SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsNearly 40% of ICS environment compromises come from the IT business network that allows a threat into the ICS environment. So, it’s more important than ever to focus on the ICS perimeter defenses first, followed closely by the additional required segmentation within the ICS network itself.
An ICS DMZ introduces additional layers of protection and is therefore a must-have. An ICS DMZ acts as a buffer between the internal industrial network and external entities such as corporate networks or the internet.
Network architecture can support effective network segmentation, visibility of control system traffic for analysis, detection of threats, log collection, asset identification, industrial control systems DMZ, and enforcement zones. Through the right architecture, you can improve safety and system integrity.
Watch All Parts in This Series:
Dean Parsons, CEO of ICS Defense Force, has established comprehensive ICS security programs and leading industrial-grade incident responses across sectors like telecommunications and energy. He wrote the pivotal SANS ICS Cybersecurity Field Manuals.
Read more about Dean Parsons