Workshops
29 – 30 Sept 2025 • NISR Training Centre, KigaliFrom Opportunities of Broadband Access through Spectrum Sharing in Africa [AFRALTI] to Digital Forensic Tools and Techniques [Tunji Adeferhinti and Giles Otowemo] and Industrial Control Systems (ICS) Cyber Security Defense [Dan Ehrenreich] this year’s workshops are not be missed
WORKSHOP 1Industrial Control Systems (ICS) Cyber Security Defensewith Daniel Ehrenreich
The training program/workshop described below focuses on the cybersecurity aspects of Industrial Control Systems (ICS), also known as Operation Technology (OT) and Supervisory Control and Data Acquisition (SCADA), Building and Energy Management Systems (BEMS). This program is aimed at professionals and organizations that design, deploy, operate, and/or maintain industrial automation and control systems.
Overview
We all know that Information Technology (IT) systems are focusing on assurance of Confidentiality, Integrity and Availability (CIA), using a broad range of IT-type cyber defense measures such as antivirus, firewalls, demilitarized zone (DMZ), unidirectional gateways (Diode), intrusion detection systems (IDS) and other.
On the other hand, for ICS-SCADA-OT type systems, the CIA factors are not the most important concern, as these systems must focus on the assurance of Safety, Reliability and Performance (SRP) of facilities. Among Industrial control verticals are Electricity production and distribution, Water distribution, Sewage treatment, Manufacturing, Building management, Smart cities and public safety, Communication networks, and more
Target Audience
The purpose of the workshop outlined below is to educate ICS-OT-SCADA engineers on cyber risks and defense, and IT engineers to better understand the solutions needed for protecting industrial and utility systems.
Upon completion of this workshop, participants will be able to continue with self-learning and acquire more knowledge in the field of industrial systems’ operation, cyber technologies and defense measures, understand the key terms, attack vectors, and defense processes, and you will be best prepared for the future challenges.
Workshop Structure
The proposed 2-day workshop conducted during the ACDF conference will be specifically customized for the people who registered for this pre-conference workshop and taking into consideration their basic knowledge and background.
Goals of the Workshop
The proposed workshop is designed a way that the participants, having just basic knowledge on cyber-secured operation of ICS-SCADA-OT facilities will gain knowledge, technologies and techniques which day can immediately use in the daily activity:
- Understanding the ICS-OT technology as related to cyber risks and defense
- Understanding the ICS architecture, related components and communication
- Understanding of the unique threat factors applicable for the ICS-OT facilities.
- Understanding the principal technologies used for cyber secured ICS-OT systems
- Learn effective methods and specific network defense architectures and techniques;
- Learn about standards and regulations for Industrial Control Systems (ICS);
- Learn technologies and methodologies used to conduct security audits;
- Learn how to harden an ICS architecture and updating systems;
- Conduct Incident-response (IR) skills in control system environments; and
This workshop is specifically suitable and mandatory for the following groups:
- People in charge of IT who need to know more on ICS SCADA risks and defense to assure better collaboration among these teams
SCADA/ICS engineers involved with design, maintenance of industrial plants and manufacturing processes
Operators dealing with control of renewable and other power technology plants, sewage plants, desalination and other chemical process plants
Broad range of managers interested upgrading their technical knowledge to make correct and cost-effective investment decisions - After this cyber technology and defense training related to Industrial cyber security the participants will also be better prepared to apply for formal certification classes such as CISO, GIAC, CISSP and other as applicable for your business activity and the needs of your organization.
About the Lecturer
Daniel Ehrenreich, B.Sc. Engineering, MBA, CISSP, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts. Daniel brings over 35 years of experience with SCADA-OT & ICS, deployed for electric power, water, sewage, oil and gas.
Since 2010 Daniel has combined his engineering activity with industrial cybersecurity, consulted to various organizations and delivered training sessions in Israel and across the world.
Previously Daniel held senior positions in with leading firms in Israel such as Waterfall Security, Siemens and Motorola Solutions dealing with cyber defense for industrial operations. Reselected as the Chairperson for the 10th ICS Cybersec Conference taking place on 7-1-2026 in Israel.
