Aligné CISA CTEP — Édition OT/ICS

Exercice Tabletop Exécutif
Tableau de Bord de Commandement

300+ exercices de cybersécurité prêts à l'emploi — scénarios de menaces ICS/OT, guides de discussion de niveau exécutif, injects sectoriels et kits de facilitation. Propulsé par les cadres CISA CTEP et les renseignements sur les menaces OT/ICS.

Sans inscription  ·  Aperçu 2 min  ·  Scénario #1 · Attaque Ransomware ICS
0
Packages d'Exercices
Aligné CISA CTEP
0
Secteurs Critiques
Infrastructure Couverte
0
% Ransomware ↑
Contre OT (Données 2025)
0
Jours de Temps Moyen de Présence
Dans les Réseaux OT
0
Familles de Maliciels ICS
Jamais Découvertes (2 en 2024)
Voir en Action

Regardez CyberICS en Direct — 5 Minutes

Regardez la démo plateforme de 5 minutes
Aucun compte requis · Présentation narrée
✓ 335+ Scénarios OT/ICS ✓ 12 Cadres de Conformité ✓ Rapports Post-Incident IA ✓ Analyse Topologie CAAT
Cadre de l'Exercice

Fonctionnement d'un Exercice Tabletop CyberICS Solutions

📋
Planification
Définition du périmètre, invitations des participants, préparation du facilitateur
1–2 Semaines Avant
📡
Briefing Menaces
Briefing renseignements OT, panorama actuel des menaces
30 Minutes
Module 1
Injects de scénario d'incident initial et discussion
60–90 Minutes
🛡️
Module 2
Escalade, réponse, récupération et décisions des parties prenantes
60–90 Minutes
📊
Debriefing + Bilan
Retour immédiat, points forts, lacunes, plan d'amélioration
30–45 Minutes
300+ Exercices Prêts à l'Emploi

Sélectionnez Votre Scénario Tabletop

Filtrer :
Secteur :
Niveau:
🔍
📅 Sessions à Venir
Aucune séance planifiée. Ouvrez une carte d'exercice pour en planifier une.
🔍 Aucun scénario ne correspond à votre recherche. Essayez d'autres mots-clés.
OT / ICS

Industrial Control Systems Compromise

A nation-state affiliated threat actor conducts a spear-phishing campaign targeting IT/OT convergence personnel. Lateral movement into OT networks results in adversary access to SCADA HMI. Physical process manipulation is attempted on critical production systems.

ICS/SCADA Intrusion VOLTZITE IEC 62443
⏱ 3–4 Hours
👥 8–15 Players
Avancé
Electricity / Power Grid

Electric Grid SCADA Attack

VOLTZITE reconnaissance activity is detected targeting the electricity subsector. Intrusion into energy management systems via a compromised third-party vendor escalates to potential disruption of grid stability controls and substation automation systems.

Grid SCADA Intrusion VOLTZITE NERC CIP
⏱ 3–4 Hours
👥 10–18 Players
Avancé
Chemical / Process

Chemical Facility Process Disruption

A cyber intrusion at a chemical manufacturing facility exploits the IT/OT convergence boundary. Adversary access to distributed control systems (DCS) creates risk of unintended chemical process manipulation, safety system bypass, and hazardous material release.

DCS / SIS Attack BAUXITE IEC 61511
⏱ 3–4 Hours
👥 8–14 Players
Avancé
Dams / Hydroelectric

Hydroelectric Dam Control System Attack

Threat actors exploit remote access vulnerabilities in hydroelectric facility SCADA to gain control over water flow management systems. Unauthorized manipulation of sluice gate controls and turbine management presents catastrophic downstream consequences.

SCADA Manipulation KAMACITE NIST 800-82r3
⏱ 3–4 Hours
👥 8–15 Players
Avancé
Water / Wastewater

Water Treatment SCADA Intrusion

A threat actor gains remote access to a water treatment facility's operational technology network. Chemical dosing systems are targeted — unauthorized modification of chlorine levels poses immediate public health risk and activates multi-agency emergency response protocols.

OT Remote Access Exploit BAUXITE / CARR AWIA 2018
⏱ 2–3 Hours
👥 8–14 Players
Intermédiaire
Maritime / Ports

Port Operations Technology Attack

A coordinated cyber attack targeting a major port's cargo management and operational technology systems disrupts crane automation, vessel tracking (AIS), and gate systems. IT/OT convergence in port infrastructure creates simultaneous physical and cyber impacts.

OT/IT Convergence Attack VOLTZITE IMO 2021
⏱ 2–3 Hours
👥 8–16 Players
Intermédiaire
Critical Manufacturing

Smart Factory SCADA Disruption

A sophisticated attack on a critical manufacturing facility's Industry 4.0 infrastructure compromises production SCADA, robotics controllers, and quality management systems. The adversary pivots from an OEM vendor VPN connection to achieve persistent OT access.

