Skip to main content

New Training: Cyberattack Methods (CAM) for Cyber-Physical Systems

You received this invite part of your SecurityWeek subscription or because you attended this event or another SecurityWeek event or webcast the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party.

Cyber Attack Methods for Cyber-Physical Systems (3-Day Course)

Enable Images to View Content

Greetings!


SecurityWeek is thrilled to announce a new, multi-day, hands-on training course offering taking place alongside the 2025 ICS Cybersecurity Conference: Cyber Attack Methods (CAM) for Cyber-Physical Systems.


This hands on training will take place Tuesday, October 28th – Thursday, October 30th. (This training is available for United States Citizens only.)


Training Registration Fee: $3995 Includes 3-nights of 5-star hotel stay, certificate of course completion, all meals, and access to all conference sessions and social functions!


Limited seats remain. Reserve your spot today!


This hands on training will take place Tuesday, October 28th – Thursday, October 30th. Day 1 will be a full day, and Day 2 and 3 will be half days. Students will be able to attend sessions of the core ICS Cybersecurity Conference and access instructors event when the workshop is not in session. Access to all conference meals and networking events is also included.


Cyber-physical systems, i.e. systems that bridge the cyber and physical domains, are attractive targets for attack partially due to the possibility of causing real-world physical loss to the victim.


Have you ever wondered how cyber adversaries execute these sort of attacks? Do you see attacks in the news and wonder, “how did the attacker even think to do that?” Do you stay up at night thinking, “could that happen to my system?” Developers want their systems to be secure and need to understand the threat. Unfortunately, broad intel reports and vague proclamations about adversary capability and intent may not give developers a concrete understanding of what they can do to make their systems more secure.


This Cyber Attack Methods course takes a unique approach to meeting this need, putting students into the shoes of an attacker — walking them through the steps of system discovery, exploitation, and delivering a mission-impacting attack against an intentionally vulnerable virtual cyber physical system with their hands on the keyboard. In this course we won’t turn you into a hacker, but you will learn to think like one!


Course Objectives:


  • Provide an understanding of methods that an attacker may use against cyber-physical systems and their impact on mission readiness, capability, confidentiality, integrity, availability, productivity, or revenue.
  • With hands-on keyboard, develop and execute attacks against a representative cyber-physical system; discuss and evaluate mitigations against these attacks.
  • Foster an attacker mindset, enabling participants to think like bad actors, walk through attack methods related to historic exploits, and apply that knowledge to making systems more secure.


What students should know beforehand:


There are no firm prerequisites for the course although it’s primarily aimed towards systems engineers, system security engineers and developers. Students will get the most benefit if they are somewhat familiar with using the Linux command line and have done some programming. That being said, it is a guided tour – student’s hands will be on the keyboard but instructors will lead them all the way through.


What students will learn:


Students will gain a tangible appreciation for adversary mindset, tactics, techniques and procedures related to enumerating and exploiting weaknesses in cyber physical systems. They will also learn to think through real-world mitigations and design choices to reduce attack surface and provide greater protections in the systems they design, build, or oversee.

Meet the Instructors: MTSI’s CPS team is a group of highly experienced hackers, reverse engineers and pentesters. They have years of experience testing mission critical systems in aviation, maritime, weapons, and defense systems. They conduct research into cyber physical system security and are often invited to share their perspectives at national conferences. They also routinely compete and place highly at world renowned hacking competitions including Mandiant’s FlareOn RE Challenge and DEFCON where the team placed 1st at the ICS Village CTF during DEFCON32.

The Hub for Industrial Cybersecurity

ICS Cybersecurity Conference - As our community continues to grow, so do the innovative ways we offer you to engage, connect, and collaborate. In addition to trainings and workshops, our packed agenda features speakers from ExxonMobil, DARPA, CISA, Saudi Aramco, Rockwell Automation, Honeywell, Cisco and more.

Mike Holcomb

Mike Holcomb

Fluor Corporation

ICS Speaker CISO

Matthew Rogers, PhD

CISA

ICS Speaker ExxonMobile

Blake Gilson

ExxonMobil

ICS Speaker DARPA

Andrew Carney

DARPA

Melanie

Melanie Hutchenson

Booz Allen

Prem

Prem Kumar

Saudi Aramco

With 75+ sessions over three days, the conference brings together hundreds of critical infrastructure stakeholders to explore cutting-edge strategies and solutions to fortify operational technology (OT) environments and enhance resilience against cyber threats.


Get ready for an unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space.

Join Us for an Upcoming Webinar:

The Future of Industrial Network Security (November 13) - Register Now

Cisco Webinar Nov13

Since 2002, SecurityWeek’s ICS Cybersecurity Conference has been the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. 

Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...