SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe SANS State of ICS/OT Security 2025 Report reveals critical gaps between fast detection and slow, complex recovery. Explore what 330+ ICS/OT professionals are prioritizing next, and what it means for your organization’s safety, resilience, and operational continuity.

of incidents began with unauthorized external access
of incidents take more than a month to fully remediate
of orgs have fully implemented ICS-aware access controls
fewer financial losses and safety impacts among orgs using mandatory controls
Join Tim Conway, Robert M. Lee, Jason D. Christopher, and Dean Parsons for a leadership-level discussion on how to secure remote access, extend visibility into controllers and remote sites, operationalize threat intelligence, and restore safely after an incident.




Half of ICS/OT incidents start with remote access. This blog explains why VPN and MFA alone fall short and what ICS-aware access really requires.



The 2025 report highlights challenges federal teams know well: securing remote access pathways, extending visibility below Purdue Level 3, and ensuring safe, validated recovery across mission-critical systems.
SANS ICS training builds the skills needed to strengthen these capabilities and prepare practitioners for GIAC certifications—including GICSP, GRID, and GCIP—which are formally aligned with DoW 8140 and mapped to NICE Framework work roles.







