The most crucial tasks to carry out in a powerful defense system against cyberattacks on an ITS are covered in this training course on cybersecurity monitoring, event management, and incident response in intelligent transportation systems. The cyberspace and everything it implies, including ITS, are no longer the same after the recent "supply chain attack" on cybersecurity firms in the USA like SolarWinds early in December 2020. The SolarWinds cybersecurity breach, which has shown that no system is secure regardless of how precisely it is designed, is maybe the biggest one to date. The enormity of this incident's scope, importance, and harm will probably only increase when more information about the breach comes to light.
Although the SolarWinds breach only impacted data confidentiality, it is just a matter of time before similar attacks also undermine other security features including application-related data integrity. It can have severe effects on the industry if data integrity related to any physical real-world functionality, like the ITS infrastructure, is compromised. Delegates taking this training session will have a thorough understanding of the essential actions needed to fulfill this general criterion in an ITS environment. Cybersecurity demands resilience in addition to robust defenses.