SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsA "good" ICS assessment is rooted in strategic risk management and disciplined execution, aiming to enhance the operational resilience of the ICS environment.

Industrial Control Systems (ICS) and Operational Technology (OT) drive critical infrastructure, manufacturing, and global supply chains. For CISOs, executive boards, and advisory committees, securing these environments is paramount, often prioritizing safety and resiliency. While cybersecurity assessments and penetration testing are essential tools for managing risk, their efficacy depends on organizational maturity and risk mitigation approaches.
Threat reports over the past two years highlight an alarming escalation in adversary efficiency and targeting that focuses on vulnerabilities in network edge and remote access devices. To counter this acceleration and ensure resilience, OT stakeholders and leaders must pivot their assessment outcomes toward foundational, prioritized remediation actions, best framed by the SANS Five ICS Cybersecurity Critical Controls.
A "good" ICS assessment is rooted in strategic risk management and disciplined execution, aiming to enhance the operational resilience of the ICS environment. This approach requires translating technical vulnerabilities into safety, operational, and business risks.
This proactive, intelligence-driven approach leverages assessment findings to build a defense that is resilient to compromise, rather than merely preventative.
"Bad" assessments typically stem from a lack of executive governance, failing to establish SANS ICS Cybersecurity Critical Control #2: Defensible Architecture or Control #3: ICS Network Visibility and Monitoring. They create a false sense of security by failing to capture the dynamic threat environment.
When organizations lack foundational OT cybersecurity governance controls, assessment findings become less reliable and offer limited protection for ICS/OT operations. This weakness contributed to the most common attack vector in 2024: compromises in IT that allowed threats to move into ICS/OT networks.
The "ugly" reality of ICS cybersecurity occurs when poor governance, particularly concerning network edge and remote access devices, intersects with the accelerating speed and sophistication of external threats.
Exploitation of vulnerabilities as the initial pathway to a breach witnessed substantial growth, tripling (200% increase) in the Verizon 2024 DBIR and growing further to 20% of initial access vectors in the 2025 DBIR. This surge is heavily supported by zero-day exploits targeting devices at the network periphery.
Assessments are "ugly" when they fail to evaluate SANS ICS Cybersecurity Critical Control #4: Secure Remote Access, which stresses eliminating shadow remote access, requiring MFA for external connections, and maintaining a complete inventory of access paths. Incidents like Colonial Pipeline, where initial access was gained through a legacy VPN path that was in the process of being decommissioned, demonstrate the grave consequences of ignoring secure remote access.
For executive leaders, including CISOs and board members, assessment findings must be translated into tangible metrics aligned with the SANS 5 ICS Cybersecurity Critical Controls to ensure investments directly drive operational safety and risk reduction. These five controls establish the essential strategic framework that enables the CISO to use assessment outputs and cybersecurity program efforts to support communications and briefings with executive leadership, effectively demonstrating the approach, state, and direction of the OT cybersecurity program.
Ultimately, these controls allow the CISO to move beyond technical findings and report on program health and risk reduction trends—the strategic measures the board relies on to exercise effective governance. The following table provides examples of the tactical and strategic metrics that CISOs and OT leadership can use, directly supported by assessment outputs and cybersecurity program efforts:

The SANS Five ICS Cybersecurity Critical Controls provide a balanced approach, moving organizations beyond purely preventive measures toward the essential detective and responsive capabilities needed to survive modern geopolitical and financially motivated attacks. Assessments that focus solely on compliance or technical checklists, resulting in "bad" or "ugly" findings like exposed edge devices, highlight a critical lack of governance. By consistently using the "good" assessment process to drive and mature the cybersecurity program, specifically by improving secure remote access, defensible architecture, and monitoring, the CISO can assure the board that when an incident occurs, the OT team is positioned to exercise its recovery skills, knowing they are in control and can limit the adversary's actions. Maturing the program via this feedback loop turns assessment findings into sustained, quantifiable risk reduction.


A visionary OT security leader, SANS Principal Instructor, and USMC veteran, Don co-authored ICS613 and teaches ICS410. He translates years of frontline experience into safer, practical methods to empower defenders protecting critical infrastructure.
Read more about Don C. Weber