homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Top 5 ICS Incident Response Tabletops and How to Run Them
DeanParsons_340x340.png
Dean Parsons

Top 5 ICS Incident Response Tabletops and How to Run Them

How prepared is your organization to respond to an industrial control system (ICS) cyber incident?

June 16, 2021

Construction_workers.png


How prepared is your organization to respond to an industrial control system (ICS) cyber incident? How resilient is it against Ransomware that could impact safety and operations? Does your organization have the ability to detect advanced persistent threats that use modern attack methodologies against your critical infrastructure?

Regularly conducted incident response tabletop exercises are part of a mature ICS Security Program that can identify weak points in security efforts and enable proactive defense to address this range of threats.

ICS Incident Response Tabletops Explained

Hockey_stick.png


ICS incident response tabletops are much like the pre-game practice drills that sports teams, like hockey teams, run before a game. Like pre-game drills, ICS incident response scenarios are designed to test all that will be needed once the game begins. In this case, however, the game is the serious business of cybersecurity, and it requires ICS defense capabilities, safety processes, and cyber preparedness. These proactive initiatives test the effectiveness of an ICS Security Program prior to an attack. Tabletops are paper-based, and they are conducted in roundtable discussions guided by an Incident Response Plan, knowledge of the engineering processes, and an understanding of the existing ICS security defenses. Weak points are identified and assigned to be addressed immediately in order to strengthen the program.

The question is, how will your industrial organization respond once the “game” begins?

How_Will_Your_ICS_Org_Respond.jpg



The Benefits of the ICS Incident Response Tabletop

ICS incident response tabletops provide a high return on investment in several important areas.

Validation – The tabletop exercises validate readiness by comparing the defense controls against existing controls. Areas of improvement are identified in industrial incident response plans, security, and safety playbooks. Simultaneously, tabletops help train new and established team members on the industrial process and ICS-specific security.

Situational Awareness and Team Building – Reviewing threat intelligence with the teams involved will educate them about adversary capabilities and attack techniques. Regularly performing tabletops will establish and strengthen cross-departmental relationships needed for incident response events that could span multiple industrial sites across large geographic regions.

Practical Defense Actions – Tabletop exercises can identify gaps is such critical areas as threat detection, data source collection, log correlation, network segmentation changes, access control updates, security and safety process changes, and the communication of roles and responsibilities. Effectiveness in all of these areas is key for a mature program. Tabletop actions will directly improve overall response time, reduce impacts on the engineering process, and increase safety.

ICS_Cogs.jpg



Planning and Running ICS Tabletops

Planning – Planning time will vary depending on team size, the scenario, resources, etc., but it typically can take anywhere from a few days up to 30 days. Even a planning phase of just 2 to 5 days is enough to provide value in the outcome. Spend time up front properly selecting realistic scenarios for your environment and selecting the right teams. Include as many team players and observers as is practical.

Tabletop Goals – Are you testing newly deployed technology, training new team members, or using through intelligence and recent sector events to validate or update your ICS Incident Response Plan? Or are your tabletops driven by compliance requirements? Set the goal and adhere strictly to timelines and frequency. Adhering to safety requirements will also be a goal in ICS.

Frequency – Some compliance programs suggest that tabletops be run every 15 months (for example, the NERC-CIP-008-6 Table R2 – Cyber Security Incident Response Plan Implementation and Testing). It is common practice to run a tabletop annually, and the exercise can be aligned with budget cycles.

Designate a Facilitator – A facilitator will keep things on track to ensure that the scenario is completely walked through and tested against the ICS Incident Response Plan. A facilitator can also ensure that everyone involved is engaged for maximize discussion, that notes are recorded, and that actions are assigned to individuals.