Vendor VPN Pivot GRAPHITE IEC 62443
⏱ 3–4 Hours
👥 10–18 Players
Avancé
Cross-Sector

Ransomware — IT to OT Propagation

A RansomHub affiliate deploys ransomware that begins on corporate IT but propagates across the IT/OT boundary. Production systems halt. Operators face a decision: continue manual operations with safety risk or shut down entirely while attackers demand a multi-million dollar ransom.

Ransomware + OT RansomHub / LockBit NIST CSF 2.0
⏱ 2–3 Hours
👥 6–14 Players
Intermédiaire
Cross-Sector

Vendor & Supply Chain Compromise

A trusted OT automation vendor is compromised. Malicious code embedded in a legitimate software update is pushed to 47 client sites simultaneously. The backdoor provides persistent access to OT networks across multiple critical infrastructure sectors before detection.

Supply Chain / ISAC GRAPHITE IEC 62443 SR 1.3
⏱ 3–4 Hours
👥 8–15 Players
Avancé
Cross-Sector

Insider Threat — Privileged OT Access

A disgruntled operations engineer with privileged access to OT systems is recruited by a foreign intelligence service. Over 90 days, the insider exfiltrates network topology, SCADA configurations, and SIS documentation — providing a roadmap for a future destructive attack.

Insider / Espionage State-Sponsored NIST SP 800-82r3
⏱ 2–3 Hours
👥 8–14 Players
Avancé
Cross-Sector

Sustained DDoS on Industrial Systems

A 96-hour sustained DDoS campaign targets internet-facing OT management interfaces, historian servers, and remote monitoring portals. Combined with selective BGP route hijacking, adversaries sever remote monitoring visibility across distributed critical infrastructure assets.

DDoS / BGP Hijack CARR / Hacktivist NIST CSF — Protect
⏱ 2–3 Hours
👥 6–12 Players
Intermédiaire
Cross-Sector

Open Source / Software Supply Chain

A malicious package masquerading as a legitimate Python library used in industrial automation toolchains is downloaded 14,000 times before detection. The package installs a reverse shell enabling persistent access to engineering workstations connected to OT environments.

Open Source Malware Criminal / State IEC 62443 SR 3.4
⏱ 2–3 Hours
👥 6–12 Players
Intermédiaire
Defense Industrial

Defense Industrial Base Contractor Breach

A Tier-2 defense contractor is breached via spear-phishing. The adversary exfiltrates OT schematics, network diagrams, and ITAR-controlled technical data over 6 months. The breach is only discovered when a ISAC threat intelligence alert matches behavioural patterns.

Espionage / IP Theft GRAPHITE / VOLTZITE CMMC Level 2
⏱ 2–3 Hours
👥 8–14 Players
Avancé
Healthcare

Hospital OT & Medical Device Attack

Ransomware targeting hospital enterprise systems propagates to building management, HVAC, and connected medical devices. ICU patient monitoring systems go offline. Clinical operations revert to manual procedures during peak hours as attackers threaten to release patient data.

Ransomware + Medical OT Play / BlackCat HIPAA / FDA
⏱ 2–3 Hours
👥 8–16 Players
Intermédiaire
Financial Services

Financial Infrastructure Cyber Attack

A coordinated attack targets a major financial institution's transaction processing systems and ATM network. Simultaneous DDoS on banking portals and a SWIFT messaging compromise creates customer-facing disruption while adversaries attempt fraudulent international transfers.

SWIFT Compromise / DDoS Lazarus Group DORA / PCI DSS
⏱ 2–3 Hours
👥 8–15 Players
Intermédiaire
Food & Agriculture

Food Processing OT Sabotage

A nation-state actor targets a major food processing corporation's smart agriculture and production automation systems. Manipulation of chemical additive dosing systems and cold chain management creates a public health incident affecting millions of distributed food products.

OT Sabotage State-Sponsored FDA FSMA / IEC 62443
⏱ 2–3 Hours
👥 8–14 Players
Avancé
Kommunikation

Rural Broadband & Telecom Disruption

A coordinated attack on rural broadband infrastructure providers severs connectivity to 340,000 subscribers, disabling SCADA monitoring for remote OT assets across energy, water, and agricultural sectors that depend on cellular and fiber backhaul for operational visibility.

Telecom OT Dependency KAMACITE FCC / NIST CSF
⏱ 2–3 Hours
👥 8–14 Players
Intermédiaire
Commercial Facilities

Smart Building Systems Attack

Threat actors compromise building management systems (BMS) across a high-occupancy commercial complex — HVAC, elevators, physical access control, and fire suppression are manipulated. The attack targets a critical infrastructure tenant operating OT systems within the facility.

