Practical Cybersecurity Training Class
Your OT Network Is Already Compromised. You Just Don’t Know It Yet.
76% of manufacturing facilities have at least one internet-connected OT device they don’t know about. Each one is a potential entry point for ransomware, nation-state actors or industrial sabotage.
IEC 62443 compliance deadlines are tightening. CISA incident reporting is mandatory. And your plant is still running legacy systems with known vulnerabilities.
The question isn’t “if” you’ll get attacked. It’s whether you’ll be ready when it happens.
CLASS DESCRIPTION
“A Practical Approach To Industrial Cybersecurity In The Real World” is a two half-day, hands-on class for factory-floor doers (not ivory-tower theorists). The “standards” like ISA/IEC 62443 tell you what to do. This class shows you how to actually do it.
You’ll learn to use the SECURE Method™—Segment, Establish, Control, Update, Respond, Evaluate—to bridge the gap between theory and the factory floor. You’ll walk away with practical moves your team can roll out the next day.
Location:
Virtual
Dates:
Dec. 3 & 10, 2025
Duration:
Two four hour sessions
Cost:
$995
Prerequisites:
2-3 years of factory floor operations
Basic understanding of Ethernet networking
No cybersecurity background is required
This training is designed for plant managers, operations engineers, maintenance supervisors, and anyone responsible for keeping production running who needs to understand how to secure their OT environment without becoming a cybersecurity expert.
AGENDA TOPICS / WHAT YOU’LL LEARN
IEC 62443 Security Zones and Conduits
- A step-by-step process for identifying and grouping assets into logical security zones
- How to recognize and classify conduits for secure inter-zone communication
- Practical methods to catalog and organize assets using Security Level Targets (SL-T)
Role Based Access Control
- Key differences between traditional physical controls and modern RBAC in OT
- How to align access rights with job roles and operational workflows
- Configuring role policies that both protect critical assets and simplify daily tasks
Balancing Security and Daily Production Operations
- Five field-tested techniques for adding strong protections without impacting uptime
- How to apply a simple but powerful OT-specific risk ranking system
- Practical tips for integrating cybersecurity into shift routines and maintenance windows
OT-Patch Management
- Why IT patching strategies fail in OT environments
- Safe patch testing and rollback procedures to avoid outages
- Creating a Management of Change (MOC) checklist to govern updates
Incident Response Plans
- How to build an effective OT Incident Response Playbook tailored to plant operations
- Defining roles, triggers, and escalation paths for cyber incidents
- Lessons learned from real industrial incident case studies
Data Diodes for One-Way Communication Conduits
- What data diodes are, and how they differ from firewalls or proxies
- Where and when to deploy data diodes for maximum impact
- Integrating diodes into your overall defense-in-depth strategy
Proper Network DMZ Configuration
- How to configure a DMZ that connects enterprise systems without exposing the plant
- Recognizing common misconfigurations that attackers exploit
- Designing a DMZ architecture that scales as your digitalization efforts grow
Wrap-up: Student Self-Evaluation
- Mapping three selected controls to the correct IEC 62443 security levels
- Completing a short course quiz to lock in knowledge
- Finalizing an individual action plan rubric: “What I will implement in my plant within 30 days”
- Guided reflection: where you are now vs. where you need to be
WHAT YOU’LL WALK AWAY WITH
The River Risk Partners SECURE Method: Battle-Tested Across 200+ Industrial Sites
- The SECURE Method Workbook: Complete implementation guide with checklists and templates for each step of the framework (Segment, Establish, Control, Update, Respond, Evaluate). This is River’s published framework for practical IEC 62443 implementation, proven across mining, energy, water/wastewater, and manufacturing environments.
- Zone & Conduit Diagram Template: Repeatable network segmentation you can deploy across multiple sites without vendor lock-in
- Service Level Agreement (SLA) Template: Stop the finger-pointing between OT, IT, and vendors with clear security expectations and response requirements
- Data Exchange Agreement Template: Document and control OT-IT-third party data flows (critical for compliance audits and cyber insurance)
- Incident Response Playbook Template: So you’re not figuring out your response plan at 3AM during an active attack
- Compliance Documentation Package: Templates aligned with IEC 62443, NIST CSF, and NERC CIP frameworks—the paper trail auditors demand
Manufacturing organizations are under attack, and the numbers prove it. Ransomware attacks on OT environments are up 300% in the last 24 months. Average downtime cost: $260,000 per hour for mid-size plants. Nation-state actors are pre-positioning in U.S. critical infrastructure right now.
The real problem? You know what you’re supposed to do: segment your network, implement defense-in-depth, follow IEC 62443, maintain asset inventories. But nobody tells you HOW.
