Training

Digital forensics and incident response in ICS

Training focus
Training focus

Participants study the tools and methods used to conduct all stages of an ICS incident response and investigation – from confirming the cybersecurity event and collecting evidence to analyzing artifacts and preparing the final report.

Skills gained
Skills gained

Participants acquire hands-on skills that allow them to investigate incidents at industrial enterprises using unique approaches and become ICS digital forensics experts.

Target audience
Target audience

Information security specialists, analysts from computer security incident response teams (CSIRTs), security operations centers (SOCs), private and national computer emergency response teams (CERTs). It is also intended for any other specialist interested in learning about the specifics of ICS incident investigation.

Contents

The issue

Cyberattacks on industrial organizations can have unpredictable and serious consequences for the victim organization. In the ICS environment, downtime due to a cybersecurity incident can result in direct financial losses caused by interrupted production and unfulfilled contract obligations, as well as wasted raw materials and damage to expensive equipment.

Enterprises need to regain full control of their infrastructure as quickly as possible and resume normal operations. Therefore, the cybersecurity incident response team must be able to react quickly and efficiently to resolve numerous technical and organizational tasks, including:

Show more

What we offer

We train experts in ICS digital forensics
We train experts in ICS digital forensics

Having digital forensics specialists in-house allows an organization to react faster and more effectively to cybersecurity incidents, minimizing negative consequences and saving resources by only involving external experts in the most complicated instances.

Course description

Basics of incident response and the differences between digital forensics in IT and ICS/OT.

Understanding ICS network protocols and architecture.

Threat hunting in industrial/OT networks.

Digital forensics on workstations and servers with a specific focus on ICS software, threats and risks.

Digital forensics focusing on ICS components – workstations, servers, and specialized software and equipment.

Lab work. Investigation of a simulated ICS cybersecurity incident.

The training program can be modified based on customer needs.

The theory section examines real-world incidents at industrial organizations using publicly available information and technical information from Kaspersky investigations.

The practical section consists of exercises that consolidate the theoretical materials from each section through relevant hands-on tasks. On the final day, participants conduct their own independent investigation of an ICS cybersecurity incident in a lab setting.

Show more

Knowledge and skills gained

Theory

  1. Measures required to prepare for incident response, including:
    • A knowledge of infrastructure requirements to facilitate rapid incident response.
    • An understanding of the requirements for OT cybersecurity incident response team personnel.
    • An understanding of the possibilities associated with using Cyber Threat Intelligence data, enterprise security posture evaluations, vulnerability research and threat modelling information to plan and execute cybersecurity incident prevention and prepare for such incidents.
  2. Organizing effective IT and OT incident response process in industrial organizations, including:
    • Understanding the roles and zones of responsibility of the organization’s employees and contracted experts, as well as the rules for organizing effective communication between the two groups.
    • Understanding the differences in organizing and investigating cybersecurity incidents in IT enterprise networks versus OT enterprise networks, including requirements for toolsets and procedures for using them.
    • Identifying priorities during investigations and creating plans for ICS incident investigations.
    • Planning measures to prevent similar incidents in the future.
  3. Typical errors in incident response preparation and investigation and how to avoid them.

Hands-on skills

  1. Identifying incidents in the OT environment using available tools, publicly available utilities, commercial solutions and indicators of compromise (IoCs).
  2. Responding to incidents in enterprise OT networks, including:
    • Gathering and handling digital evidence.
    • Using specialized ICS digital forensics tools and methodologies.
    • Searching for traces of intrusion using the collected evidence.
    • Reconstructing an incident using timestamps.
    • Selecting methods and tools to contain and halt the incident, as well as minimize its consequences.
    • Compiling an investigation report.

Course duration

The training is conducted in person.

5 days – standard course.

10 days – standard course + additional hands-on practice.

Course prerequisites

The training program can be adapted to the participants’ level.

Minimal prerequisites for the basic course

  • General knowledge of networking
  • Basic system administration skills in Windows, Linux and virtualization systems
  • Knowledge of information security theory
  • Practical skills in information security and IT asset security
  • Basic IT incident response knowledge

Prerequisites for the advanced course

  • Experience conducting malware analysis
  • Experience of reverse engineering executable files
  • Deep knowledge of networking technologies and network protocol stacks
  • Experience investigating cybersecurity incidents in IT networks
  • Experience of threat hunting in IT networks

Certification

Theoretical knowledge is consolidated during a hands-on lab session on the final day, and participants receive a certificate upon completion.

Our trainers

Vyacheslav Kopeytsev, Principal Security Researcher, Kaspersky ICS CERT
Vyacheslav Kopeytsev, Principal Security Researcher, Kaspersky ICS CERT

Vyacheslav specializes in investigating attacks on industrial infrastructure, digital forensics and incident response in various types of systems, as well as malware analysis. He regularly speaks at industry conferences in addition to authoring articles and threat analysis reports.

Pavel Nesterov, Lead Security Researcher, Kaspersky ICS CERT
Pavel Nesterov, Lead Security Researcher, Kaspersky ICS CERT

Pavel specializes in deep vulnerability analysis of software and hardware for automated process control systems, as well as research on current threats. He implements infrastructure projects and develops educational and methodological materials on control system safety, including practical exercises and specialized demonstration stands. Pavel has extensive expertise working with SIEM systems, from analytics to implementation and deployment.