Course Details
This highly interactive two-day course offers a practical approach to analyzing attack paths in OT environments. Instead of discussing theoretical threat scenarios, participants work with concrete attack techniques, real vulnerabilities and develop pragmatic countermeasures. Requirements from standards such as IEC 62443 and ICT minimum standard are discussed.
Various topics will be analyzed together. Participants will also have the opportunity to contribute their own questions and use cases during the course. Among other topics, the following will be explored:
Identification of misconfigurations that allow attackers to move undetected in the network.
Opportunities that physical access provides to compromise OT systems.
Intercepting and manipulating industrial control data using ARP spoofing and rogue devices.
Demonstration of how attackers can inject malicious firmware updates or exploit vulnerabilities in third-party devices.
Investigation of how attackers can establish themselves permanently in the network (e.g. through rogue devices or compromised remote access).
People who want to deal with specific security scenarios in order to examine and evaluate them from a technical perspective. On this basis, you can prioritize use cases in your own environment and derive measures in a more targeted manner.
You will receive the detailed agenda after registration along with the documents in advance.
Registration