ICS Teams – Include all teams that are practical to involve. Invite observers to listen to the discussions for training purposes. Start with the following:

  • Safety – Include the on-site safety and emergency response team. • Physical Security – Include the on-site facility physical security team.
  • Compliance – Ensure that legal and regulatory compliance requirements are met.
  • Cybersecurity – Since cybersecurity drives the scenario, participants must understand the defenses and the Incident Response Plan, the technologies and the industrial operations process, protocols, critical assets, the network layout, etc.
  • Engineering – Include process control and field device technicians.
  • Operator – These are the persons who control the process via remote and embedded HMIs, etc.
  • Management – Management and director-level stakeholders for all teams involved need to have an awareness and understanding of ICS cybersecurity risk, impacts, protections, budget, resourcing, etc.

Scenarios for ICS – Select one of several suggested scenarios outlined in this document to get you started. Scenarios should be based on closing known gaps already identified in the program and on significant industry events that have occurred in your sector. Such a threat-centric approach leverages ICS threat intelligence specific to your sector.

Run Time – Run time will vary depending on the size of the teams involved and the complexity of the scenario selected. A typical tabletop for ICS can run from 2-3 hours to 1-2 days. Longer and more involved incident response exercises such as Hybrid or Live can run for several days.

Closing Gaps – Designate a person to take notes of related action items to be assigned to specific individuals. These actions might include investigations, enabling security features, completing assigned training related to a role, using a new ICS security tool, changing a network design (for example, aligning to Purdue), implementing new processes or technologies, etc.

Mini-Project, Action Tracking – Some ICS programs run tabletops as a small project internally or with an external third party. With either approach, it is common to see project managers dedicated to ensuring that tasks are completed on time and with an appropriate budget. Tracking tasks can follow the SMART (Specific, Measurable, Achievable, Realistic, Timely) objectives.

ICS Scenarios – Include Critical and Targeted Assets

There are many critical engineering ICS assets to protect, including physical systems and digital systems, and they usually span several geographic areas. Threat intelligence indicates these assets have been targeted in observed ICS attacks. At a minimum, the following critical ICS assets should be included in your scenarios:

Data Historian – This database stores operational process records. It can be abused to pivot from a compromised asset in IT to one in the ICS network(s).

Engineering Workstation – This workstation has access to software to program and change PLCs and other field device settings/configurations. Be aware of its location and of normal and abnormal access attempts to and from it. Pay attention as well to data exfiltration connections from the engineering workstation.

Human Machine Interface – The HMI is a visual interface between the physical process and operators that is used to review and control the process. Remote access, if required, should have secure, heavily controlled, and monitored multi-factor authentication.

Programmable Logic Controllers – PLCs connect the physical hardware in the real world and run logic code to read the state or change the state of the engineered process. An example is Safety Instrumented Systems (SIS) safety controllers.

The Top 5 ICS Incident Response Tabletop Scenarios

Here are 5 tabletop scenarios based on campaigns seen across multiple ICS sectors. Each scenario is presented with suggestions in the categories of Discussion, Teams, Protection, Detection, and Response. Use these categories to guide the tabletop exercise and to consider the effectiveness of your existing ICS security program. Customize the exercise to suit your needs.

Scenario_1.jpg

SCENARIO 1: Living off the Land: Native Industrial Control System Protocol Abuse

The engineering team troubleshooting network issues observes unusual ICS protocol communications (OPC, IEC104, Modbus/TCP, DNP3, ICCP, etc.) on the network. For example, there are unusual scanning rates of OPC to and from SCADA servers to outstations and other devices at several levels of the Purdue network architecture.

As an example, the CRASHOVERRIDE ICS attack framework can abuse the IEC-104 protocol, has built-in features to abuse other ICS protocols such as OPO, and has the potential to expand to also abuse DNP3.

DISCUSSION: Are your legitimate in-use ICS protocols in a list or baselined? Is ICS-specific (ICS protocol-aware) Network Security Monitoring (NSM) visibility deployed at Levels 0-3 of the Purdue model for IPFIX or full packet captures?

TEAMS: Engineering, Cybersecurity, Safety, ICS Network Architects.

PROTECTION: ICS-specific network monitoring – ICS deep packet inspection and ICS dissectors in use.

