2026年05月28日
(16:00 - 16:45 UTC +02:00)
Show in different timezone
(Academy Online)
Webinar (Online)
英語
Wpuc99en
StationGuard

Live Hack in the Power Grid: From Phishing to Blackout

2026年05月28日
(16:00 - 16:45 UTC +02:00)
Show in different timezone
(Academy Online)
Webinar (Online)
英語
Wpuc99en
StationGuard

主要特点

In this live, high-fidelity simulation we will walk you through a complete OT intrusion – from a phishing mail to coordinated breaker operations in multiple substations – against an environment that already has Multi-Factor Authentication (MFA), network segmentation, OT firewalls, and isolated zones. We expose how identity gaps, weak trust boundaries, and protocol misuses chain together to defeat “best practice” defenses. Then we flip perspective: deconstruct the kill chain, and convert each step into concrete detections, containment actions, and recommendations for architecture fixes. Expect uncomfortable truths, pragmatic countermeasures, and clear next steps to raise resilience across IT/OT.

学习目标

  • Understand end-to-end attack progression in power grid OT networks
  • Diagnose why MFA, segmentation, and OT firewalls can fail under real attacker trade craft
  • See, in real time, how each attacker’s action appears in an OT IDS (alerts, anomalies)
  • Recognize typical lateral paths across office/plant boundaries
  •  

内容

  • Live demo: phishing-led intrusion culminating in coordinated breaker operations (real OT protocols)
  • Teardown of the kill chain: at each stage, we show the attacker action and the matching OT IDS evidence
  • The attacker phishes a SCADA engineer, hijacks an OT server, pivots into a substation, drops Industroyer-like malware, and then open breakers across multiple substations in a coordinated attack
  • Lessons learned and typical vulnerabilities in power grid OT network setups
  •  

时间

45 minutes

参加者

IT Professionals
OT Security Professionals

必备知识

Basic Cybersecurity Knowledge

产品

StationGuard

免费
请注册

„优秀的课程内容,极佳的培训环境。“赞”!“

学生心声
应用知识
深入讨论
专业的培训材料
You are using an outdated browser version.
Please upgrade your browser or use another browser to view this page correctly.
×