BMS / BACnet Attack Criminal Affiliate NIST SP 800-82r3
⏱ 2–3 Hours
👥 6–12 Players
Intermédiaire
Oil & Gas

FPSO / Upstream OT Incident

GRAPHITE targets a Floating Production Storage and Offloading (FPSO) vessel's SCADA systems via a compromised automation vendor. Process historian manipulation masks anomalous production behaviour while adversaries pre-position on Safety Instrumented Systems for potential destructive action.

FPSO SCADA + SIS GRAPHITE IEC 61511 / API 1164
⏱ 3–4 Hours
👥 10–18 Players
Avancé
Executive Leadership

Board-Level OT Cyber Crisis

The CEO receives a call at 2AM: production has halted at two facilities. IT confirms ransomware. OT team cannot confirm containment. The board wants answers in 4 hours. This exercise tests executive decision-making, crisis communication, media strategy, and regulatory notification timelines.

Crisis Management RansomHub NIS2 / Board Fiduciary
⏱ 2–3 Hours
👥 5–10 Executives
Intermédiaire
Local Government

Municipal Critical Infrastructure Attack

A coordinated cyberattack targets a mid-size city's water, traffic management, and emergency services OT infrastructure simultaneously. The attack coincides with a severe weather event, compounding response complexity and testing inter-agency coordination under dual-crisis conditions.

Multi-System Attack Hacktivist / State NIST CSF / CISA CPG
⏱ 2–3 Hours
👥 8–16 Players
Intermédiaire
Information Technology

IT Infrastructure Compromise → OT Spillover

A zero-day in a widely deployed enterprise SIEM platform grants adversaries persistent access to the corporate network. Over 72 hours the threat actor pivots toward OT boundary devices. IT and OT teams struggle to coordinate response across separate reporting chains and security tools.

IT/OT Convergence Incident ELECTRUM IEC 62443 / NIST 800-82
⏱ 2–3 Hours
👥 8–15 Players
Intermédiaire
Threat Intelligence Overlay

Actor × Sector Threat Matrix

THREAT ACTOR
Electric
Oil & Gas
Water
Chemical
Maritime
Mfg
Govt/Local
🇨🇳 VOLTZITE
🇷🇺 GRAPHITE (APT28)
🇷🇺 KAMACITE
🇮🇷 BAUXITE
🇷🇺 ELECTRUM
💰 RansomHub
🏭 CARR (Hacktivist)
High Priority Medium Low Not Observed Source: OT/ICS Security Research 2025
Facilitator Toolkit

Exercise Planning Resources

📋
Exercise Planner Handbook
Step-by-step guide for planning and executing a CTEP tabletop exercise from invitations to after-action reporting.
CTEP Planner Handbook (CISA 2021)
🎯
Facilitator & Evaluator Guide
Role guidance for exercise facilitators, note-takers, and evaluators. Includes inject timing and discussion moderation techniques.
CTEP Facilitator Handbook (CISA 2020)
📊
After-Action Report Template
Structured AAR/IP template to capture strengths, areas for improvement, and a corrective action plan following each exercise.
CTEP AAR/IP Template (CISA 2020)
🛡️
OT Threat Intelligence
87% increase in ransomware attacks on industrial organizations. 23 OT-focused threat groups tracked. VOLTZITE, GRAPHITE, BAUXITE activity mapped to your sector.
2025 OT/ICS Year in Review
Briefing
Module 1
Module 2
Hot Wash
00:00
AI Dynamic Inject
Phase du Processus ICS (définit les compétences testées)
Facilitator Guidance (optional)
🔍 Preview
🧠 AI Exercise Coach
🧠 AI Exercise Debrief Assistant
🎯 Tableau de Bord IA
⌛ Évaluation de la performance…
Assistant d'exercice
🤖 Assistant d'exercice
Prêt à vous aider
☠ AI Adversary Role Player
Escalation: MEDIUM Nation-State (GRU-aligned)
🚨 AI Threat Intelligence TLP:WHITE
🔗 Full Threat Board
🧠 Suite d'intelligence incident IA
🔗 Ouvrir la suite
📊 Tableau de Bord Analytique
Votre Activité d'Exercice & Couverture Conformité
0
Exercices Terminés
sur 65 scénarios
0h
Temps de Formation Total
Formation en Présentiel
0
Cadres Testés
cadres réglementaires
0
Notes AAR Capturées
Réponses aux discussions
Carte de Couverture des Scénarios
Terminé
Niveau Gratuit
Non réalisé
Activité Mensuelle (6 derniers mois)
Exercices terminés par mois
Couverture par Secteur
Couverture des Cadres de Conformité
Activité Récente des Exercices
📋 Capability Gap Heatmap ICS-CERT / IEC 62443 Domain Coverage
No gap data yet — complete an exercise with the hotwash gap taxonomy to see trends here.
📅 Planifier l'Exercice
🃏 Cartes de Rôles des Participants
Current exercise