Overview¶
A ~3-Hour Practical Workshop in OT Security Pentesting and Stakeholder Management
You are a red team hired to assess the security of Unseen University Power & Light Co., the primary electricity supplier for Ankh-Morpork. Your job: find vulnerabilities, create proof of concepts, and convince stakeholders to act.
The technical assessment is straightforward. The real challenge? Convincing the Archchancellor, the Bursar, the Chief Engineer, and ultimately Lord Vetinari that your findings matter enough to justify change.
This is experiential learning through roleplay. You can conduct a real penetration test using the UU P&L simulator, then face sceptical stakeholders who question your findings, your costs, and your credibility.
What you can do¶
Phase 1: Red team assessment (90 minutes)
Network reconnaissance of industrial control systems
Protocol-specific vulnerability discovery (Modbus, S7, OPC UA, EtherNet/IP)
Proof of concept development demonstrating real-world attack impact
Documentation of findings for stakeholder presentation
Phase 2: Stakeholder briefing (60 minutes)
Present findings to UU leadership and the Patrician
Face realistic pushback and challenging questions
Defend your recommendations under scrutiny
Negotiate priorities and timelines
Phase 3: Debrief (30 minutes)
Compare approaches across teams
Discuss communication strategies that worked (and didn’t)
Extract lessons for real-world assessments
Who might benefit¶
Security professionals transitioning to OT/ICS security
Penetration testers expanding into industrial systems
Red team operators working with critical infrastructure
Security consultants who need to present to non-technical stakeholders
Anyone who needs to convince sceptical executives to fund security
What you can learn¶
Technical skills:
Industrial protocol reconnaissance techniques
OT vulnerability assessment methodology
Creating convincing proof of concepts
Multi-stage attack campaign development
Communication skills:
Translating technical findings into business impact
Handling stakeholder pushback and difficult questions
Prioritising remediation under real-world constraints
Negotiating with operations, finance, and leadership
Strategic skills:
Understanding stakeholder motivations and concerns
Framing security in terms that matter to different audiences
Balancing technical accuracy with practical communication
Building coalitions for security improvements
Why this matters¶
Finding vulnerabilities in OT systems is easy. Industrial protocols have minimal security. With network access, you can often control critical systems in minutes.
The hard part? Convincing people to fix what you found.
Operations will push back on downtime requirements. Finance will question every cost estimate. Engineers will defend their designs. And executives will ask why they should care about theoretical risks when systems have “worked fine for 20 years.”
This workshop prepares you for the real challenge: not finding problems, but driving solutions.
Prerequisites¶
Basic networking knowledge (TCP/IP, ports, protocols)
Familiarity with security concepts (reconnaissance, exploitation, reporting)
Command-line comfort (Bash, Python)
No prior OT experience required
Workshop format¶
Duration: 3 hours
Team structure: Small groups (3-4 people) conducting independent assessments
Competition element: Teams compete for best technical demonstration and most convincing stakeholder presentation
Roleplay component: Facilitators play UU stakeholders with realistic concerns and pushback
Hands-on focus: 90 minutes of actual pentesting, 60 minutes of presentation roleplay
Required setup¶
Participants need:
Laptop (Linux, macOS, or Windows with WSL)
Python 3.12+
Git access to the simulator repository
4GB RAM minimum
Installation:
git clone https://github.com/ninabarzh/power-and-light-sim.git
cd power-and-light-sim
pip install -r requirements.txt
python tools/simulator_manager.py
Difficulty level¶
Technical: Intermediate (scripts are provided, protocol knowledge taught during exercise)
Communication: Advanced (stakeholder management is deliberately challenging)
Overall: This workshop is more difficult than participants expect. The technical work is accessible. The stakeholder roleplay is designed to be uncomfortable and realistic. But fun! At least experienced as fun later.
What makes this different¶
Most OT security training focuses on finding vulnerabilities. This workshop focuses equally on convincing people to fix them.
Most pentesting courses teach technical exploitation. This workshop teaches stakeholder communication under pressure.
Most security training uses lectures and demos. This workshop uses experiential roleplay where you make decisions and face consequences.
You learn by doing. You learn by struggling. You learn by experiencing realistic pushback from operations, finance, and leadership.
Learning outcomes¶
By completing this workshop, you will:
Conduct reconnaissance and exploitation against industrial control systems
Create proof of concepts that demonstrate impact to non-technical audiences
Present technical findings in business language
Handle defensive responses and budget objections
Prioritise remediation considering operational and financial constraints
Understand why technical competence alone is insufficient for effective OT security work
The Patrician factor¶
The ultimate challenge: convincing Lord Vetinari, Patrician of Ankh-Morpork, that UU Power & Light’s security matters to the city.
He will ask the questions you don’t want to answer:
“How does this compare to other risks facing the city?”
“What evidence suggests anyone would target a university power plant?”
“Your recommendations seem designed to justify your continued employment.”
“What happens if I do nothing?”
The Patrician is not hostile. He is analytical, strategic, and focused on stability. He will listen to evidence. He will not be rushed or impressed by severity ratings.
If you can convince Vetinari, you can convince anyone.
Next steps¶
This 3-hour masterclass provides practical introduction to OT security assessment and stakeholder management. For deeper learning:
Comprehensive OT security training: 2-3 day workshops covering full methodology
Advanced exploitation techniques: Nation-state TTPs and sophisticated attack chains
Detection and defence: Blue team perspective and monitoring strategies
Full-day simulation: University student program with extended roles and remediation focus
Support materials¶
Detailed scenario documentation
Facilitator guide
Stakeholder persona scripts
Example reports and presentations
Technical reference materials
Ready to begin?¶
The UU Power & Light network is waiting. The vulnerabilities are there. The stakeholders are sceptical.
Can you prove the threat is real? Can you convince them to act?
Find out in three hours.
“The thing about security is that insecurity is so much cheaper.” - Lord Vetinari (probably)