OT Cybersecurity Training β€” Bohemia Market CZ

Your Legacy DCS Is Not the Problem.
The Upgrade Pitch Is.

Learn a proven, standards-compliant approach to securing legacy OT systems β€” without replacing them. Real-world frameworks, live attack demonstrations, and a 90-day implementation roadmap built for engineers and plant managers who need results, not vendor lock-in.

13Modules
50Lessons
20+Years OT Experience
65CVEs Documented

Applied at operating power utilities β€” aligned to international standards

● Eskom Siemens IEC 62443 ISO 27001 NESA UAE NIS2

You Are Being Told One Thing.
The Standards Say Another.

Your OEM says the same thing every time a cybersecurity audit comes around.

"This system is end-of-life. You must upgrade to stay compliant."

You are paying millions for hardware replacements that introduce new attack surfaces, cloud dependencies, and licensing arrangements you cannot exit β€” while your existing process knowledge disappears into a vendor's server.

"There is no way to secure an unpatched DCS."

ISO 27001 and IEC 62443 explicitly recognise risk avoidance through isolation as a fully valid and auditable risk treatment method. A system that cannot be reached cannot be breached.

"Your network segmentation is not sufficient."

A reference-site assessment of Siemens SCALANCE switches found 65 documented CVEs β€” 8 rated CRITICAL at CVSS 9.8 or 10.0. Several have no vendor fix planned. The patched upgrade carries its own unsolved vulnerabilities.

"Compliance requires the latest firmware."

Compliance requires a documented, risk-managed control environment. Physical segmentation, data diodes, and passive monitoring satisfy that requirement without introducing new software dependencies.

The pressure to upgrade is real. The technical and commercial justification for it is not.

What This Course Changes

After completing this course, you will be able to examine any OEM recommendation through the lens of verified standards, documented threat intelligence, and proven architecture β€” and make an independent, defensible decision.

βš™οΈ
Virtualise

Move legacy DCS logic to isolated virtual environments. Remove the physical attack surface without losing process knowledge or control fidelity.

πŸ”’
Isolate

Deploy data diodes and physical zone separation. A system that cannot be reached cannot be breached. Full ISO 27001 and IEC 62443 compliance through risk avoidance.

πŸ“‘
Monitor

Passive continuous monitoring through a NOC and data-diode architecture. Full visibility without creating new ingress points or disrupting live processes.

Every framework in this course has been applied at operating power utilities, including a board-level engagement with Eskom Holdings SOC Ltd β€” Africa's largest power utility.

This Course Is Designed For

βš™οΈ
OT/ICS Engineers & C&I Technicians

At power plants, substations, and generation facilities who maintain DCS, SCADA, or PLC systems and need a practical cybersecurity framework they can implement themselves.

🏭
Plant Managers & Operations Directors

Responsible for business continuity and being asked to approve large capital expenditure on OEM upgrades without an independent technical justification.

πŸ›‘οΈ
Cybersecurity Professionals

Transitioning into OT/ICS who understand IT security principles and need to understand how Zero Trust translates β€” and where it does not β€” into the industrial environment.

πŸ“Š
C-Level Executives & Board Members

At energy companies who need a clear, standards-referenced position they can present to regulators, auditors, and insurers.

πŸ“‹
Compliance & Risk Officers

Working against IEC 62443, ISO 27001, NESA UAE, or NIS2 frameworks who need to map OT-specific controls to existing governance structures.

⚠️
Anyone Facing OEM Upgrade Pressure

Being pressured by Siemens, ABB, GE, or Honeywell to spend on hardware or software upgrades as the only route to cybersecurity compliance.

Key Outcomes

By the end of this course, you will be able to:

01

Explain the three pillars β€” Virtualise, Isolate, Monitor β€” and apply each to a legacy DCS environment with documented evidence.

02

Identify the ISO 27001 and IEC 62443 provisions that validate isolation as a compliant risk treatment, and challenge OEM recommendations with referenced standards.

03

Conduct a structured asset inventory and risk/threat model for an OT network, distinguishing threats that require patching from those neutralised by architecture alone.

04

Design and document a network segmentation strategy using data diodes and physical zone separation that removes the attack surface without new vulnerabilities.

05

Evaluate the real risk profile of a proposed OEM upgrade β€” including new CVEs, cloud dependency, licensing lock-in, and planned obsolescence timelines.

06

Deploy passive continuous monitoring through a NOC and data-diode architecture that provides visibility without creating additional ingress points.

07

Build and present a 90-day implementation roadmap suitable for board or senior management approval.

08

Respond effectively to a live OT incident with documented procedures for isolation, evidence preservation, and recovery that maintain process continuity.

13 Modules. 50 Lessons.
A Complete OT Security Programme.

01
OT Zero Trust Fundamentals

Why Zero Trust from IT does not apply unchanged to OT, and how to adapt it where availability outranks confidentiality.

03
Governance & Standards Mapping

IEC 62443, ISO 27001, NESA UAE, and NIS2 β€” how to map OT controls and produce audit-ready documentation.

04
Asset Inventory for OT Networks

Passive discovery methods for legacy environments. Building a complete hardware and software register without disrupting live processes.

05
Risk & Threat Modelling

Consequence-based prioritisation and treatment selection β€” including when isolation is the correct treatment.

07
Identity & Remote Access

Secure remote access for semi-isolated OT. MFA and privileged access management without cloud dependency.

08
Secure Communications

Protocol security for DNP3, Modbus, and IEC 61850. Managing legacy protocols that cannot be encrypted.

09
Monitoring & Detection

Passive network monitoring architecture. NOC integration. Anomaly detection without active scanning.

10
Incident Response for OT

OT-specific response playbooks. Isolation without process trip. Evidence collection and board communication protocols.

11
Recovery & Business Continuity

Recovery sequence design. DCS configuration backup and restoration. Continuity planning independent of OEM availability.

13
Defending Your Position to Management & Regulators

How to present a non-upgrade compliance strategy to boards, auditors, and regulators. Responding to OEM counter-arguments with documented evidence.

About the Instructor

πŸ‘€
Petr Roupec
CEO, Bohemia Market CZ s.r.o.

With more than 20 years of hands-on experience in industrial automation and power plant control systems, Petr has conducted vulnerability assessments and designed security architectures for operating generation facilities across Europe and Southern Africa.

His work includes documented assessments of Siemens SPPA-T3000 DCS platforms, SCALANCE network infrastructure, and S7 PLC environments β€” producing one of the most detailed OT vulnerability reports available outside a vendor security advisory.

In April 2026, Petr prepared and presented the OT cybersecurity technical brief to the Eskom Holdings SOC Ltd Generation Board, covering live attack surface evidence and a phased compliance programme.

65
CVEs on SCALANCE switches

8 rated CRITICAL at CVSS 9.8–10.0. Several marked "no fix planned" by Siemens.

Eskom
Board-level engagement, April 2026

Technical brief BM-ESKOM-BRD-001 presented to Eskom Generation Board.

4
Standards frameworks mapped

IEC 62443 Β· ISO 27001 Β· NESA UAE IAS Β· NIS2 β€” all cross-referenced in course materials.

Live
S7 PLC DDoS demonstration

Live denial-of-service attack against a Siemens S7 PLC using publicly documented methods.

Choose the Programme That Fits Your Situation

Standard Enrolment
€497
Everything you need to build and defend your OT security programme
βœ“Full access to all 13 modules and 50 lessons
βœ“Downloadable templates: asset register, risk matrix, network segmentation diagrams, 90-day roadmap planner
βœ“Standards mapping reference: IEC 62443, ISO 27001, NESA UAE cross-reference tables
βœ“Live DDoS and vulnerability demonstration recordings (Siemens S7 / SCALANCE / T3000)
βœ“Incident response playbook templates (OT-specific)
βœ“Lifetime access including all future updates
βœ“Certificate of completion
Enrol β€” Standard

Frequently Asked Questions

Our DCS is already marked end-of-life by the OEM. Is it too late?

End-of-life is a commercial statement, not a security verdict. ISO 27001 and IEC 62443 do not require hardware to be on a supported firmware path β€” they require that risk is identified, documented, and treated. For many end-of-life OT systems, isolation and physical segmentation is the most effective treatment available, and it is fully auditable.

Our auditor expects IEC 62443 compliance. Does this course address that?

Yes. Module 3 covers IEC 62443 in detail. The standards mapping materials include a cross-reference table across IEC 62443, ISO 27001, and NESA UAE IAS. The approach was applied in a formal compliance context at Eskom, where IEC 62443 was the primary referenced framework.

We have a mixed environment β€” legacy and recently upgraded systems. Is this still relevant?

Yes. Module 6 covers zone separation between legacy and modern systems. Module 9 addresses passive monitoring across heterogeneous environments. The 90-day roadmap in Module 12 is structured for phased environments.

Our OEM says data diodes will break their remote support agreement.

Module 7 addresses remote access design for semi-isolated environments, including how to structure vendor access windows that are time-limited, monitored, and auditable β€” without maintaining a permanent remote connection.

I come from an IT security background. Will this be too technical on the OT side?

Modules 1 and 2 establish the OT context. The content builds progressively from Module 3. The live S7 DDoS demonstration is particularly valuable for IT professionals who have not observed OT attack scenarios in a physical plant context.

Is this course relevant outside of power generation?

Yes. The Virtualise–Isolate–Monitor methodology applies to any legacy OT environment: water utilities, oil and gas, manufacturing, chemical processing, and rail. The standards referenced are sector-agnostic.

The Decision Is Not Technical.
It Is One of Accountability.

Every week your plant's OT network remains without a documented, defensible security position, the question is not whether a risk exists β€” it is whether anyone in your organisation has named an owner for it.

This course gives you the technical framework, the standards references, and the practical tools to answer that question directly: to your board, to your regulator, and to your OEM.

You do not need to replace your DCS to be compliant. You need to understand your risk and prove you have treated it.