Workshop Itinerary
Module 1:
Introduction to ICS-OT-SCADA Technology
- Introduction ICS (SCADA, OT) architecture
- Introduction to BMS architecture
- Introduction to wireless communication for ICS
- Field Control units PLC, RTU, IED and Remote I/Os
- Use of Automation Servers, PAC and DCS in plants
- IIoT Sensors and Field Control Devices
- Introduction to system design and programming
- Summary and Q&A
Module 2:
Introduction to SCADA-Cyber Risks
- Introduction to ICS Security Vulnerabilities
- ICS and IT systems differences related to cyber risks
- Introduction to BMS Cyber security risks
- External & Internal attacks: MitM, DOS, DDoS, GPS
- Industrial Cyber Kill Chain attack process
- Introduction to the MITTRE ATT&CK process
- Safety and Cyber Security considerations
- Summary and Q&A
Module 3:
Cyber-attacks and Defense solutions
- Communications and Process related risks
- Principles of Encryption and Authentication
- Defense in Depth and packet’s inspection for ICS
- Firewalls, IDS, DMZ, UGW, Sensor inspection,
- Coordinated operation with SIEM, SOAR, SOC
- Best practices to enhance ICS-IIoT Cyber defense
- Conduction Secure Maintenance for ICS
Summary and Q&A
Module 4:
Cyber-attacks and Defense solutions
- Cyber security Assessment and action items
- Introduction to ISA 62443 standard
- Introduction to NIST 800 standards
- Introduction to BCP, DRP and IR
- Introduction to NERC CIP
- Basic principles of Forensics for ICS
- Explaining famous attacks on ICS worldwide
Q&A and open discussion
Daniel Ehrenreich
Leading ICS-OT-IIOT Cyber Security Expert, Consultant, Workshops Lecturer, International Keynote Speaker
Secure Communications and Control Experts
DATES29 – 30 Sept 2025
VENUENISR Training CentreKIGALI, RWANDA
WORKSHOP COSTUSD 1,000PER DELEGATE
WORKSHOP 2Enabling Capacity and Adoption of RF Spectrum Sharing for Africawith Leonard Mabele, Lead Research, AFRALTI
The Authorisation and Use of TV White Spaces (TVWS) across the globe ushered in a new era of spectrum management and regulation aligning to the global developments that had gained momentum on enabling opportunistic access to TV broadcasting spectrum that had become available due to the Analogue Switch-Off (ASO). TVWS was an important topic (still is) as it was the first step towards efficient use of spectrum in an opportunistic and dynamic manner.
Overview
While regimes such as the United States of America (USA), United Kingdom (UK), Canada, Singapore among other countries had published their regulations by 2015, the opportunity of the technology which was fitting for Africa where most pilots had been conducted, seemed to fall behind. Only about seven countries in Africa (South Africa, Kenya, Mozambique, Malawi, Ghana, Nigeria and Uganda) made active intentions to develop regulatory frameworks to support TVWS by 2020. By 2022, only Kenya, Malawi, South Africa and Uganda seemed to have developed the regulations to completion. Very few African countries followed suit to close their regulatory development journeys.
Since the dawn of TVWS, there have been significant advancements in the concept of spectrum sharing, under the strategic approach of Dynamic Spectrum Access (DSA), where civilian and military communication systems dynamically optimise spectrum use. With a wider context than cognitive radios, DSA techniques are incrementally evolving to make use of databases such as spectrum access systems[1] or Automated Frequency Coordination (AFC) systems[2]. What these systems mean is that various spectral datasets combined with cloud technologies are implemented to enable intelligent efficient spectrum usage. Therefore, Cybersecurity and mechanisms of data processing are key for the deployment and enhancement of DSA in many commercial and defense systems.
The evolution of DSA from TVWS, 6 GHz band’s Wi-Fi systems to cellular LTE and 5G with combined mechanisms of beamforming, multiple input and multiple output antennas as well as arbitration by base stations for efficient spectrum use, makes the DSA concept very key to be covered from various perspectives i.e. technical, regulatory and economic.
Hence, the workshop in Kigali on Spectrum Sharing Opportunities in Africa at the 2025 Africa Cyber Defense Forum (ACDF)[3] is meant to offer insight into the concept of Spectrum Sharing as an avenue of enabling digital innovation and affordable access to Internet while making efficient use of the radio frequency (RF) spectrum on the continent. The workshop will also serve as a benchmark of capacity building initiatives on the Dynamic Spectrum Access (DSA) Certification programme that was recently launched by the Dynamic Spectrum Alliance (DSA) collaborating with academic and research partners on the African continent (Strathmore University and the African Advanced Level Telecommunications Institute)[4].
[1] In TVWS, these databases were referred to as Geolocation Databases.
