This exclusive workshop introduces participants new to the world of OT to give them an understanding of the way these systems work, their associated cybersecurity vulnerabilities and business risks.
The proposed training program is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.
Familiarise participants with the Industrial Control System world and architectures
Introduce the various ICS Cyber Security Risks
Get in touch with various ICS Cyber Security Defences
Standards and best practices to secure ICS operations
ICS Cyber Security Risk Assessments
Introduction to Cyber Security Response
Expand ICS knowledge in both methodologies and techniques
1. Hands-on Learning
Delivered through lecture-based and ample hands-on training on ThinkCyber's world-class simulator - The Cyberium Arena.
2. World Class Trainers
Taught by two of the industry's leading experts with a combined experience of 45 years in cybersecurity and ICS-OT.
3. Comprehensive Introduction
Rich content focusing on all aspects of cyber defense relating to ICS-OT architecture.
B.Sc. Engineering, MBA, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts, with over 30 years of experience with SCADA & ICS-OT cyber security, deployed for electric power, water, sewage, oil, and gas systems.
An accredited expert in information security and cyber operations with over 15 years of experience. Senior trainer to special forces and secret service worldwide. Leading a talented team of security professionals across research, training, and development of new tools and capabilities. His experience includes years of exploring and instructing on cyber security topics, engaging with military, government and enterprise customers worldwide.
The training programme is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.
ICS-OT-IIoT Architectures and Application
Cyber Security Vulnerabilities and Business Risks
Typical Attack Vectors MiTM, DOS, DDoS, GPS, etc.
Industrial Cyber Kill Chain and MITRE ATT&CK
Explaining the Cyber-Attack Process Step by Step
Cyber Defense Technologies, IDS/IPS/ SIEM/ SOC
Best Practices for Industrial Cyber Defense
Defence Procedures According to BCP, DRP, IR
Introduction to Round Table Gamification Exercise
Cyber Incidents Worldwide During the Past Decade
ICS-OT Cyber Defense According to ISA 62443
The workshop includes 13 hands-on lab training with 3 scenarios where participants:
Act as an operator and control the plant process
Perform unexpected changes and realize the consequences
Taking proactive action to mitigate the risk and reduce the impact
Perform emergency shut down and restart the operation
Document the incident and propose compensating security measures
Date: September 2022 (Date TBA)
Time: 9am - 5pm
Location: Republic Polytechnic, 9 Woodlands Ave 9