DETECTION: Trained ICS cybersecurity team members using ICS NSM and investigating suspected events in order to initiate incident response.

RESPONSE: ICS incident response playbook with required teams, check integrity of field devices and operations, loss of control = emergency.

Scenario_2.jpg

SCENARIO 2: Human Machine Interface Hijack: On-screen Suspected Activity

Human Machine Interface operators notice the on-screen mouse moving and clicking on different control buttons on the HMI, which is not consistent with normal operations or a scheduled change or safety emergency.

DISCUSSION: Which accounts and individuals have access to HMIs for local or remote access?

TEAMS: Engineering, Operators, ICS Security, Network Architects.

PROTECTION: Purdue Network Architecture, process control, operators having a process for reporting cyber events.

DETECTION: Secure remote access event monitoring - External->Internal, Internal->Internal - RDP, Multi-factor authentication, use of a jump box in ICS DMZ (Purdue Level 3, etc.).

RESPONSE: Disable remote access, run ICS on plant floor via embedded HMIs, investigate NSM network traffic patterns, enable islanding from Internet, IT, etc.

Scenario_3.jpg

SCENARIO 3: Physical Access to Cyber Access Event

The Physical Security team notices a hole cut into the physical security perimeter – the fence surrounding a remote facility. The team investigates and determines that the physical attack could be a two-part attack. Physical access was gained, then attackers pivoted to a cyber attack as containment was introduced into the control network at a remote site. Traditional break-ins have been observed to be for monetary value, such as copper theft from electric utilities. Some critical remote ICS sites could be vulnerable to a physical and a physical-cyber attack. This also presents a safety concern for workers in remote facilities such as electricity substations, switching yards, oil and gas valve stations, fuel storage facilities such as marine terminals, etc.

DISCUSSION: Physical security at remote sites could be the most vulnerable ICS facilities (substations, oil/gas storage facilities, valve stations, etc.).

TEAMS: Physical Security Teams, Engineering, Cybersecurity, Safety.

PROTECTION: Security guards stationed at site(s) or security checks on rotation.

DETECTION: Physical door alarms, surveillance cameras, rotating security guards, etc.

RESPONSE: Roll trucks to site, law enforcement.

SAFETY: A concern for adversaries in dangerous life-threatening situations and workers on-site in the event of a break-in.

Scenario_4.jpg

SCENARIO 4: Ransomware on IT or ICS/OT Networks

ICS operator workstations in a control center are infected with Ransomware and are inoperable to view or control the industrial process. Alternatively, the IT business network is inoperable due to a ransomware infection in the enterprise – critical ICS process application such as industrial billing and shipping logistics applications are inoperable.

DISCUSSION: Does ICS rely on IT, and to what extent? Is it possible to island ICS from IT in a cyber defensive position? 

TEAMS: IT, IT Security, ICS Security, Engineering, Operators, Safety.

PROTECTION: Email security (if IT is infected with the common email phishing vector), whitelisting on ICS endpoints, IT - ICS Network Segmentation (Purdue Network Architecture).

DETECTION: ICS-specific endpoint protection, ICS NSM (lateral movement)

RESPONSE: Is it possible or feasible to run the ICS process in manual mode from embedded HMIs on the plant floor in the event the primary HMIs are inoperable due to Ransomware or another threat? It may be possible to respond by cutting or limiting network segment communication for containment while fighting through the attack.

Scenario_5.jpg

SCENARIO 5: IT or ICS Network Pivot through Trusted Connections/OT Networks

The ICS Data Historian, a critical ICS asset, is a targeted and common pivot point from IT into ICS environments for attackers. The adversary can learn about the industrial operations by gleaning sensitive ICS data from information on the Data Historian. A set of compromised IT Active Directory credentials were used to access the Data Historian, then pivot into the industrial control environment. It is critical that ICS networks be segmented from the Internet and from the IT business network(s). Aligning with the Purdue Network Architecture to configure enforcement boundaries for protection is also affordable and effective.

DISCUSSION: Network segmentation, access control to and from Data Historian, multi-factor authentication, separate no-trust ICS Active Directory from IT Active Directory.

