SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe ICS Cybersecurity Control Secure Remote Access does more than just enable proper remote authentication and access into a properly architected and defensible ICS network. There may be several instances of remote access already deployed for remote substations, generating facilities, and other remote sites via legacy, vendor, integrator, or project access. Implementing this ICS cybersecurity critical control must start with conducting an access assessment to identify and document all remote access points within all local and remote sites.
This module will review general access credentials at levels 3 and 3.5, and potential risks deeper inside the ICS network. Setting up your remote access system properly can help utilities retain the benefits of modern control systems while reducing the risk of potentially devastating breaches.
Watch All Parts in This Series:
Dean Parsons, CEO of ICS Defense Force, has established comprehensive ICS security programs and leading industrial-grade incident responses across sectors like telecommunications and energy. He wrote the pivotal SANS ICS Cybersecurity Field Manuals.
Read more about Dean Parsons