Course Details

OT Attack Mapping & Risk-Based Defense

This highly interactive two-day course offers a practical approach to analyzing attack paths in OT environments. Instead of discussing theoretical threat scenarios, participants work with concrete attack techniques, real vulnerabilities and develop pragmatic countermeasures. Requirements from standards such as IEC 62443 and ICT minimum standard are discussed.

Topics

Various topics will be analyzed together. Participants will also have the opportunity to contribute their own questions and use cases during the course. Among other topics, the following will be explored:

1
Lateral Movement

Identification of misconfigurations that allow attackers to move undetected in the network.

2
Physical Access

Opportunities that physical access provides to compromise OT systems.

3
Man-in-the-Middle (MITM)-Attacks

Intercepting and manipulating industrial control data using ARP spoofing and rogue devices.

4
Supply Chain Vulnerabilities

Demonstration of how attackers can inject malicious firmware updates or exploit vulnerabilities in third-party devices.

5
Persistence mechanisms in OT environments

Investigation of how attackers can establish themselves permanently in the network (e.g. through rogue devices or compromised remote access).

and more...

Who is the course for?

People who want to deal with specific security scenarios in order to examine and evaluate them from a technical perspective. On this basis, you can prioritize use cases in your own environment and derive measures in a more targeted manner.

  • OT technician
  • Specialists in building technology, automation etc.
  • System Engineers
  • Network Engineers
  • Security Analysts
  • CISOs

Agenda

You will receive the detailed agenda after registration along with the documents in advance.

Registration