homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Developing ICS/OT Engineering Cyber Defense Teams
DeanParsons_340x340.png
Dean Parsons

Developing ICS/OT Engineering Cyber Defense Teams

ICS security managers don't get to choose if they're a target of a cyber attack, but do get to choose many things about their OT security program.

August 17, 2022

OT_Eng_CyDef_Teams_-_Blog_-_Art-01.png

Relying on control systems and critical infrastructure is commonplace. Flipping on a light switch at home or the office, pumping gas into your vehicle at a gas station, pouring water from a tap— we rely on industrial control and critical infrastructure systems to support all these things and ultimately our modern way of living. We rely on some of these critical systems to generate and distribute power and heat to our homes, businesses, and healthcare centers. In the fuel manufacturing industry, there’s a reliance on the production and refining of oil & gas. For critical city and town services for our homes there’s a reliance on the management of our water systems, etc.

This interconnected and interdependent complex mix of both legacy and modern computer systems and engineering systems is responsible for processes in the physical world. They require additional considerations when it comes to security. For the teams managing and tactically defending this control system infrastructure, the skills and knowledge of safety, engineering, control system deployments, and more, is required beyond the tried true and tested security skills applied to protect traditional Information Technology (IT) systems.

Modernization, ICS Risks, ICS Teams

Industrial Control Systems (ICS) were not always as connected, highly automated, or complex as they are today. ICSs had been designed, built, tested, and deployed for a particular purpose and ran on proprietary protocols in isolation. These systems were engineered and operated in a completely isolated network away from other networks, including those in the outside world such as IT business networks and the public Internet.

Over the years of advancements in modern network technology and equipment, as businesses sought cost savings benefits, control systems have shifted away from an isolated control environment toward a more connected environment. Of course, more external connections ultimately broke the isolated, or "air-gapped," model, making ICSs less isolated and therefore more exposed to cyber risk.

This shift changed the risk surfaces and the threat landscape. We’ve seen increased threats including ransomware and tailored ICS-specific attacks against engineering control systems. As such the shift has also changed the security job tasks, security roles, and knowledge required to now perform ICS security for the protection of these engineering processes in today’s threat landscape.

ICS-specific Cyber Security Requirements

We do not get to choose if we are a target of a cyber-attack. However, as ICS/OT security managers and tactical cyber defenders in ICS/OT, we get to choose many things about our control system security program. This includes but is not limited to how we conduct ICS incident response, how we prioritize safety, which tools will be available to assist our tactical teams, where best to deploy control system network visibility. And of course, we get to choose who will be on our teams defending our critical infrastructure. We have some much opportunity for ICS defense! Whether working in a converged IT/ICS or specific ICS security team, it is imperative those selected as ICS/OT security defenders be trained with the ICS-specific knowledge and have the many ingredients needed for protecting control systems.

An ICS Security Team Skills Recipe

Securing Data vs. Enabling and Securing Physics: Traditional IT security focuses on digital data at rest or data in transit and the pillars of C.I.A. (Confidentiality, Integrity, and Availability). Operating technology/industrial control systems (OT/ICS) manage, monitor, and control real-time engineering systems for physical input values and control output for physical actions in the real world. The main priority in OT/ICS is safety and reliability of operations.

Modern trained ICS cyber security staff understand the nuances between traditional IT and ICS security, the ICS mission, safety, the engineering process, ICS protocols and active defense strategies that excel inside control environments, impacts of incidents in ICS to equipment, the environment, and people. A recipe to help us obtaining, training and retaining the top ICS security defenders include these ingredients:

OT_Eng_CyDef_Teams_-_Blog_-_Art-02.png

Technology and Processes (even if automated) do not get us far in the defense space without a trained and focused workforce. Human defenders—the people (workforce)—are the ones who use the ICS security technologies, work with the engineering, safety, business, IT department, and other teams and understand the ICS mission, possible impacts and recovery. These people understand the industrial process, protocols, normal vs. abnormal for engineering operations network traffic patterns, safety with context, the commonly targeted assets in control systems, etc.

If you're lucky, you'll...

  • inherit a good team
  • get to choose your team
  • be able to build a good team

You know you've succeeded in building an effective ICS security team when:

  • Your team contributes to the safety and reliability of operations.
  • The engineering, operators, and safety teams communicate well with you.
  • You are still with the organization.
  • People totally want to join your team.
  • Other organizations or departments wish to steal your team members.

Split brain! Conflict of interest! Safety! - Set up for success!

Safety could be at risk if information or traditional business systems are prioritized over industrial engineering control systems. Or, if the responsible reporting structure for ICS/OT security fails to fully embrace the differences between IT and OT/ICS.

Consider, for instance, a security incident on the IT business email system, and a security incident on the SCADA (Supervisory control and data acquisition) system of a power grid occurred simultaneously. Which incident gets the priority to focus efforts, tools, and team members to investigate, respond, and defend? What pace and rigor will the organization give to the incident selected as a primary focus. More specifically, what drives the decision to manage these very different risks, and related impacts, in these different environments?

Did the organization select their focus based on what was the most important for the safety of the people, the environment, and the organization overall? Today’s ICS incident response teams must understand the control system processes, the engineering, industrial protocols, safety factors, and ICS-specific cyber threats and tailor incident response playbooks, and risk management strategics accordingly.

AdobeStock_176860280.jpeg

ICS418: ICS Security Essentials for Managers

The ICS418: ICS Security Essentials for Managers course empowers leaders responsible for securing critical infrastructure and operational technology environments. The course addresses the need for dedicated ICS security programs, the teams that run them, and the skills required to map industrial cyber risk to business objectives to prioritize safety. The course speaks to the needs of the full range of managers, including:

  • Managers asked to "Step-Over"
    • Traditional information technology (IT) security managers who must create, lead, or refine an ICS security program
  • Practitioner to Manager "Step-Up"
    • Industrial engineers, operators, or ICS security practitioners promoted to a manager position to create, lead, or refine an ICS security program
  • "In-Place" Managers
    • Existing ICS security managers who need to further develop their leadership skills specific to industrial security

In-Class Industrial Management Simulation 

Those familiar with the Cyber42 cybersecurity leadership simulation game may have learned about it when taking SANS Cybersecurity Leadership courses. SANS has extended this awesome tool for ICS418 by introducing Cyber42: Industrial Edition, which borrows many features from the original Cyber42 game. The scenarios are specific to industrial control systems and, of course, safety is added to the mix of industrial cyber incidents. In Industrial Cyber42, the object of the game is to finish with the highest safety culture.

Take ICS418 with Dean and get to know him!

Check out Dean's upcoming ICS418 scheduled classes, see more of his ICS community contributions, and learn more about him here.

For deeper insights about building robust ICS/OT cyber defense teams, securing your critical infrastructure, and fostering an organization-wide culture of safety, download the SANS Strategy Guide: ICS is the Business.

    Share:
    TwitterLinkedInFacebook
    Copy url Url was copied to clipboard
    Subscribe to SANS Newsletters
    Receive curated news, vulnerabilities, & security awareness tips
    United States
    Canada
    United Kingdom
    Spain
    Belgium
    Denmark
    Norway
    Netherlands
    Australia
    India
    Japan
    Singapore
    Afghanistan
    Aland Islands
    Albania
    Algeria
    American Samoa
    Andorra
    Angola
    Anguilla
    Antarctica
    Antigua and Barbuda
    Argentina
    Armenia
    Aruba
    Austria
    Azerbaijan
    Bahamas
    Bahrain
    Bangladesh
    Barbados
    Belarus
    Belize
    Benin
    Bermuda
    Bhutan
    Bolivia
    Bonaire, Sint Eustatius, and Saba
    Bosnia And Herzegovina
    Botswana
    Bouvet Island
    Brazil
    British Indian Ocean Territory
    Brunei Darussalam
    Bulgaria
    Burkina Faso
    Burundi
    Cambodia
    Cameroon
    Cape Verde
    Cayman Islands
    Central African Republic
    Chad
    Chile
    China
    Christmas Island
    Cocos (Keeling) Islands
    Colombia
    Comoros
    Cook Islands
    Costa Rica
    Cote D'ivoire
    Croatia (Local Name: Hrvatska)
    Curacao
    Cyprus
    Czech Republic
    Democratic Republic of the Congo
    Djibouti
    Dominica
    Dominican Republic
    East Timor
    Ecuador
    Egypt
    El Salvador
    Equatorial Guinea
    Eritrea
    Estonia
    Eswatini
    Ethiopia
    Falkland Islands (Malvinas)
    Faroe Islands
    Fiji
    Finland
    France
    French Guiana
    French Polynesia
    French Southern Territories
    Gabon
    Gambia
    Georgia
    Germany
    Ghana
    Gibraltar
    Greece
    Greenland
    Grenada
    Guadeloupe
    Guam
    Guatemala
    Guernsey
    Guinea
    Guinea-Bissau
    Guyana
    Haiti
    Heard And McDonald Islands
    Honduras
    Hong Kong
    Hungary
    Iceland
    Indonesia
    Iraq
    Ireland
    Isle of Man
    Israel
    Italy
    Jamaica
    Jersey
    Jordan
    Kazakhstan
    Kenya
    Kiribati
    Korea, Republic Of
    Kosovo
    Kuwait
    Kyrgyzstan
    Lao People's Democratic Republic
    Latvia
    Lebanon
    Lesotho
    Liberia
    Liechtenstein
    Lithuania
    Luxembourg
    Macau
    Madagascar
    Malawi
    Malaysia
    Maldives
    Mali
    Malta
    Marshall Islands
    Martinique
    Mauritania
    Mauritius
    Mayotte
    Mexico
    Micronesia, Federated States Of
    Moldova, Republic Of
    Monaco
    Mongolia
    Montenegro
    Montserrat
    Morocco
    Mozambique
    Myanmar
    Namibia
    Nauru
    Nepal
    Netherlands Antilles
    New Caledonia
    New Zealand
    Nicaragua
    Niger
    Nigeria
    Niue
    Norfolk Island
    North Macedonia
    Northern Mariana Islands
    Oman
    Pakistan
    Palau
    Palestine
    Panama
    Papua New Guinea
    Paraguay
    Peru
    Philippines
    Pitcairn
    Poland
    Portugal
    Puerto Rico
    Qatar
    Reunion
    Romania
    Russian Federation
    Rwanda
    Saint Bartholemy
    Saint Kitts And Nevis
    Saint Lucia
    Saint Martin
    Saint Vincent And The Grenadines
    Samoa
    San Marino
    Sao Tome And Principe
    Saudi Arabia
    Senegal
    Serbia
    Seychelles
    Sierra Leone
    Sint Maarten
    Slovakia
    Slovenia
    Solomon Islands
    South Africa
    South Georgia and the South Sandwich Islands
    South Sudan
    Sri Lanka
    St. Helena
    St. Pierre And Miquelon
    Suriname
    Svalbard And Jan Mayen Islands
    Sweden
    Switzerland
    Taiwan
    Tajikistan
    Tanzania, United Republic Of
    Thailand
    Togo
    Tokelau
    Tonga
    Trinidad And Tobago
    Tunisia
    Turkey
    Turkmenistan
    Turks And Caicos Islands
    Tuvalu
    Uganda
    Ukraine
    United Arab Emirates
    United States Minor Outlying Islands
    Uruguay
    Uzbekistan
    Vanuatu
    Vatican City State
    Venezuela
    Vietnam
    Virgin Islands (British)
    Virgin Islands (U.S.)
    Wallis And Futuna Islands
    Western Sahara
    Yemen
    Zambia
    Zimbabwe

