Cybersecurity Trends and Real-World Case Studies Workshop - PING 2025

Cybersecurity Trends and Real-World Case Studies Workshop - PING 2025

Date: March 29, 2025

Workshop Overview

This comprehensive workshop brought together industry expertise and academic research to provide participants with deep insights into current cybersecurity trends and real-world security challenges. The session was jointly led by Mr. Mohan Singh from Schneider Electric and Dr. Srikanth Prabhu from the Centre for Cybersecurity Lab, offering both industry and academic perspectives on modern cybersecurity challenges.

Workshop Leaders

Mr. Mohan Singh - Industry Perspective

Mr. Mohan Singh brings extensive experience in industrial cybersecurity from Schneider Electric, where he works on securing critical infrastructure and industrial control systems. His expertise in operational technology (OT) security and industrial cyber threats provided participants with invaluable insights into real-world security challenges facing modern industries.

Dr. Srikanth Prabhu - Academic Research Perspective

Dr. Srikanth Prabhu from the Centre for Cybersecurity Lab contributed cutting-edge research insights and academic rigor to the workshop. His research background in cybersecurity brought theoretical frameworks and emerging security paradigms to complement the industry perspective.

Key Topics Covered

Current Cybersecurity Landscape

  • Evolution of cyber threats in the digital age
  • Impact of remote work on cybersecurity posture
  • Emerging attack vectors and methodologies
  • Global cybersecurity statistics and trends

Industrial Cybersecurity Focus

  • OT/IT Convergence Security: Challenges in securing converged operational and information technology environments
  • Critical Infrastructure Protection: Safeguarding power grids, manufacturing systems, and essential services
  • Industrial IoT Security: Securing connected devices in industrial environments
  • Supply Chain Security: Protecting against sophisticated supply chain attacks

Academic Research Insights

  • Advanced Persistent Threats (APTs): Research findings on sophisticated, long-term cyber attacks
  • AI in Cybersecurity: How artificial intelligence is being used both for attack and defense
  • Zero Trust Architecture: Academic foundations and practical implementations
  • Quantum Computing Implications: Future-proofing security against quantum threats

Real-World Case Studies

Industrial Security Incidents

Mr. Singh presented detailed case studies from Schneider Electric's experience, including:

  • Analysis of actual industrial cyber attacks
  • Incident response strategies and lessons learned
  • Cost implications of cybersecurity failures
  • Successful defense implementations

Research-Based Case Studies

Dr. Prabhu shared academic research findings through:

  • Detailed technical analysis of recent high-profile attacks
  • Vulnerability research and disclosure processes
  • Emerging threat intelligence from academic research
  • Collaborative research with industry partners

Workshop Activities

Interactive Threat Analysis

  • Hands-on analysis of real security incidents
  • Group discussions on attack methodologies
  • Identification of security gaps and solutions
  • Best practices sharing sessions

Technical Deep Dives

  • Examination of actual malware samples (in safe environments)
  • Network traffic analysis demonstrations
  • Security tool evaluations and comparisons
  • Vulnerability assessment techniques

Industry-Academia Collaboration Examples

  • Joint research projects between Schneider Electric and academic institutions
  • Knowledge transfer mechanisms
  • Collaborative threat intelligence sharing
  • Industry-informed academic research directions

Key Learning Outcomes

Threat Intelligence

Participants gained understanding of:

  • Current Threat Landscape: Comprehensive overview of active threats
  • Attack Methodologies: How modern cyber attacks are executed
  • Defender Strategies: Effective defense mechanisms and frameworks
  • Industry-Specific Risks: Unique security challenges in different sectors

Practical Skills

  • Incident Response: How to respond effectively to security incidents
  • Risk Assessment: Methodologies for evaluating cybersecurity risks
  • Security Architecture: Designing robust security frameworks
  • Compliance and Standards: Understanding regulatory requirements

Strategic Insights

  • Business Impact: How cybersecurity affects business operations
  • Investment Priorities: Where to focus limited security resources
  • Emerging Technologies: Security implications of new technologies
  • Career Development: Opportunities in cybersecurity fields

Industry-Academia Bridge

This workshop exemplified the value of combining industry experience with academic research. The collaboration between Schneider Electric and the Centre for Cybersecurity Lab demonstrated how practical security challenges can inform research directions, while academic insights can enhance industry security practices.

Workshop Impact

The session provided participants with:

  • Comprehensive Understanding: Both theoretical foundations and practical applications
  • Industry Insights: Real-world challenges and solutions from Schneider Electric
  • Research Perspectives: Cutting-edge academic research and future directions
  • Networking Opportunities: Connections with both industry professionals and academic researchers

Connection to PING 2025

This workshop was perfectly aligned with PING 2025's focus on cybersecurity and digital transformation. It demonstrated how cybersecurity considerations are integral to successful digital transformation initiatives and highlighted the importance of securing AI and intelligent systems.

Future Implications

Participants left the workshop with:

  • Enhanced understanding of the evolving threat landscape
  • Practical knowledge for improving organizational security posture
  • Insights into career opportunities in cybersecurity
  • Awareness of the critical role of cybersecurity in Industry 4.0 and beyond

The workshop underscored the critical importance of cybersecurity expertise in an increasingly connected and digitized world, making it an essential component of PING 2025's comprehensive technology education program.