top of page

Operational Technology (OT) Cybersecurity For OT Engineers

Understand OT Networks and how to secure them effectively to protect your organisation's cyber-physical systems.

Supported By:

CSA logo - color (June2015) (1).jpg

Event Partners:

OT-ISAC Main Logo.webp
Ice71 Logo_edited.png

Course Overview

This exclusive workshop introduces participants to the world of OT to give them an understanding of how these systems work, their associated cybersecurity vulnerabilities and business risks.

The training program is constructed with rich content focusing on introducing ICS and ICS Cybersecurity, cyber attacks on ICS and IIOT, cybersecurity methodology for ICS and cyber incidents and the latest industry regulations.

2022 OT Cybersecurity Workshop

Take a look at what past OT Workshop participants experienced during the workshop.

Artboard 1 copy 2.png

Course Objectives


Familiarise participants with the basics of Industrial Control System and Cybersecurity


Showcase various case studies on cyberattacks coducted on ICS and IIoT


Introduce cybersecurity methodology for ICS


Understand the latest Cyber regulations and incidents

Workshop Features

1. Experiential Learning

Hear the war stories from Daniel Ehrenreich being at the frontlines of the early days of Stuxnet and working with the different OT companies around the world

2. World Class Trainer

Taught by one of the industry's leading experts with over 30+ years of OT training

3. Comprehensive Introduction

Rich content focusing on all aspects of cyber defense relating to OT networks and security

Artboard 1 copy 2.png

Workshop Trainer


Daniel Ehrenreich

  • LinkedIn

B.Sc. Engineering, MBA, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts, with over 30 years of experience with SCADA & ICS-OT cyber security, deployed for electric power, water, sewage, oil, and gas systems.

Session Overview

The training programme is constructed with rich content focusing on cyber defence for ICS-OT architecture, explaining the sources for vulnerabilities, attack paths, and attack vectors, a broad range of cyber security incidents and defence according to regional regulations, frameworks, etc.

  1. Session 1: Intro to ICS and Cybersecurity

  2. Session 2: Cyber Attacks on ICS and IIoT

  3. Session 3: Cybersecurity Methodology for ICS

  4. Session 4 : Cyber Incidents & Regulations

Registration Form

Workshop Details

Workshop Schedule

Date: 30th August - 31st August

Time: 9 am - 6 pm

Location: ICE71, 71 Ayer Rajah Crescent, #02-18, Singapore 139951

Price: Free

Post-event Networking Schedule

Date: 5th September

Time: 7-10pm

Location: TBA

Price: Free

OT Workshop Registration Form

Registration for the event has closed. We look forward to seeing you at our other events. Please contact for any enquiries. Thank you.

bottom of page