and newsletters.

VERSION 5 – Keeping the training content updated and relevant is critical to the success of any CIP security program. The NERC CIP programs are now available in the new V5 format to meet new mandated compliance in the industry. Also available is a new condensed module covering all CIP requirements.

All courses can be easily customized to include your organization’s unique policies, processes and procedures. The customization process is as simple as entering your content into our PowerPoint template, then saving and sending it to us for integration into your course. Easily include graphics, links to your PDF’s, or intranet documents to present your procedures for compliance. Use as many slides as required. Customization is typically completed in a three to four day turn around time.

All courses can dynamically deliver training content based on an individual’s role, group or location. Courses can be delivered to address multiple processes for each CIP requirements at multiple sites. In addition, all courses will allow clients to tag their content pages based on whether the student needs to review the content according to their specific role requirements.

Courses can be hosted on our robust behavioral Learning Management System (LiMS) to manage your course curriculum or on your corporate LMS. Our LiMS features allow Assign, Manage, Track and Report course completions with time-stamped confidence. Administrators, Trainers and Managers can send out individual or group email reminders to employees on training. Training results can be easily exported to an Excel Spreadsheet. These courses will additionally capture ALL student interactions with each course and provide a full analysis of the training experience of each student AND the implied efficacy of the course in increasing the level of understanding and awareness of the course topics. Companies will have the ability to review individual performances and to identify the challenges and successes of students and courses. This will assist companies recognize which concepts may need to be addressed further and whether they may need to enhance their own content within the course. These metrics can provide real Business Intelligence to an organization to help them address cultural or compliance behaviors.

CIP V5 Courses Include:
  • Base Training – Cyber Security
  • Information Handling
  • Electronic Access Controls
  • Physical Access Controls (Includes Visitor Management)
  • Cyber Security Incidents, Response and Recovery
Features include:
  • Fully customizable to include your logo, policies, processes, procedures and links to internal and external documents
  • AICC, SCORM 1.2 and SCORM 2004 Compliant
  • Maintenance, Update and Support Program
  • Courses are hosted on our LiMS or self-hosted on your internal LMS
  • Customization support available
  • Time-stamped reporting
  • Deliver custom content to multiple sites, groups, individuals
  • Bookmarking
  • Printable pages for future reference
  • Interactive knowledge checks to reinforce presented content
  • Technical tips
  • Penalty level alerts
  • Customizable test questions
  • Printable Certificate of Course Completion
  • Full schematics provided for customization content
  • Role-based tagging capabilities
  • Training impact analysis capability to capture student training experience
  • Voice enabling or disabling feature
  • Capturing of multiple training experiences
  • Expanded administrator control for database changes
  • Capturing of students decision-making path
  • Student remediation and re-testing for topic retention

CIP V5 BASE TRAINING – CYBER SECURITY

Course Outline:
  • Cyber Security defined
  • The Risks and Rewards of Interconnectivity
  • “Entity” Policy Statement
  • Passive Access Points
  • Passwords
  • Internet Usage (Email Security; Social Media)
  • Smartphones
  • External Devices (Removable Media; Transient Devices; Cloud Storage)
  • Anti Virus
  • Event Handling
  • Assessment
  • Summary

CIP V5 INFORMATION HANDLING

Course Outline:
  • BES Cyber System Information (BESCSI)
  • “Entity” Policy Statement
  • Classification of BES Cyber System Information (BESCSI)
  • BESCSI vs Critical Energy Infrastructure Information (CEII)
  • Storage – Required Practices
  • In Transit – Required Practices (Transport; Transmission)
  • Active Use – Required Practices
  • Destruction – Required Practices
  • Redeployment– Required Practices
  • Event Handling & Logging
  • Assessment
  • Summary

CIP V5 ELECTRONIC ACCESS CONTROLS

Course Outline:
  • How is Electronic Access defined? (Onsite; Remote)
  • “Entity” Policy Statement
  • Access Rights Management (Granting Access; Monitoring Access Needs; Compliance)
  • Interactive Remote Access (Defined; Routable Protocols; Controls)
  • Access Authentication Failure (Access Denial; Access Suspension; Access Restoration; Access Revocation)
  • Policy Reviews & Change Management
  • Assessment
  • Summary

CIP V5 PHYSICAL ACCESS CONTROLS INCLUDING VISITOR MANAGEMENT

Course Outline:
  • How is Physical Access defined?
  • Who is covered? (Employees; Contractors; Vendors; Visitors)
  • “Entity” Policy Statement
  • Access Rights Management (Granting Access; Monitoring Access Needs; Compliance)
  • Secured Areas (Defined; Identified; Controls)
  • Access Authentication Failure (Access Denial; Access Suspension; Access Restoration; Access Revocation)
  • Policy Reviews & Change Management
  • Assessment
  • Summary

CIP V5 CYBER SECURITY INCIDENTS, RESPONSE AND RECOVERY

Course Outline:
  • Cyber vs. Physical (Internal; External)
  • “Entity” Policy Statement (Prevention; Monitoring; Minimization; Mitigation)
  • Incident Identification (Actual Vs Suspected; Vandalism; Willful Acts; Cybercrime)
  • Incident Classification (Response Plan and Process)
  • Reporting/Communication Requirements (Internal and External Resources)
  • Recovery Processes (Documentation; Review; Change Management; Validation)
  • Assessment
  • Summary

CIP V5 CONDENSED RESPONSIVE COURSE – COVERS ALL REQUIREMENTS

The new 45 minute CIP V5 condensed training course incorporates text, voice, video, animation, simulation, interactive sessions, testing and reporting features. The module can be hosted on your organization’s LMS or our robust LiMS.

Topics include:

  • Base Training – Cyber Security
  • Information Handling
  • Electronic Access Controls
  • Physical Access Controls (Includes Visitor Management)
  • Cyber Security Incidents, Response and Recovery

The course has been designed to effectively run on all devices including desktops, smart phones and tablets.

A Certificate of Course Completion is provided for each student.

CYBER SECURITY MICRO LEARNING TRAINING SERIES

The Cyber Security Micro Learning Series reinforces safe business practices. Each video-based course targets a unique cyber security topic and delivers important awareness concepts in just 60 seconds. Well-designed scenarios highlight the do’s and don’ts of security behaviors, leaving informative impressions that support safety in both physical and cyber security practices. Two questions are included with each course; scores and completion status recorded; and saved for Managers to access at any time.

The site’s functionality allows easy access to quality training. Anyone can purchase, assign and manage courses directly from a secure website. Companies do not need their own infrastructure or tech support.

Features:
  • Each title is approximately 60 seconds
  • Operates on all devices including smart phones, desktops, ipads
  • 2 question test
  • Certificate of Completion
  • Managers will be able to purchase, assign, monitor, track and report on all users
  • User completions captured (printable report 24/7)
  • If student does not pass course, the course can be reassigned by manager until the student receives passing score
  • Courses delivered on a secure, modern delivery system
Tailgating

Sometimes it’s respectful of others to not hold the door open for someone. Don’t circumvent security protocols – even for people you know.

Phishing

Every day 8 million people open a fraudulent phishing email, don‘t add to that number.

HTTPS

A website starting with HTTPS is encrypted and much safer than HTTP. Be sure to “look for the lock”.

Spear Phishing

Knowing about people’s interests and hobbies, knowing about these interests is valuable and that’s how cybercriminals get you.

Email

Some email can be more than inappropriate, they could help spread viruses to friends & family.

Clean Desk

Sometimes the person leaking confidential information often doesn‘t realise he‘s the source of the leak. Don’t leave confidential documents on your desk – store them appropriately.

Handling Passwords

Writing down your passwords and hiding them by your desk, maybe under the keyboard, ISN’T a secure process.

Pop Ups

The unwanted popup. You didn’t close it correctly…and now there’s more of them to deal with….oh boy…

Removable Media

USB drives are convenient…and small…and easy to lose…and hold more information than ever before.

Password Handling

To create a strong password it‘s best to use a combination of lowercase, uppercase letters, symbols and numbers.

Open WiFi

Sometime free doesn’t mean secure. Consider the potential problems when using open public wifi.

Printouts

Dispose your documents properly. That doesn’t mean simply tossing them into the recycle bin.

Malicious Attachments

All mail is not necessarily good mail. When you’re not expecting a package, double check with the sender.

Spyware

Today it’s relatively simple for the cybercriminal to see everything you do on your computer, work related and personal.

Handling Confidential Material

Using your personal email to transmit confidential work materials can unique create opportunities for cyber criminals.

Shoulder Surfing

That person standing over your shoulder seems a little too interested. Check your surroundings while typing in your password.

