Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems
| Start Date | End Date | Venue | Fees (US $) | ||
|---|---|---|---|---|---|
| Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems | 12 Apr 2026 | 16 Apr 2026 | Kuala Lumpur, Malaysia | $ 4,500 | Register |
| Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems | 13 Sept 2026 | 17 Sept 2026 | Yanbu, KSA | $ 4,500 | Register |
| Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems | 06 Dec 2026 | 10 Dec 2026 | Dubai, UAE | $ 3,900 | Register |
Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems
| Start Date | End Date | Venue | Fees (US $) | |
|---|---|---|---|---|
| Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems | 12 Apr 2026 | 16 Apr 2026 | Kuala Lumpur, Malaysia | $ 4,500 |
| Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems | 13 Sept 2026 | 17 Sept 2026 | Yanbu, KSA | $ 4,500 |
| Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems | 06 Dec 2026 | 10 Dec 2026 | Dubai, UAE | $ 3,900 |
Introduction
This Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems training course cover the most important activities to be performed in a strong defense system against cyberattacks to an ITS. After the recent “supply chain attack” on cybersecurity companies in the USA such as Solar Winds early in December 2020, cyberspace and all it entails including ITS is no longer the same. The Solar Winds cybersecurity breach is perhaps the major one thus far and has demonstrated that no system, no matter how carefully designed, is secure. The scale, significance, and damage of this incident is huge and will likely grow as more details of the breach being discovered. Although the Solar Winds breach affected only the confidentiality of data, it is just a matter of time before other security properties such as application-related data integrity is also compromised by similar attacks. If data integrity related to any physical real-world functionality such as the ITS infrastructure is compromised this can lead to disastrous consequences in the industry. Cybersecurity requires resilience as well as strong defenses and delegates attending this training course will get a deep understanding of crucial steps to achieve such generic requirements in an ITS environment.
This training course will highlight:
- The ITS Environment and Architecture
- Role of Enterprises, IT, Infrastructure, Autonomous vehicles, Communications, and Data
- ITS Cybersecurity Threats, Vulnerabilities, Risk Assessment and Mitigation
- ITS information monitoring and Incident Response
- Most significant ITS and Cybersecurity Standards
- Current and Future Cybersecurity Practices
Objectives
- Understand the ITS environment and explain its architecture
- List and explain various ITS Cybersecurity Threats and Vulnerabilities
- Perform an ITS Cybersecurity Risk Assessment and develop mitigation strategies
- Develop an ITS monitoring and incident response plan
- List and analyze the most important current and future practices of strong defenses
- List and understand the most significant ITS and Cybersecurity Standards
By the end of this training course, participants will learn to:
Training Methodology
Participants to this training course will receive thorough training using several techniques that include coverage of material, discussions, breakout exercises, videos, and tests. The hands-on breakout exercises will be performed in groups and will enable participants to apply the material to real-world scenarios with active discussions with other members of the group. Pre-tests and post-tests will measure what was learned in this training course. The online course is conducted online using MS-Teams/ClickMeeting.
Who Should Attend?
This training course is designed for all the people involved in operations, software, services, mobility ITS infrastructure, traffic and transport planning and organization, IT experts, as well as researchers and consultants involved in cybersecurity, management, big data, communications, project management, and intelligent transport mobility.
This training course is suitable for a wide range of professionals but will greatly benefit:
- IT and Cybersecurity Professionals
- Operators and Professionals of Transport Systems
- City governments Involved in Transport Systems
- Enterprises involved in the design of Transport Systems
- Project Managers
- Technology Engineers, Chief Technology Officers (CTOs), and Chief Information Officers (CIOs)
- Strategic Development Personnel
- Transport Operators, Engineers, Managers, and Researchers
- ITS and Cybersecurity Industry Consultants
Course Outline
Day 1: Cybersecurity & the Intelligent Transportation (ITS) System Environment
- How cyber-attacks happen
- Industries affected
- The Intelligent Transportation System (ITS) Environment
- Role of Autonomous vehicles
- ITS Architecture
- New mobility platforms
- A Need to Secure ITS
Day 2: ITS models, Infrastructure, Cybersecurity Threats & Vulnerabilities
- Overview of Cybersecurity
- ITS Models: Operators
ITS systems and infrastructure - Communication systems, wired, wireless
- Data management, sharing, and governance
- Threats & vulnerabilities in ITS
Day 3: ITS Cybersecurity Risk Assessment and Mitigation
- Cybersecurity Risk assessment in ITS
- Cybersecurity challenges
- Approaches in ITS cybersecurity
- Cybersecurity protection frameworks: NIST and others
- Cybersecurity Controls
Day 4: ITS Monitoring and Incident Response
- Penetration Testing for ITS
- Cybersecurity Monitoring
- Event Management
- Incident Response
- Best practices for first responders
Day 5: ITS & Cybersecurity Standards – Current and Future Practices
- ITS & Cybersecurity Standards
- Good Practices
- Gap Analysis
- Plan of action
- Innovative approaches: AI, blockchain

