Securing OT-relevant aspects of SCADA, DCS & ICS
Goals
- You will be able to define and explain the roles of SCADA, DCS, and ICS in industrial environments
- You will be capable of distinguishing between IT and OT security and explaining the unique challenges of securing OT systems
- You will be in the position of explaining segmentation and its role in isolating OT from IT networks to enhance security
- You will understand the risks associated with legacy OT systems and developing strategies for mitigation
- You will be able to evaluate the impact of industry-specific regulations on OT security practices and compliance
- You will be capable of applying risk management strategies and cybersecurity maturity models to improve OT security
- You will be in the position to analyze major OT security incidents (e.g., Stuxnet) and deriving lessons learned to inform security strategies
- You will evaluate the success of security measures implemented in real-world OT environments
- You will be able to explain how legacy systems contribute to security risks in OT environments due to outdated protocols and vulnerability management challenges
- You will be capable of analyzing the convergence of IT and OT security and implementing integrated security strategies
- You will be able to explain the differences in policies, standards, guidelines and procedures
- You will be able to explain the implications of Critical Infrastructure rules
Course Slides
Exercices
In the related exercice section, you will experience the use of concepts presented in the slides.
Links
- The Purdue Enterprise Reference Architecture and Methodology (PERA)
- IBM’s X-Force Threat Intelligence Index 2024
- ComplianceForge Reference Model: Cybersecurity & DataPrivacy Documentation Terminology
- INTERNATIONAL STANDARDS AND THE GLOBAL DIGITAL COMPACT
- National CIP Strategy (Switzerland)
- Network and Information Systems directive 2 (NIS 2)
- SME maturity quick check
- ENISA maturity self-assessment
- 2024 REPORT ON THE STATE OF CYBERSECURITY IN THE UNION
- Information security checklist for SMEs
- Measures to protect industrial control systems (ICSs)