TEAMS: IT, Network Architects, Engineering, ICS Cybersecurity.

DETECTION: Network segmentation, access control technologies, and regular log monitoring of Data Historian and other trusted assets.

PROTECTION: Separate untrusted Active Directory for IT and ICS.

RESPONSE: Limit connectivity to Data Historian, look for signs of exfiltration from Data Historian to the Internet, C2 (Command and Control) servers, etc.

Scenario_6_bonus.svg

BONUS SCENARIO: Contaminated Transient Device

A contaminated transient device (for example, an infected USB device or laptop) is brought into a facility bypassing all physical security and cyber technologies. It is plugged directly into Safety Instrumented System (SIS) controllers (on the plant floor – Purdue Level 0-1) for routine maintenance such as patching/firmware updates.

DISCUSSION: Network and Device Access Control at sites – MAC filtering, device interrogation, automated malware analysis of common file types on USBs prior to being used at the site, etc.

TEAMS: Physical Security, Engineering, Cybersecurity, Safety.

PROTECTION: Network Access Control, ICS plant floor kiosks/scanners, laptops on isolated interrogation segment before being connected to field devices, internally managed (never exposed to external networks), loaded with vendor software available on-site for use only at the site.

RESPONSE: Allows/Disallows based on technical digital tokens on transient devices or a “clean” scan prior to plugging in and becoming active on the network.

ICS Incident Response Tabletop Summary

Regular incident response tabletop exercises are part of a mature ICS Security Program. They work proactively to identify weak points in ICS defense efforts, build strong relationships among several teams, and are commonly driven by proactive defense or compliance requirements.

How to Start Your ICS Incident Response Tabletops

  1. Select one of the presented realistic ICS Incident Response Tabletop Scenarios for your next exercise.
  2. Mature the process by creating your own scenario based on your ICS threat landscape by leveraging ICS threat intelligence, internal or external gap assessments, compliance reports, etc.
  3. Involve as many teams as practical, including Safety, Process Controls Engineering, Operators, ICS Network Architects, ICS Security, Plant Management, etc.
  4. Discuss, learn, take action, and repeat. “ICS Defense Is Doable!”


Dean Parsons' upcoming ICS515 course runs here:

  • SANSFIRE 2021 Online | July 12 - 17 | Register Today
  • SANS Dallas 2021 | October 11 - 16 | Register Today
Check out Dean’s ICS Contributions and Bio here.
Join the SANS ICS Community Forum - Tips, tricks, and Q&A to secure your ICS!


Watch the original webcast of the Top 5 Incident Response Tabletop and How to Run Them:

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Industrial Control Systems Security

Related Content

Blog
Industrial Control Systems Security
May 19, 2025
Culture Over Checklists: How NextEra Is Rethinking NERC CIP with People at the Center
When people ask me what makes a successful NERC CIP program, my answer is always the same: it’s not just about compliance, it’s about culture. You can meet every regulatory requirement and still be vulnerable. You can pass every audit and still lack resilience. The organizations that stand out—the...
370x370_Jason-D-Christopher.jpg
Jason D. Christopher
read more
Blog
emerging threats summit 340x340.png
Digital Forensics, Incident Response & Threat Hunting, Offensive Operations, Pen Testing, and Red Teaming, Cyber Defense, Industrial Control Systems Security, Cybersecurity Leadership
May 14, 2025
Visual Summary of SANS Emerging Threats Summit 2025
Check out these graphic recordings created in real-time throughout the event for SANS Emerging Threats Summit 2025
No Headshot Available
Alison Kim
read more
Blog
Blog - Cloudy with a Chance of_340 x 340.jpg
Industrial Control Systems Security
May 13, 2025
Cloudy with a Chance of Industrial Cyber Threats, Part 1
Cloud in ICS/OT can enable scalable data storage, remote monitoring, analytics, disaster recovery, & industrial process control capabilities.
DeanParsons_340x340.png
Dean Parsons
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn