SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhy Industrial Cyber Response Must Be Engineering-Led and Safety-First

Traditional IT incident response plans are built for environments dominated by general-purpose operating systems where isolating hosts, pulling network cables, killing processes, or reimaging systems is tolerable. Those assumptions do not hold in ICS/OT.
Most industrial control systems that run traditional operating systems help support the environment but there are more systems that are not running traditional operating systems that cannot be rapidly rebuilt with IT processes, and cannot be taken offline without impacting safety, reliability, and physical processes.
Applying IT-centric IR actions in OT—such as aggressive containment, indiscriminate isolation, or automated shutdowns—can halt production, could damage equipment, or create unsafe operating conditions.
This creates a massive and dangerous gap in critical infrastructure defense. ICS/OT incidents require response plans built around engineering context, process awareness, and operational continuity, not IT recovery playbooks. Without purpose-built ICS/OT incident response planning, organizations risk turning a cyber event into a self-inflicted control system outage.
According to the 2025 SANS State of ICS/OT Security Survey, more than one in five organizations reported an ICS/OT cyber incident in the past year, with many causing operational disruption and extended recovery timelines.
While detection and containment times have improved across some industrial sectors, remediation and safe recovery remain persistent challenges. This gap highlights a core reality many organizations are still grappling with: ICS/OT incident response is fundamentally different from traditional IT incident response. ICS/OT demands a tailored approach, and traditional IT incident response controls and processes can sometimes cause more harm than good when applied directly to industrial environments.
In IT environments, incident response is typically optimized around confidentiality, data protection, and rapid isolation of compromised systems. That approach works well for IT, and it should not change. In ICS/OT environments, however, priorities shift. Safety and operational integrity come first, followed closely by reliability. Taking an HMI, PLC, or protection relay offline, isolating a production line segment, or terminating access at the wrong time may reduce cyber risk, but it can also introduce immediate physical risk, disrupt critical services, or create unsafe process conditions.
As a result, ICS/OT incident response must be engineering-led, process-aware, and deeply informed by how industrial systems actually operate.
One of the most important distinctions in ICS/OT incident response is that containment does not always mean shutdown. If a threat is understood, constrained, and not actively impacting the physical process, maintaining controlled operations while containing the threat may be safer than aggressive isolation or shutdown. This requires real-time situational awareness and close coordination among cybersecurity teams, engineers, operators, and leadership.
When IT personnel are responsible for ICS/OT security without understanding these nuances, response actions are more likely to cause additional damage. Anyone responsible for an ICS/OT SOC or incident response function must be trained specifically in ICS/OT incident response.
Organizations that involve, or lead with, ICS/OT engineering and operations staff in incident response planning and exercises consistently report stronger readiness and faster recovery. Their response decisions are grounded in engineering and process realities rather than traditional IT security assumptions.
Industrial incidents are no longer dominated by malware alone. Increasingly, adversaries rely on living-off-the-land (LotL) techniques, abusing legitimate engineering systems, tools, credentials, and control system functionality already present in ICS/OT environments. These attacks are often far more difficult to detect than traditional malware-based intrusions.
Adversaries often move from IT into OT using valid credentials, trusted remote access paths, or shared identity infrastructure. Once inside the ICS network, they can leverage standard engineering software, HMIs, scripting tools such as PowerShell, and industrial protocols to interact directly with physical processes. No vulnerability, exploit, or custom malware is required if authorized access, often obtained through stolen credentials, already exists.
Real-world incidents demonstrate this clearly, from power distribution disruptions to water treatment system intrusions. In these cases, adversaries manipulated HMIs, issued legitimate control system protocol commands, or reprogrammed controllers using standard engineering workflows. In such scenarios, traditional security tools like anti-malware agents frequently fail because nothing appears overtly malicious from a software perspective.
From a defensive standpoint, several priorities consistently stand out when addressing living-off-the-land risk:
These realities place new demands on ICS/OT incident response programs. While it is important to leverage what works from IT incident response, those approaches must be deliberately adapted for industrial environments. Effective industrial response depends on having ICS-specific incident response plans.
These realities are central to the upcoming SANS IR Command Roundtable on March 5, 2026, where cross-domain security leaders will examine how real incidents unfold, where response breaks down, and what disciplined, coordinated execution looks like when the pressure is highest. The goal is not to treat ICS/OT as a separate problem, but to understand how it fits into the broader incident response landscape organizations must be ready for.
We hope you’ll join that conversation as we continue exploring what effective incident response requires in a world where cyber events increasingly have physical consequences.
Explore additional SANS incident response resources focused on safe, engineering-led response across IT and OT environments.


Dean Parsons, CEO of ICS Defense Force, teaches ICS515 and co-authors ICS418, emphasizing ICS-specific detection, incident response, and security programs that support OT operations—aligning practitioners and leaders on clear, defensible action.
Read more about Dean Parsons