    By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Recommended Training

    • LDR512: Security Leadership Essentials for Managers™
    • SEC450: Blue Team Fundamentals: Security Operations and Analysis™
    • LDR516: Building and Leading Vulnerability Management Programs™

    Tags:
    • Industrial Control Systems Security

    Related Content

    Blog
    Blog: Living Off The Land Attacks and Countermeasures in Industrial Control Systems
    Industrial Control Systems Security
    October 10, 2023
    Living Off the Land Attacks and Countermeasures in Industrial Control Systems
    As attacks on critical infrastructure and industrial control systems become brazen, ICS defenses must go beyond just preventative security.
    DeanParsons_340x340.png
    Dean Parsons
    read more
    Blog
    ICS_Blog_Series-_A_Look_into_ICS-Part_22.jpg
    Industrial Control Systems Security
    April 4, 2022
    A Look Into ICS612: ICS Cybersecurity In-Depth: Part 2
    In OT security, you'll eventually be placed in an environment where you'll face the pressures of dealing with a process that's not responding.
    Jeffrey Shearer
    Jeffrey Shearer
    read more
    Blog
    ICS_Webcast_Series_-_Cyber_Resilience_Active_Defense_&_Safety_Blog2.jpg
    Industrial Control Systems Security
    January 24, 2022
    ICS Cyber Resilience, Active Defense & Safety Series: Parts 1-5
    This series covers foundational, intermediate, and advanced ICS cyber security defense techniques. Watch Parts 1 - 5 below.
    ICS_Icon_Blue.png
    SANS ICS Security
    read more
    • Company
    • Mission
    • Instructors
    • About
    • FAQ
    • Press
    • Contact Us
    • Careers
    • Policies
    • Training Programs
    • Work Study
    • Academies & Scholarships
    • Public Sector Partnerships
    • Law Enforcement
    • SkillsFuture Singapore
    • Degree Programs
    • Get Involved
    • Join the Community
    • Become an Instructor
    • Become a Sponsor
    • Speak at a Summit
    • Join the CISO Network
    • Award Programs
    • Partner Portal
    Subscribe to SANS Newsletters
    Receive curated news, vulnerabilities, & security awareness tips
    United States
    Canada
    United Kingdom
    Spain
    Belgium
    Denmark
    Norway
    Netherlands
    Australia
    India
    Japan
    Singapore
    Afghanistan
    Aland Islands
    Albania
    Algeria
    American Samoa
    Andorra
    Angola
    Anguilla
    Antarctica
    Antigua and Barbuda
    Argentina
    Armenia
    Aruba
    Austria
    Azerbaijan
    Bahamas
    Bahrain
    Bangladesh
    Barbados
    Belarus
    Belize
    Benin
    Bermuda
    Bhutan
    Bolivia
    Bonaire, Sint Eustatius, and Saba
    Bosnia And Herzegovina
    Botswana
    Bouvet Island
    Brazil
    British Indian Ocean Territory
    Brunei Darussalam
    Bulgaria
    Burkina Faso
    Burundi
    Cambodia
    Cameroon
    Cape Verde
    Cayman Islands
    Central African Republic
    Chad
    Chile
    China
    Christmas Island
    Cocos (Keeling) Islands
    Colombia
    Comoros
    Cook Islands
    Costa Rica
    Cote D'ivoire
    Croatia (Local Name: Hrvatska)
    Curacao
    Cyprus
    Czech Republic
    Democratic Republic of the Congo
    Djibouti
    Dominica
    Dominican Republic
    East Timor
    Ecuador
    Egypt
    El Salvador
    Equatorial Guinea
    Eritrea
    Estonia
    Eswatini
    Ethiopia
    Falkland Islands (Malvinas)
    Faroe Islands
    Fiji
    Finland
    France
    French Guiana
    French Polynesia
    French Southern Territories
    Gabon
    Gambia
    Georgia
    Germany
    Ghana
    Gibraltar
    Greece
    Greenland
    Grenada
    Guadeloupe
    Guam
    Guatemala
    Guernsey
    Guinea
    Guinea-Bissau
    Guyana
    Haiti
    Heard And McDonald Islands
    Honduras
    Hong Kong
    Hungary
    Iceland
    Indonesia
    Iraq
    Ireland
    Isle of Man
    Israel
    Italy
    Jamaica
    Jersey
    Jordan
    Kazakhstan
    Kenya
    Kiribati
    Korea, Republic Of
    Kosovo
    Kuwait
    Kyrgyzstan
    Lao People's Democratic Republic
    Latvia
    Lebanon
    Lesotho
    Liberia
    Liechtenstein
    Lithuania
    Luxembourg
    Macau
    Madagascar
    Malawi
    Malaysia
    Maldives
    Mali
    Malta
    Marshall Islands
    Martinique
    Mauritania
    Mauritius
    Mayotte
    Mexico
    Micronesia, Federated States Of
    Moldova, Republic Of
    Monaco
    Mongolia
    Montenegro
    Montserrat
    Morocco
    Mozambique
    Myanmar
    Namibia
    Nauru
    Nepal
    Netherlands Antilles
    New Caledonia
    New Zealand
    Nicaragua
    Niger
    Nigeria
    Niue
    Norfolk Island
    North Macedonia
    Northern Mariana Islands
    Oman
    Pakistan
    Palau
    Palestine
    Panama
    Papua New Guinea
    Paraguay
    Peru
    Philippines
    Pitcairn
    Poland
    Portugal
    Puerto Rico
    Qatar
    Reunion
    Romania
    Russian Federation
    Rwanda
    Saint Bartholemy
    Saint Kitts And Nevis
    Saint Lucia
    Saint Martin
    Saint Vincent And The Grenadines
    Samoa
    San Marino
    Sao Tome And Principe
    Saudi Arabia
    Senegal
    Serbia
    Seychelles
    Sierra Leone
    Sint Maarten
    Slovakia
    Slovenia
    Solomon Islands
    South Africa
    South Georgia and the South Sandwich Islands
    South Sudan
    Sri Lanka
    St. Helena
    St. Pierre And Miquelon
    Suriname
    Svalbard And Jan Mayen Islands
    Sweden
    Switzerland
    Taiwan
    Tajikistan
    Tanzania, United Republic Of
    Thailand
    Togo
    Tokelau
    Tonga
    Trinidad And Tobago
    Tunisia
    Turkey
    Turkmenistan
    Turks And Caicos Islands
    Tuvalu
    Uganda
    Ukraine
    United Arab Emirates
    United States Minor Outlying Islands
    Uruguay
    Uzbekistan
    Vanuatu
    Vatican City State
    Venezuela
    Vietnam
    Virgin Islands (British)
    Virgin Islands (U.S.)
    Wallis And Futuna Islands
    Western Sahara
    Yemen
    Zambia
    Zimbabwe

    By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
    • Privacy Policy
    • Terms and Conditions
    • Do Not Sell/Share My Personal Information
    • Contact
    • Careers
    © 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
    • Twitter
    • Facebook
    • Youtube
    • LinkedIn