
Course Overview
This exclusive workshop introduces participants new to the world of OT to give them an understanding of the way these systems work, their associated cybersecurity vulnerabilities and business risks.
The proposed training program is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.

Course Objectives
1
Familiarise participants with the Industrial Control System world and architectures
2
Introduce the various ICS Cyber Security Risks
3
Get in touch with various ICS Cyber Security Defences
4
Standards and best practices to secure ICS operations
5
ICS Cyber Security Risk Assessments
6
Introduction to Cyber Security Response
7
Expand ICS knowledge in both methodologies and techniques
Workshop Features
1. Hands-on Learning
Delivered through lecture-based and ample hands-on training on ThinkCyber's world-class simulator - The Cyberium Arena.
2. World Class Trainers
Taught by two of the industry's leading experts with a combined experience of 45 years in cybersecurity and ICS-OT.
3. Comprehensive Introduction
Rich content focusing on all aspects of cyber defense relating to ICS-OT architecture.

Course Trainers

Daniel Ehrenreich
B.Sc. Engineering, MBA, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts, with over 30 years of experience with SCADA & ICS-OT cyber security, deployed for electric power, water, sewage, oil, and gas systems.

David Shiffman
An accredited expert in information security and cyber operations with over 15 years of experience. Senior trainer to special forces and secret service worldwide. Leading a talented team of security professionals across research, training, and development of new tools and capabilities. His experience includes years of exploring and instructing on cyber security topics, engaging with military, government and enterprise customers worldwide.
Topics Covered
The training programme is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.
-
ICS-OT-IIoT Architectures and Application
-
Cyber Security Vulnerabilities and Business Risks
-
Typical Attack Vectors MiTM, DOS, DDoS, GPS, etc.
-
Industrial Cyber Kill Chain and MITRE ATT&CK
-
Explaining the Cyber-Attack Process Step by Step
-
Cyber Defense Technologies, IDS/IPS/ SIEM/ SOC
-
Best Practices for Industrial Cyber Defense
-
Defence Procedures According to BCP, DRP, IR
-
Introduction to Round Table Gamification Exercise
-
Cyber Incidents Worldwide During the Past Decade
-
ICS-OT Cyber Defense According to ISA 62443
The workshop includes 13 hands-on lab training with 3 scenarios where participants:
-
Act as an operator and control the plant process
-
Perform unexpected changes and realize the consequences
-
Taking proactive action to mitigate the risk and reduce the impact
-
Perform emergency shut down and restart the operation
-
Document the incident and propose compensating security measures

Workshop Details
Date: September 2022 (Date TBA)
Time: 9am - 5pm
Location: Republic Polytechnic, 9 Woodlands Ave 9