USB Key Drop

Finding a USB drive on the ground might not be an accident. Plugging it into your computer might give a hacker complete control.

Home WiFi

Make sure your home WiFi is at least as secure as the rest of your house. You don’t leave your doors and windows unlocked, do you?

Computer Installs

Work computers are loaned to us, and “personalizing them” by installing your own software may expose you to hacking.

Social Engineering

Sharing confidential information, even with people you know, is never a good idea.

Chain Mail

You not only waste people’s time when you forward chain mail, you could be spreading viruses as well.

Dumpster Diving

Some people make money rummaging through your trash. Don’t discard sensitive materials without considering potential problems.

CEO Scam

Always double check unusual requests from your boss, especially regarding financial transfers.

Keylogger

Check your computer ports for unknown devices. Keyloggers capture your keystrokes for cybercriminals to decipher later.

Lock Your Phone

Your smartphone is now an extension of you, your life, and possibly your business. Photos, email addresses, phone numbers, contacts, documents and physical addresses.

Privacy

When personal or business information is leaked, even if by accident, the repercussions may be severe. It is best to tell someone in authority as soon as possible.

Ransomware

Crypto ransomware is a malicious software that infects a computer and restricts your access to it until a ransom is paid to unlock it. Consider not becoming a victim.

Telephone Scams

If you get an unexpected pop-up, call, spam email or other urgent message about problems with your computer, stop. Don’t click on any links, don’t give control of your computer and don’t send any money.

NERC CIP SECURITY AWARENESS POSTER PROGRAM

The NERC CIP Security Awareness Poster Program provides an eye-catching communications solution to satisfy the requirements of the CIP-004 R1 Compliance Standard for utilities, municipalities and cooperatives. Each electronic poster contains security based topics informing employees on various elements of proper security practices to help increase awareness and adoption of compliance with current standards.
Our team works closely with your organization to customize each poster’s message to meet your specific requirements for your environment and culture.
Customized general Security Awareness Posters are also available for all other organizations.

Benefits
  • Consistent message delivery to all employees
  • Message accessible 24/7 via company intranet access
  • Visible message can be displayed in high traffic areas in any office or plant environment
  • Demonstrates commitment to security
  • Year round awareness
  • Eye catching to increase awareness and compliance with current standards
  • Uniform and efficient presentation
  • Helps increase widespread adoption of security practices within any organization
  • Base Training – Cyber Security
  • Information Handling
  • Electronic Access Controls
  • Physical Access Controls (Includes Visitor Management)
  • Cyber Security Incidents, Response and Recovery

NERC CIP SECURITY SAFETY AWARENESS NEWSLETTER PROGRAM

Each quarter a new DOWNLOADABLE Security Awareness Newsletter in PDF format is released. Each bulletin is branded with Customer company logo and is ready to print and distribute in any environment – electronically or in print format.

The NERC CIP Security Awareness Newsletter Program provides an eye-catching communications solution to satisfy the requirements of the CIP-004 R1 Compliance Standard for utilities, municipalities and cooperatives. Each electronic bulletin contains security based topics informing employees on various elements of proper security practices to help increase awareness and adoption of compliance with current standards.

Our team works closely with your organization to customize each newsletter’s message to meet your specific requirements and include a perfect fit for your environment and culture.

Customized general Security Awareness Newsletters are also available.

Features
  • Branded with company logo
  • Customizable to fit your environment and culture
  • Includes security based topics
  • Interesting and informative presentation
  • Full colour
  • High resolution
  • Alluring graphics
  • Downloadable as a PDF
  • Printable up to 11′ X 17″
  • Monthly and quarterly subscriptions available
Benefits
  • Consistent message delivery to all employees
  • Message accessible 24/7 through company intranet access
  • Visible message can be displayed in high traffic areas in any office or plant environment
  • Demonstrates commitment to security
  • Year round awareness
  • Eye catching to increase awareness and compliance with current standards
  • Uniform and efficient presentation
  • Helps increase widespread adoption of security practices within any organization

NERC CIP STANDARDS CLASSROOM TRAINING

Delivered on-site, a fully customized and comprehensive NERC CIP Standards Classroom Training Course, providing face-to-face instruction and support by our team of highly experienced Security Specialists. The comprehensive program covers all NERC CIP Standard requirementss. The NERC CIP Information Security E-learning Series can be effectively utilized to supplement the instructor-led training program to reinforce all concepts learned in the classroom. Course Completion Certificates are also included in the program.