[2] https://dynamicspectrumalliance.org/wp-content/uploads/2019/03/DSA_DB-Report_Final_03122019.pdf
[3] https://africacyberdefenseforum.com/events/acdf-kigali-2025/
[4] https://strathmore.edu/news-articles/strathmore-university-leads-with-certificate-in-data-spectrum-access/
Target Audience
This workshop targets professionals working with National Regulatory Authorities (NRAs), Policy Makers, Wireless Internet Service Providers (WISPs), Telecom Industry Professionals, Technologists and Engineers in the RF spectrum domain as well as Cybersecurity and ICT Experts.
Workshop Structure
The Opportunities of Broadband Access through Spectrum Sharing in Africa workshop will cover a summary of the following topics, cognizant of the professional diversity and academic backgrounds of the participants attending the workshop.
- Significance of Spectrum for Connectivity.
- TV White Spaces.
- Wi-Fi 6E and Wi-Fi 7.
- Dynamic Spectrum Management Tools
- Coexistence Studies and Tools.
- Spectrum sharing in the International Mobile Telephony (IMT)
- Regulatory Landscape for Dynamic Spectrum Access (DSA).
Topic 2 to Topic 7 will share existing use cases, theoretical studies and practical demonstrations of various aspects of Dynamic Spectrum Access (DSA). This will also include forum discussions on regulatory approaches that can be adopted in various African countries in various RF bands for spectrum sharing. There will also be a special feature session presented by the Dynamic Spectrum Alliance on the concept of DSA and experiences across the globe. The final session during the workshop will also feature a special focus on data and cybersecurity aspects in the era of spectrum sharing.
Goals of the Workshop
The workshop targets to provide a platform of engagements on models of spectrum innovation (from the regulatory, economic and technical perspective) that can enable affordable Internet access and digital innovation, particularly in the era of Industry 4.0. The workshop, therefore, intends to have the participants achieve the following:
- Understand the comparison between traditional spectrum management and the approach of Dynamic Spectrum Management (DSM).
- Examine and discuss the new approaches of addressing spectrum management.
- Understand the emergence of TV White Spaces and its implication to the current trends of spectrum access.
- Exchange knowledge on the growth of Wi-Fi and the new emerging aspects of Wi-Fi 6E, Wi-Fi 7 and the upcoming Wi-Fi 8.
- Understand the concept of Dynamic Spectrum Management Systems (DSMS), cloud-based systems for coordinating spectrum sharing and the cybersecurity and data privacy implications.
- Understand the technical, economic and regulatory considerations and implications of new spectrum systems coexisting with incumbents.
- Describe the models of Non-Public Networks (NPN) and the opportunity it holds in compelling scenarios.
About Leonard Mabele
Leonard Mabele is a seasoned technology leader on various digital access projects in Kenya and Africa. He presently serves as the Lead Researcher at the African Advanced Level Telecommunications Institute (AFRALTI) looking at the emerging Wireless network technologies as well as Artificial Intelligence. Leonard was previously the Manager of the Wireless Networks and Internet of Things (IoT) Research Group at the iLabAfrica Research Centre of Strathmore University where he led the setup of the Engineering Makerspace and the Internet of Things (IoT) Lab.
Between 2023-2024, Leonard led the analysis studies of Non-Public Networks (NPNs) which focused on assessing the opportunities of deploying private LTE and 5G networks in the midband RF spectrum bands (including the C-band). Between 2021-2022, Leonard led the ITU-funded Research competition on Connect2Recover under the topic “Rebuilding Digital Inclusion for Rural Kenya from the Covid-19 pandemic,” that saw the lighting of dark fibre in two TVETs in Western Kenya and installation of ICT Hubs.
In 2019-2021, Leonard was the co-lead of the research that led to the development of the regulatory framework for TV White Spaces (TVWS) that was ratified in Kenya in May 2021. He subsequently led technical coexistence studies in the 6 GHz band (5925-7125 MHz) for RLANs and the incumbents- FS/FSS). Prior to this, he had led the Gap Analysis study on the Opportunistic Spectrum access of various RF bands in Kenya.
Leonard holds a B.Eng degree in Electrical and Electronics Engineering and an MSc. In Telecommunications and Innovation. He is currently pursuing his PhD in Computer Science under the topic “Implementation of a Low-Cost Cognitive Radio for Dynamic Spectrum Access (DSA) in the Sub-1 GHz band.”
Leonard Mabele
Research Officer
African Advanced Level Telecommunications Institute (AFRALTI)
DATES29 – 30 Sept 2025
VENUENISR Training CentreKIGALI, RWANDA
WORKSHOP COSTUSD 1,000PER DELEGATE
Workshop Itinerary
DAY ONE
Topic I: Significance of Spectrum for Connectivity
- RF Spectrum Usage for Connectivity.
