The speaker will present 3 deployment scenarios for ICS network honeypots. Each scenario will discuss the setup, the types of threats often observed and how to respond to detections. These simple to build, easy to manage and low noise detection techniques will guide you to getting started with basic honeypot tools in your ICS environment.