{"id":3233,"date":"2025-06-11T14:05:38","date_gmt":"2025-06-11T12:05:38","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3233"},"modified":"2025-06-20T10:29:28","modified_gmt":"2025-06-20T08:29:28","slug":"part-1-2","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/","title":{"rendered":"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors"},"content":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p><p><strong><em>Seats are limited, so be sure to register for the workshop when you register for the conference.<\/em><\/strong><\/p>\n<p>This workshop on Hardening will give insights on the various aspects of a hardening process, the ins and outs of hardening will be explained, how to perform hardening, why the concerned hardening settings are important and what to strengthen to reduce potential attack vectors. Potential consequences of the hardening steps taken will be explained, and students will be guided towards creating a (basic) hardening script and system policies to assist in doing the actual hardening for similar systems within their environments. The potential pitfalls you might run into while performing hardening of standalone or domain-joined systems will be explained as well.<\/p>\n<p>The workshop covers operating systems such as Windows 10 and Windows Server (as it is the most used operating system to provide Human Machine Interfaces to operators) but also Linux elements, network components security and industrial control system devices will be explained. Attendees will understand after the workshop how to verify hardening using common security tools and will understand what steps are to be taken for the hardening of systems and environments. Through real-world scenario-based exercises, attendees will get a thorough understanding of what can and should be done to protect their industrial environments.<\/p>\n<p>This workshop is divided into 4 parts of 40 min, each part including a lab (except for part 1).<\/p>\n<p>Workshop attendees should bring a laptop with a working virtualisation software installed (any is good, preferably VMWare), with as virtual machines default installations of Windows 11 or Windows 2019 \/ 2022 server. Windows LTSC as an image can be used as well.<\/p>\n<p>&nbsp;<\/p>\n<h1>Part 1:<\/h1>\n<ul>\n<li>The Hardening process explained<\/li>\n<li>Problems you might run into during performing hardening<\/li>\n<li>Hardening &amp; IEC62443<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p>\n<p>This workshop on Hardening will give insights on the various aspects of a hardening process, the ins and outs of hardening will be explained, how to perform hardening, why the concerned hardening settings are important and what to strengthen to reduce potential attack vectors.<\/p>\n","protected":false},"author":29,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[11],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Technical Level: IntermediateThis workshop on Hardening will give insights on the various aspects of a hardening process, the ins and outs of hardening will be explained, how to perform hardening, why the concerned hardening settings are important and what to strengthen to reduce potential attack vectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T08:29:28+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/\",\"name\":\"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-06-11T12:05:38+00:00\",\"dateModified\":\"2025-06-20T08:29:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/","og_locale":"en_GB","og_type":"article","og_title":"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors - Industrial Security Conference Copenhagen","og_description":"Technical Level: IntermediateThis workshop on Hardening will give insights on the various aspects of a hardening process, the ins and outs of hardening will be explained, how to perform hardening, why the concerned hardening settings are important and what to strengthen to reduce potential attack vectors.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-06-20T08:29:28+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/","name":"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-06-11T12:05:38+00:00","dateModified":"2025-06-20T08:29:28+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3233"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/29"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3233\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3233"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3233"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}