×
 
 Back to all courses

SGInnovate x Three North Stars Tech Talk: Mastering Proactive OT/ICS Cybersecurity with CTEM and Claroty

 

31 Jul 2025, Thursday2:00 PM - 6:00 PM (GMT +8:00) Kuala Lumpur, Singapore

 

32 Carpenter Street, 059911

0%

Overview

Due to the limited capacity for this Tech Talk, participants who have successfully registered will receive a confirmation of registration. 

Please lookout for a confirmation of registration which will be sent directly to your email. (Note: Only participants who have received this confirmation will be able to attend this Tech Talk). 

Join us for Tech Talk, a part of SGInnovate's Let's Tech It series—an exciting session where innovation meets practical application. This will be an insightful workshop designed to equip you with the knowledge and practical skills to navigate the evolving landscape of Operational Technology (OT) and Industrial Control Systems (ICS) security.

This session will delve into the proactive strategies of Continuous Threat Exposure Management (CTEM) and provide a hands-on experience with Claroty, a leading OT security platform. Discover how to gain unparalleled visibility into your OT environment, manage vulnerabilities effectively, and detect threats in real-time. 

Course Description & Learning Outcomes

Part 1: Introduction to Continuous Threat Exposure Management (CTEM) Services 

In today's dynamic threat landscape, a reactive approach to cybersecurity is no longer sufficient, especially for critical infrastructure. This introductory session will cover: 

  • What is CTEM? Understand the core principles of CTEM, a strategic and systematic approach to continuously identify, prioritize, validate, and remediate cyber exposures. We'll explore how CTEM shifts cybersecurity from a reactive, incident-driven model to a proactive, exposure-focused one.  

  • Why CTEM for OT? Discover the unique benefits of implementing a CTEM program within OT environments. Learn how it helps in:

    • Gaining a clear understanding of your organization's attack surface, including OTspecific assets.  

    • Prioritizing vulnerabilities based on their actual exploitability and potential business impact, rather than just CVSS scores.  

    • Reducing the "exposure window" and minimizing the likelihood of successful attacks.  

    • Aligning security efforts with business objectives by focusing on the most critical risks.  

    • Improving security posture and operational resilience.  

The Five Stages of CTEM: We'll walk through the key phases of a successful CTEM program:  

  • Scoping: Defining the boundaries and critical assets for your exposure management efforts.  

  • Discovery: Identifying all assets within the defined scope, including hardware, software, and communication pathways.  

  • Prioritization: Analyzing and ranking exposures based on exploitability, business impact, and active threats. 

  • Validation: Confirming the exploitability of prioritized exposures and the effectiveness of existing controls.  

  • Mobilization: Implementing remediation actions and continuously monitoring for new exposures.  

 

Part 2: Hands-On OT/ICS Security with Claroty 

This interactive session will provide a practical demonstration of Claroty's capabilities in securing OT and ICS environments. You will see firsthand how Claroty can help your organization: 

  • Achieve Comprehensive Asset Visibility: 

  • Deep Packet Inspection (DPI): Witness how Claroty passively monitors network traffic to automatically discover and profile all OT assets, including Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Human-Machine Interfaces (HMIs), and other industrial devices.  

  • Detailed Asset Inventory: Explore the rich contextual information gathered for each asset, such as vendor, model, firmware version, communication patterns, and operational criticality.  

  • Master Vulnerability Management: 

    • Automated Vulnerability Identification: See how Claroty identifies known vulnerabilities (CVEs) affecting your specific OT assets by correlating asset details with its extensive vulnerability database.  

    • Prioritization with Context: Learn how Claroty goes beyond simple vulnerability scanning by prioritizing vulnerabilities based on their exploitability, whether they are actively being exploited in the wild (leveraging CISA KEV catalog and EPSS), and the potential impact on your operational processes.  

    • Focus on Real Known Exploited Vulnerabilities: Understand how to identify and address vulnerabilities that pose an immediate and proven threat.  

  • Enhance Threat Detection: 

    • Baseline Network Behavior: Observe how Claroty establishes a baseline of normal network communication patterns within your OT environment. 

    • Anomaly Detection: See real-time alerts for deviations from the baseline, indicating potential malicious activity, misconfigurations, or operational issues.  

    • Signature-Based Detection: Understand how Claroty detects known OT-specific malware and attack techniques.  

    • Operational Alerts: Gain insights into non-security-related operational events that could impact production or safety.

Pre-course instructions

Please take note of the following: 

  • A laptop is required for hands-on activities during the session. Please ensure it is fully charged and able to connect to Wi-Fi 

  • Account Setup: By signing up for this Tech Talk, you consent to your email address being shared with Claroty for the purpose of creating access credentials needed for the course platform and tools. You can read Claroty’s privacy policy here.

Schedule

Date: 31 Jul 2025, Thursday
Time: 2:00 PM - 6:00 PM (GMT +8:00) Kuala Lumpur, Singapore
Location: 32 Carpenter Street, 059911

Agenda

Day/TimeAgenda Activity/Description
1:30pmRegistration begins
2:00pmTech Talk begins: Part 1
3:30pmBreak
3:45pmTech Talk: Part 2
5:30pmNetworking session
6:00pmEnd of Programme

Skills Covered

PROFICIENCY LEVEL GUIDE
Beginner: Introduce the subject matter without the need to have any prerequisites.
Proficient: Requires learners to have prior knowledge of the subject.
Expert: Involves advanced and more complex understanding of the subject.

  • OT Cybersecurity (Proficiency level: Beginner)

Speakers

Trainer's Profile:

Dylan Mak, Solutions Engineer, SEA, Claroty
Dylan Mak

Dylan Mak is a seasoned professional with over 15 years of experience in the field of Operation Technology and Cybersecurity. With a strong background in these domains, he has consistently demonstrated his expertise and leadership in various roles starting at Vector Infotech, and most recently at British Telecom. Currently, Dylan holds the position of Sales Engineer at Claroty. He engages with organizations to determine their challenges and needs, and proposes the best solution that aims to protect the organizations' critical assets while optimizing processes.

Trainer's Profile:

Richard Wen, CEO, TNS (Three North Stars Pte. Ltd.)
Richard Wen

TBC

Partners

TNS (Three North Stars Pte. Ltd.)Claroty
Technology:
Industries: