Southern Africa (SADC)  ·  SADC Region  ·  POPIA · AU Malabo Convention · IEC 62443-Aligned

World-Class OT/ICS Cybersecurity Exercisesfor Southern African Critical Infrastructure

300+ ready-to-run tabletop exercises aligned to global standards IEC 62443, NERC-CIP, NIS2 and NIST — with Southern African regulatory context for the Mining, Energy, Water, Ports and Oil & Gas sectors.

✓ IEC 62443 ✓ NIST SP 800-82 ✓ CISA CTEP-Aligned ✓ NIS2 & NERC-CIP ✓ POPIA (South Africa) ✓ AU Malabo Convention ✓ SADC Model Law
300+
Ready-to-Run Exercises
6
Languages Supported
8
Global Frameworks Covered
15
SADC Member States
Global Standards — Included in Every Exercise

The International Frameworks Your Organization Already Answers To

From Johannesburg to Lusaka to Maputo — these are the global standards governing OT/ICS cybersecurity best practice. Every exercise maps to them, ensuring Southern African operations meet the same bar as global counterparts and satisfy corporate audit requirements.

IEC 62443
Industrial Cybersecurity Standard

The global benchmark for IACS security — referenced by Southern African mining, energy, and water sector operators. Scenarios map to security levels and control domains across SADC facilities.

NIST SP 800-82
ICS Security Guide (Rev. 3)

NIST's definitive OT security guide — widely adopted by multinationals operating mining, ports, and energy assets across Southern Africa. Rev. 3 controls referenced across all SADC sectors.

CISA CTEP
Cyber Tabletop Exercise Program

All 300+ exercises align to CISA CTEP objectives with CPG 2.0 framework mapping and structured After Action Report export for regulatory defensibility across SADC regulators.

ISO 27001
Information Security Management

Required by South African financial regulators and international investors in the region's mining and energy sectors. Scenarios support Annex A controls for risk and incident response.

NIS2
EU Network & Information Security Directive

European multinationals with Southern African operations must comply with NIS2 globally. Pro plan includes NIS2 compliance filters for essential and important entities.

DORA
Digital Operational Resilience Act

Pan-African banks and financial institutions with EU exposure apply DORA globally. Scenarios address ICT risk management and resilience testing requirements across SADC operations.

NERC CIP
Critical Infrastructure Protection

Energy sector multinationals with Southern African power generation and transmission assets — including SAPP interconnect operators — apply NERC CIP across all global sites.

NIST CSF 2.0
Cybersecurity Framework

Exercises cover all CSF 2.0 functions: Govern, Identify, Protect, Detect, Respond, Recover — the universal baseline applied across the 15 SADC member states.

Southern African Regulatory Context

Layered with Local Regulatory Alignment

Global standards form the foundation — Southern African regulations add the regional layer. Your teams exercise in context of both, producing evidence defensible to every regulator from Pretoria to Lusaka to Maputo.

POPIA
Protection of Personal Information Act (South Africa)

South Africa's landmark data protection law governs incident notification, data breach response, and information officer obligations for critical infrastructure operators across the SADC hub nation. Mandatory for all operators with South African operations.

➜ Assess Your POPIA Readiness
AU Malabo Convention
African Union Convention on Cyber Security & Personal Data Protection

The AU Malabo Convention establishes the continental cybersecurity framework ratified by multiple SADC member states — exercises reflect cross-border incident notification obligations and AU cybercrime response protocols.

ZICTA / POTRAZ
Zambia ICT Authority & Zimbabwe Postal & Telecom Regulatory Authority

Telecoms and internet infrastructure operators in Zambia and Zimbabwe are subject to ZICTA and POTRAZ cybersecurity regulations — exercises address incident reporting obligations for regional telecoms operators across SADC.

SADC Model Law
SADC Model Law on Computer Crime & Cybercrime

The SADC Model Law provides the harmonized cybercrime framework across member states — exercises address cross-border response coordination and obligations under Mozambique's MISA and Angola's emerging cyber regulations.

For Multinationals with Southern African Operations

Global HQ. Southern African Sites. One Platform.

The Challenge
Your Johannesburg, Lusaka, or Maputo facility must meet both: corporate global standards AND POPIA / AU Malabo obligations

Southern Africa's critical infrastructure faces a dual challenge: aging OT systems inherited from pre-digital eras and accelerating cyber threats targeting the region's mineral wealth and energy backbone. POPIA in South Africa, ZICTA in Zambia, and the AU Malabo Convention create overlapping obligations for operators across the SADC region — while the Southern African Power Pool (SAPP) interconnect means a breach in one nation can cascade across borders.