- RF Spectrum Planning, Allocation and Coordination.
- Economics of the RF Spectrum.
- RF Spectrum Usage in Bridging the Digital Divide.
- New Approaches to Address Spectrum Management.
Topic II: TV White Spaces (TVWS)
- TV White Spaces and its Evolution
- TVWS Use Cases
- TVWS Regulations and Standards
- Case Studies – Worldwide Trials and Deployments
Topic III: Wi-Fi 6E and Wi-Fi 7
- Overview of Wi-Fi Standards and the Wi-Fi Alliance
- Evolution of Wi-Fi
- Wi-Fi 6E
- Wi-Fi 7
Topic IV: Dynamic Spectrum Management Tools
- Introduction to Dynamic Spectrum Management Systems (DSMS)
- DSMS Use for the CBRS (SAS) and their operation Model
- AFC in the 6 GHz Band and Other Potential Bands
- Relevant Data, Data Privacy and Cybersecurity Concepts
DAY TWO
Topic V: Coexistence Studies and Tools
- Fundamental Concepts of Interference Analysis
- Interference Calculations and Analysis Methodologies
- Coexistence and Interference Analysis Simulation Tools
- Simulation Scenarios of Coexistence Studies
Topic VI: Spectrum Sharing in the IMT Bands
- Tiers of Spectrum Sharing in the IMT Bands
- Licensed Shared Access (LSA) and Authorised Shared Access (ASA)
- IMT Spectrum Sharing Technologies, Existing
- Examples and GSMA Spectrum Positions
- Future Potential of Spectrum Sharing in the IMT Spectrum
Topic VII: Regulatory Landscape for DSA
- Overview of RF Spectrum Regulations and the
- Regulating Entities
- Regulatory Landscape on TV White Spaces
- Regulatory Landscape in the IMT Spectrum
- Regulatory Landscape in the 6 GHz Band
- Future Regulatory Considerations
WORKSHOP 3Digital Forensic Tools and Techniqueswith Tunji Adefehinti and Giles Otomewo
This 2-day Digital Forensic Workshop introduces the core concepts of digital forensics and various opensource tools that can be used in a forensic investigation. Participants will learn foundational knowledge and practical skills related to collecting, processing, analyzing, and reporting digital evidence. The workshop is designed for both beginners and those with some cybersecurity experience, offering an overview of digital forensics techniques and direction for further study in the field.
The workshop covers various types of digital forensic investigations and the free tools available for conducting them.
The workshop starts with an introduction of the role of digital forensics in cybersecurity. From there, we will discuss the investigation methodology, the digital forensics principles, and the best practices used in digital forensics investigations
Introduction
This workshop will cover the various types of cyberattacks, including malware, phishing, and BEC, and the tools and techniques used in various scenarios to detect and investigate these attacks.
You will also learn about the various types of digital evidence sources like desktops, laptops, mobile devices, servers, and cloud platforms examined for investigations. Throughout this workshop, you will be given access to a range of freely available software and resources to help you understand the practical processes of performing digital forensic analysis. This will include a range of open-source tools, case studies, and practical hands-on labs, blogs, online groups, and websites. Participants will have the opportunity to apply the concepts learned in a simulated environment, mimicking real-world scenarios and investigative challenges. These hands-on exercises will enhance the attendees’ critical thinking, problem-solving, and analytical skills, enabling them to tackle complex digital forensic investigations with confidence.
This 2-day workshop is designed to be interactive and engaging, fostering a collaborative learning environment. Participants will have the opportunity to engage in discussions, share their insights, and learn from experienced instructors who are well-versed in the field of digital forensics. By the end of this workshop, attendees will have the expertise to undertake basic digital forensic examinations. This workshop is ideal for beginners and individuals seeking to establish a strong foundation in digital forensics.
Prerequisites
No prior knowledge of digital forensics is required for this workshop. Participants are expected, however, to have a basic understanding of computer systems and networks and be able to use common functions in Windows and Linux operating systems.
Who Is This Workshop For?
This workshop is designed for anyone with an interest in digital forensics and to gain a better understanding of real-world practical uses of digital forensics. This workshop is suitable for:
- Cybersecurity professionals who want to enhance their skills in digital forensics.
- Law enforcement officials who need to investigate digital crimes.
- Students who want to develop a career in digital forensics.
- IT professionals who want to gain more understanding of digital forensics.
What Will You Learn?
