ICS-OT Cybersecurity Risk and Defense Workshop

A 3-day workshop designed for Operational Technology professionals designed and hosted by the world-renowned cybersecurity training company - ThinkCyber.

Course Overview

This exclusive workshop introduces participants new to the world of OT to give them an understanding of the way these systems work, their associated cybersecurity vulnerabilities and business risks.

The proposed training program is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.

Artboard 3_4x.png

Course Objectives

1

Familiarise participants with the Industrial Control System world and architectures

2

Introduce the various ICS Cyber Security Risks

3

Get in touch with various ICS Cyber Security Defences

4

Standards and best practices to secure ICS operations

5

ICS Cyber Security Risk Assessments

6

Introduction to Cyber Security Response

7

Expand ICS knowledge in both methodologies and techniques

Workshop Features

1. Hands-on Learning

Delivered through lecture-based and ample hands-on training on ThinkCyber's world-class simulator - The Cyberium Arena.

2. World Class Trainers

Rich content focusing on all aspects of cyber defense relating to ICS-OT architecture.

3. Comprehensive Introduction

Taught by two of the industry's leading experts with a combined experience of 45 years in cybersecurity and ICS-OT.

Artboard 10_4x.png

Course Trainers

Daniel Ehrenreich.jpeg

Daniel Ehrenreich

  • LinkedIn

B.Sc. Engineering, MBA, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts, with over 30 years of experience with SCADA & ICS-OT cyber security, deployed for electric power, water, sewage, oil, and gas systems.

1594632567256.jpeg

David Shiffman

  • LinkedIn

An accredited expert in information security and cyber operations with over 15 years of experience. Senior trainer to special forces and secret service worldwide. Leading a talented team of security professionals across research, training, and development of new tools and capabilities. His experience includes years of exploring and instructing on cyber security topics, engaging with military, government and enterprise customers worldwide.

Topics Covered

The training programme is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.

  1. ICS-OT-IIoT Architectures and Application

  2. Cyber Security Vulnerabilities and Business Risks

  3. Typical Attack Vectors MiTM, DOS, DDoS, GPS, etc.

  4. Industrial Cyber Kill Chain and MITRE ATT&CK

  5. Explaining the Cyber-Attack Process Step by Step

  6. Cyber Defense Technologies, IDS/IPS/ SIEM/ SOC 

  7. Best Practices for Industrial Cyber Defense

  8. Defence Procedures According to BCP, DRP, IR

  9. Introduction to Round Table Gamification Exercise

  10. Cyber Incidents Worldwide During the Past Decade

  11. ICS-OT Cyber Defense According to ISA 62443

The workshop includes 13 hands-on lab training with 3 scenarios where participants:
 

  • Act as an operator and control the plant process

  • Perform unexpected changes and realize the consequences

  • Taking proactive action to mitigate the risk and reduce the impact

  • Perform emergency shut down and restart the operation

  • Document the incident and propose compensating security measures

 
Artboard 35_4x.png

Workshop Details

Date: September 2022 (Date TBA)

Time: 9am - 5pm

Location: Republic Polytechnic, 9 Woodlands Ave 9

Register Today

arrow&v

Thank you for your interest in our ICS-OT workshop.