The standards are hundreds of pages long. Your IT team doesn’t understand OT protocols. Vendors want $500K+ for “comprehensive solutions” your budget won’t cover. Your plant manager just wants production to keep running.
And when something goes wrong, you’re the one who gets blamed.
Plants struggle with limited network visibility, compliance with IEC 62443 and NERC CIP, and new reporting mandates from agencies like CISA. Even when teams understand the standards, turning them into action on the factory floor—without shutting down production—is the challenge no one addresses.
That’s the gap this training fills.
That’s where River “Riverman” Caudle comes in. As CSO of River Risk Partners, he brings decades of OT networking and industrial cybersecurity experience. His approach combines hands-on plant-floor knowledge with strategic threat modeling to help organizations protect operations from both cyberattacks and costly downtime.
Riverman isn’t a theorist. He’s been on the receiving end of the 3AM emergency call, and he knows what works. His focus is simple: practical, immediately deployable strategies that keep production running.
CLASS AGENDA
Day 1
9:00 AM: Introduction: Beyond the Standard. Why a practical framework is necessary and an overview of the SECURE Method.
9:30 AM: Module 1: (S) Segment & (E) Establish. A hands-on demonstration of how to create functional zones and set realistic Security Levels (SLs).
10:30 AM: Module 2: (C) Control Access. A practical guide to implementing physical and role-based access control that operations teams will actually follow.
Day 2
9:00 AM: Module 3: (U) Update Responsibly. How to build a risk-based patch management program that won’t break production.
10:00 AM: Module 4: (R) Respond & (E) Evaluate. Developing an OT-specific incident response plan and building a cycle of continuous improvement.
11:30 AM: Building Your Action Plan. A guided session where each attendee uses the SECURE framework to defines and identifies three specific implementation tasks for their own plant.
12:30 PM: Wrap-up, Q&A, and Next Steps.
EXCLUSIVE BONUS (Worth $1,200):
One-Hour Private Consultation with Riverman on YOUR specific plant environment. Walk through your current architecture, identify your top three vulnerabilities and receive a written security assessment report with a personalized action plan for your facility.
This isn’t generic advice. It’s the same site-specific analysis River Risk Partners provides to select consulting clients, included with your training.
YOUR INSTRUCTORS
Why River Caudle?
As Chief Strategy Officer of River Risk Partners, River guides operational sovereignty for critical industrial infrastructure. But he’s not a consultant who learned OT security from a textbook.
River’s track record:
- 20+ years in networking and IT, with 17+ years architecting industrial network infrastructure for control systems in extreme environments
- 200+ site deployments across mining, oil & gas, water/wastewater, and power generation
- Built the world’s largest cloud-connected industrial network: 4,500 field devices across 200+ remote sites in 14 states
- Deployed networks operating in conditions from -40°C to +40°C across 7 countries
- Worked with municipalities and companies large and small worldwide, from Fortune 500 manufacturers to critical municipal infrastructure
- Proven frameworks: Creator of the SECURE Framework for practical IEC 62443 implementation
- Trusted by 3,000+ OT professionals who follow his insights on LinkedIn
River isn’t a theorist. He’s been on the receiving end of the 3AM emergency call when SCADA goes down in a remote mining site or a pipeline control system loses connectivity. His approach combines hands-on field deployment experience with strategic network architecture developed at River Risk Partners: the same methodology used by critical infrastructure leaders to build resilient, defensible OT environments.
His focus is simple: practical, immediately deployable strategies that keep production running while actually securing your infrastructure.
John Rinaldi
John Rinaldi is Chief Strategist, Business Development Manager and CEO of Real Time Automation (RTA). After escaping from Marquette University with a degree in Electrical Engineering, John worked in various jobs in the Automation Industry before once again fleeing back into the comfortable halls of academia. At the University of Connecticut, he once again talked his way into a degree, this time in Computer Science (MS CS). John is a recognized expert in industrial networks and the author of six books: Modbus: The Everyman’s Guide to Modbus, OPC UA – Unified Architecture: The Everyman’s Guide to OPC UA, EtherNet/IP: The Everyman’s Guide to EtherNet/IP, The Smart Product Manager’s Guide to Industrial Automation Connectivity, The Smart Product Manager’s Guide to Connectivity in the Packaging Industry, and his latest, The Everyman’s Guide to Properly Architecting EtherNet/IP Networks.
Interview With the Trainers
In this video, you’ll meet the expert trainers behind the class. They share their backgrounds, why this class is important and what you will learn. Whether you’re curious about the “why” behind the class or want to hear directly from the faces leading it, this interview gives you an inside look.
Think You’re Cyber-Smart? Prove It.
Cybersecurity isn’t just theory—it’s practice. Before you join the class, put your knowledge to the test with our quick interactive quiz.
- See how your skills stack up against real-world threats
- Get instant feedback on what you know (and what you don’t)
- Discover why hands-on training is critical for protecting your systems
Do you have what it takes to ace it? Test your Cybersecurity Knowledge Now!
WHY THIS TRAINING IS DIFFERENT
This Training Is Built for Reality, Not Compliance Theater
No Ivory Tower Theory Every strategy has been tested across 200+ industrial sites in extreme environments. River has deployed networks in -40°C Canadian mines and +40°C remote oil fields. He’s been the guy getting the 3AM call when SCADA goes down 500 miles from the nearest technician.
Proven at Unprecedented Scale River built and maintained the world’s largest cloud-connected industrial network: 4,500 devices across 200+ remote sites. His 10-hour-per-week maintenance model for that massive infrastructure proves the frameworks work at enterprise scale.
Works With Legacy Systems You’re not ripping out PLCs from 1997. You’re securing them where they sit. Learn air-gap alternatives, protocol-level monitoring, and compensating controls that River has implemented across mining, energy, and water systems where replacement isn’t an option.
Compliance-Ready Documentation IEC 62443, NIST CSF, NERC CIP. Whatever framework you’re being audited against, you’ll have the documentation trail to prove your due diligence. River has navigated these compliance requirements for organizations without dedicated security budgets.
Immediately Implementable Monday morning, you can start segmenting your network. No waiting for capital approval, no vendor dependencies, no executive buy-in required to take the first steps. River empowered 120+ field technicians to troubleshoot their own connectivity using these same principles.
Published, Proven Frameworks The SECURE Method isn’t theory. It’s River’s published framework for practical IEC 62443 implementation, refined across critical infrastructure deployments in mining, oil & gas, water/wastewater, and power generation.
Trusted by OT Professionals Who Need Real Solutions
“Secure your OT infrastructure before adversaries do it for you.”
– River “Riverman” Caudle, CSO, River Risk Partners
15,000+ OT security professionals follow Riverman’s insights on industrial cybersecurity.
River Risk Partners is trusted by critical infrastructure leaders across industries, from manufacturing and energy to process industries and transportation. This training brings their select-engagement methodology to teams who need to implement security without $100K+ consulting budgets.
Limited Availability – Next Cohort
Next Training: December 3 & 10, 2025 (Two 4-hour virtual sessions)
Registration Closes: November 26, 2025
Class Size: Limited to 15 participants for personalized attention
Investment: $995
Includes: Complete SECURE Method implementation kit + 1-hour private consultation + written security assessment ($1,200 value)
30-Day Money-Back Guarantee: If you don’t walk away with actionable improvements to your security posture, full refund. No questions asked.
FREQUENTLY ASKED QUESTIONS
Is this training specific to certain industries?
The SECURE Method works across all OT environments—manufacturing, water treatment, energy, pharmaceuticals, food & beverage. The principles of segmentation, access control, and incident response apply universally. Examples cover multiple sectors.
I’m not technical. Is this over my head?
No cybersecurity background is required. If you have 2-3 years of factory floor operations experience and understand basic Ethernet networking, you can implement this framework. River translates technical concepts into operational language. Plant managers, operations engineers, and maintenance supervisors successfully complete this training.
Will this actually help with compliance audits?
Yes. The templates include documentation required for IEC 62443, NIST CSF, and NERC CIP frameworks. You’ll have the paper trail auditors ask for: network diagrams, risk assessments, SLAs, and incident response procedures.
How much time will implementation take?
Initial segmentation can be done in weeks. Full SECURE Method implementation typically takes 3-6 months depending on your environment’s complexity. The training gives you the roadmap; you control the pace of deployment.
What if my executive team won’t approve budget for tools?
Much of the SECURE Method uses existing infrastructure more effectively. You’ll learn free/low-cost monitoring approaches, how to leverage existing firewalls for segmentation, and how to build business cases for critical investments when you do need budget approval.
How is this different from other cybersecurity training?
This isn’t certification prep or theory. This is River’s published SECURE Framework, proven across 200+ industrial deployments from Canadian mining operations to 14-state oil & gas networks. You walk away with the same templates, methodologies, and field-tested strategies River uses with critical infrastructure clients, plus a personalized action plan for your facility.
What if I need more comprehensive support?
For organizations requiring full-scale implementation support, security architecture design, or ongoing advisory services, River Risk Partners offers select consulting engagements. The training is an excellent way to understand the methodology before engaging for larger strategic initiatives.
Stop Hoping You Don’t Get Breached. Start Building Real Defenses.
The threats are accelerating. The regulations are tightening. Your legacy systems aren’t getting any newer.
But you can take control, starting Monday morning.
REGISTER NOW - LIMITED SPOTS AVAILABLEQuestions? Contact river@riverrisk.com or connect with River on LinkedIn