  • HQ mandates IEC 62443, ISO 27001, and NIST compliance globally
  • POPIA applies to all operations with a South African footprint
  • AU Malabo Convention creates cross-border notification complexity
  • SAPP power pool interconnects mean a breach in one nation cascades across borders
The CyberICS Solution
One exercise library. Global standards built in. Southern African regulatory context layered on top.

Multinationals with Southern African operations — from Anglo American and Glencore in mining to Shell and TotalEnergies in energy — face compliance requirements across 16 SADC member states simultaneously. CyberICS Solutions provides exercises calibrated for POPIA, AU Malabo Convention, and cross-border SAPP energy infrastructure.

  • Global compliance evidence for corporate audit and international investors
  • Local context for POPIA, ZICTA, POTRAZ, and SADC Model Law frameworks
  • After Action Reports defensible to both HQ and Southern African regulators
  • Multi-language support: English, French, Portuguese, German, Spanish, and Italian
Key Southern African Sectors

Built for Your Industry's OT Environment

Scenarios designed for the threat actors, control systems, and regulatory obligations facing Southern African critical infrastructure operators.

Mining & Extraction (Gold, Platinum, Diamonds, Coal)
Energy & Power Generation (Eskom, HCB, ZESA, ZESCO)
Water Treatment & Distribution
Ports & Maritime (Durban, Cape Town, Maputo, Beira)
Oil & Gas (Angola SONANGOL, Mozambique Offshore)
Manufacturing & Industrial (South Africa)
Telecommunications (MTN, Vodacom, Airtel SADC)
300+ Ready-to-Run Scenarios

From Eskom grid attacks to Durban port ransomware and Zambia copper mine SCADA compromise — scenarios grounded in the real threat landscape facing Southern African OT operators.

📄
POPIA & SADC Regulatory Framing

Exercises explicitly reference POPIA notification timelines, ZICTA and POTRAZ reporting obligations, and SADC cross-border coordination — alongside global IEC 62443 controls.

🌐
6-Language Support

Full support in English, French, Portuguese, German, Spanish, and Italian — covering the full Southern African linguistic landscape across all 15 SADC member states.

Scenario Examples — SADC Relevant

Exercises Built for the Southern African Threat Environment

From Eskom-scale power grid failures to offshore Angola LNG intrusions and Zambia copper mine SCADA compromise — exercises reflecting the actual threat landscape and regulatory obligations of Southern Africa.

OT / ICS
Eskom-Scale Power Grid Failure — Loadshedding Escalation to Cyber Incident

A state-sponsored threat actor exploits OT vulnerabilities in Eskom's SCADA infrastructure, escalating a loadshedding event into a confirmed cyber incident. NERC CIP, POPIA, and SAPP cross-border coordination obligations are simultaneously tested.

ICS/SCADA IEC 62443 POPIA Notification
⏳ 3–4 Hours 👥 8–15 Players Advanced
Cross-Sector
Durban Port Terminal Ransomware — Maritime OT

A ransomware attack disrupts Durban port terminal OT systems, cascading to affect cargo logistics and cross-border supply chains. POPIA obligations, SADC Model Law reporting, and parent company NIS2 requirements converge simultaneously.

Ransomware NIST CSF 2.0 POPIA & SADC
⏳ 3–4 Hours 👥 10–20 Players Advanced
Executive
Zambia Copper Mine SCADA Compromise — ZESCO Grid Impact

Threat actors compromise SCADA systems at a major Zambia copper mine, disrupting power draw from the ZESCO grid and triggering cross-border SAPP interconnect alerts. ZICTA reporting obligations and IEC 62443 incident response are exercised.

Executive ZICTA / SADC IEC 62443
⏳ 2–3 Hours 👥 5–10 Players Intermediate
Enterprise Inquiry

Request a Southern Africa Demo

Tell us about your organization. We'll map the platform to your POPIA, AU Malabo Convention, SADC, and global compliance requirements for your specific sector.

Ready to Elevate Southern African OT Cyber Resilience?

Join critical infrastructure teams across the SADC region running professional exercises aligned to global standards and local regulation.

Start Free Trial — 3 Exercises View Full Platform