A single cyberattack could cripple your energy systems. CDeX trains you to stop it before it happens.
Learn to detect, respond to, and neutralise threats targeting renewable energy systems
with a dedicated CDeX training scenario.
When your grid is under attack, there’s no time to learn.

Cyber threats to renewable energy are increasing
Every year, the renewable energy sector grows, bringing greater integration with national power grids. But this progress comes with risks.
of global electricity generation comes from renewable energy.
.jpg)
was the average cost of a cyber breach in the energy sector in 2022.
largest risk in the natural resources sector is cyber-attacks.

CDeX is your way to stay safe.
State-backed actors and cybercriminals are increasingly targeting renewable energy organisations and cyber-attack strategies evolve constantly.
A single breach could cost millions in lost revenue, fines, and reputation repair, not to mention the cascading impact on energy prices and supply.
What is CDeX?
CDeX is a Cyber Defence Exercise Platform, that was originally founded in 2016 as a project within Vector Synergy.
Since then, it has grown to become the industry’s leading cyber range for high-level security and competency training.
Using MITRE ATT&CK®, CDeX replicates real-world attack scenarios targeting SCADA, IoT, and grid management systems.
The latest CDeX training focuses on the unique challenges of securing renewable energy systems: SRESA.

Why train with CDeX?
Your industry
Train on real attack scenarios that you could face as soon as tomorrow. Create your own training exercises with an easy drag-and-drop scenario builder.
Your terms
Access CDeX via any device—whether at your desk or remotely—supporting both micro-sessions and full-day training events.
Your infrastructure
Create your digital twin, recreate networks, subnetworks and machines, as well as IoT/SCADA devices and get your infrastructure up and running.

5 Pillars of Cybersecurity
5
Tools (Firewalls, EDR, IDS/IPS, etc.)
4
System Architecture (Secure network design, segmentation, zero trust)
3
Procedures (Incident response plans, security protocols)
2
Processes (Continuous monitoring, compliance frameworks)
1
Human Readiness (Cyber training, real-world simulations, decision-making under pressure)
Train like you fight and fight like you train
Hardware, firewalls, and automated defences are essential. But your security is only as strong as its weakest link. And the weakest link is always human readiness.
CDeX is built to strengthen the human element in your security stack.
Only CDeX trains you in all five pillars
Get prepared for real attacks on renewable energy systems
The CDeX cyber range includes a scenario based on real-world attacks against wind farms.
The training will help you test your skills and make sure you:
Know how to react in real-world situations
When a cyberattack happens, you can’t stop performing your duties to focus solely on the threat. The training takes that into consideration and will help you develop critical thinking skills and learn how to make decisions quickly, while keeping your systems running and operational.
Recognise and respond to a range of threats
Experience what it’s like to defend against a cyberattack in real time, so you know exactly what to do when it happens for real.
Know what to expect from future threats
The training utilises both current and emerging attack methods, which means you’ll be ready to handle even the latest and most unexpected threats.
How does the SRESA scenario work?
The SRESA scenario places you in the control room of a wind farm under cyberattack.
Assume a key role monitoring SCADA systems, managing PLC controllers, and securing grid operations. Begin your shift as usual, but stay vigilant. Sudden drops in energy production, suspicious turbine commands... are they routine errors or the start of a cyberattack?
It’s up to you to find out.

During the course of the training, you’ll face three progressive attack waves, each requiring faster and sharper responses:
Phase 1:
Routine monitoring, spotting minor anomalies.
Phase 2:
Rising threats, multiple alerts demanding attention.
Phase 3:
Full-scale cyberattack—dividing focus between system defence and operational duties.
What will you learn?
Before CDeX, blind spots left your assets exposed. After, you’ll:
Know how to detect, respond to, and neutralize threats before they cause critical damage.
Test your skills under pressure and see weather you can defend your systems while keeping them operational.
Be ready to defend against both well-known and emerging attack methods used by cybercriminals and state-backed actors.