By the end of this workshop, you will have basic foundational understanding of the digital forensics process and how to perform forensic operations in a forensically sound manner. You will have the knowledge necessary to collect, investigate, recover, and report on digital evidence.
You will learn:
- The principles and objectives of digital forensics
- How to follow the best practices and standards of digital forensics
- The role and responsibilities of a digital forensics investigator
- How to apply the best practices and standards for digital forensics
- How to identify and collect digital evidence from various sources and devices
- How to analyze digital evidence using appropriate tools and techniques
- How to present digital evidence in a clear and concise manner
Business/Organization Benefits
- Establish a strong baseline for a Digital Forensic readiness program.
- Collect and store digital evidence in a forensically sound manner.
- Perform proper Evidence Handling measures.
- Delivery quality detailed forensic reports to stakeholders and leadership.
Requirements
Basic knowledge of computers and computer technologies is required, however the ability to run forensic software applications to participate in workshop labs is optional but strongly encouraged for your learning experience (individuals without the capable hardware can follow along with and use the workshop demo system when available). A laptop with the following specifications:
- Windows 7, 10, or 11 OS
- Minimum 4 Core Processor with high computing speed
- 16GB RAM
- 300 GB of Free Space on Disk
- Administrative level rights to install forensic programs and alter system settings
About Tunji Adefehinti
Knowledgeable and resourceful problem solver. Highly productive and self-motivated professional with solid training and experience in the field of Computer Forensics, IT systems troubleshooting, Network Monitoring, Virus Removal, Intrusion Detection and Incident Response, Systems Integration, Complex Log analysis, and Data Recovery.
Currently servicing all facets of digital (Network, Memory, and Hard Drive) forensics to clients dealing with various cyber security attacks and internal fraud matters
About Giles Otomewo
Giles is a seasoned Digital Forensics and Incident Response professional with over 25 years of experience spanning law enforcement, mining, professional services, and insurance. He has worked with the City of London Police, Rio Tinto, and Booz Allen Hamilton, delivering expertise in cybersecurity, eDiscovery, and legal proceedings.
With a global track record investigating complex cases—from fraud to ransomware—he collaborates with legal teams and regulators across the UK, EMEA, North America, and Latin
America. As an Ambassador for The Cyber Helpline, Giles also supports victims of cybercrime, reinforcing his commitment to the digital community.
Outside of work, Giles channels his energy into fitness competitions and world travel, having explored more than 50 countries.
Workshop Itinerary
DAY 1:
Cybersecurity and the role of Digital Forensics
The agenda for this first day includes introductions and a brief overview of the workshop.
The session will address cybersecurity as an evolving industry and examine the role of digital forensics within it. The processes of conducting digital forensic analysis and handling evidence in accordance with forensic standards will be discussed, along with procedures for validating evidence sources prior to seizing and preserving materials.
Different areas of focus within digital forensics relevant to investigations will also be covered.
The day will conclude with a laboratory session where students build a virtual machine forensic workstation in preparation for Day 2’s hands-on labs and review frequently used forensic tools.
- Introductions
- What is Digital Forensic Investigation and its purpose
- Digital Forensics in Cyber – Incident Responders – Legal Examinations – Data Recovery
- Forensic Methodology – Identifying, preserving, recovering, analyzing and reporting
- Sources of Digital Evidence – Evidence Chain of Custody
- Forensic Lab/Workstation Environments
- Forensic Workstation Setup Lab
DAY 2:
Digital Forensic Sub-Focus Areas
and Hands-On Labs
This second day will address the procedures for conducting digital forensics and managing evidence in a manner consistent with forensic standards. It will include an overview of appropriate tools for processing evidence, as well as the roles of hashing and encryption in maintaining evidence integrity.
The importance of the digital forensic report, which documents investigative findings for stakeholder action, will be discussed. Participants will receive and review a digital forensic report template that can be used for future cases. The session will conclude with several practical labs focused on email, malware, network, logs, Windows registry, and memory forensic as evidence.
- Sources of Digital Evidence and the open-source tools to examine them
- Hash vs Encryption Algorithms
- Hands-on Labs – FTK Imager (Disk Acquisition, Verification, Memory dump collection), Flare-VM (Email and Malware Analysis), Volatility (Memory Forensics), EZ-Tools (Windows Registry and Log Analysis), and Kanvas (case management tool for tracking and documenting investigations)
- The Digital Forensic Report Format
- Closing Q&A
Tunji Adefehinti
Lead DFIR Engineer
Financial Institution

