SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
The SANS Five ICS Cybersecurity Critical Controls emphasize monitoring industrial network communications internally, which holds both cyber defense benefits and direct engineering benefits. Without internal network visibility into how critical engineering assets communicate, many organizations early in their ICS/OT maturity journey “may be making security decisions with limited engineering context.” In the field, through my ICS Defense Force assessments and tabletop exercises, one of the most consistent gaps I see is a lack of visibility into the communications between the very assets that are both most targeted by adversaries and most critical to the environments that make, move, and power our world.
From an adversary perspective, the lack of visibility between critical engineering and OT assets creates attack opportunities that traditional security defenses are often not designed to detect. Many ICS/OT attacks do not rely on malware, as they abuse trusted systems and native ICS network protocols (Living off the Land). Without dedicated ICS/OT protocol-aware visibility into east-west communications inside the control environment, these activities can appear legitimate and may go undetected while resulting in serious safety consequences. This is why ICS/OT Network Visibility should be prioritized early, focusing first on the most targeted and critical assets, so facilities can safely understand, monitor, and defend the systems that directly impact operations.
The 2025 ICS/OT survey illustrates that more than one in five organizations experienced an ICS/OT incident, with 40% resulting in operational disruption and nearly 20% taking more than a month to recover. More than half of compromises originate from IT or external networks and then pivot into OT environments. Once inside, attackers commonly move toward a small set of high-value assets that provide control over key engineering physical processes. Prioritizing these targeted and critical assets is the most practical starting point for reducing risk in the ICS/OT threat landscape.
Four asset types consistently emerge as primary targets: programmable logic controllers (PLCs), engineering workstations (EWS), human machine interfaces (HMIs), and data historians.
Many organizations begin their ICS/OT network visibility journey at the IT/OT boundary, focusing on north-south traffic. While useful, this alone may not capture the activity that ultimately impacts operations at lower levels in the Purdue model.
Some of the most critical visibility exists inside the control environment, specifically east-west communications between those engineering workstations, HMIs, and PLCs. This is where legitimate commands are issued, logic is modified, and lateral movement generally occurs. Without this internal visibility, facilities may miss the actions that matter most for proactive industrial threat detection.
Since advanced attack techniques can move laterally between internal devices, and since ICS/OT attack vectors are not always through IT into ICS/IT networks, monitoring the north-south IT/OT boundary may provide limited operational security value without corresponding visibility inside the control environment. An effective strategy can be to prioritize internal ICS/OT network visibility first, then expand outward, trusting that their IT/OT boundary has appropriate best practice access control lists.
For practical guidance on deploying ICS/OT Network Visibility—including how to safely build an engineering asset inventory through passive analysis (avoiding risky active scanning), and how to prioritize east-west versus north-south visibility across the OT assets that matter most—join me for ICS515 at Network Security in Las Vegas in September. In class, I walk through this using real field experience and prepare you for the GRID certification exam. You’ll build, attack, and defend your own ICS515 PLC kit to detect real-world activity, then take it home to continue applying what you’ve learned! Looking forward to seeing you in class and in the field.
Best!
Dean



Dean Parsons, CEO of ICS Defense Force, teaches ICS515 and co-authors ICS418, emphasizing ICS-specific detection, incident response, and security programs that support OT operations—aligning practitioners and leaders on clear, defensible action.
Read more about Dean Parsons