SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
The ICS Cybersecurity Control Secure Remote Access does more than just enable proper remote authentication and access into a properly architected and defensible ICS network. There may be several instances of remote access already deployed for remote substations, generating facilities, and other remote sites via legacy, vendor, integrator, or project access. Implementing this ICS cybersecurity critical control must start with conducting an access assessment to identify and document all remote access points within all local and remote sites.
This module will review general access credentials at levels 3 and 3.5, and potential risks deeper inside the ICS network. Setting up your remote access system properly can help utilities retain the benefits of modern control systems while reducing the risk of potentially devastating breaches.
Watch All Parts in This Series:


Dean Parsons, CEO of ICS Defense Force, teaches ICS515 and co-authors ICS418, emphasizing ICS-specific detection, incident response, and security programs that support OT operations—aligning practitioners and leaders on clear, defensible action.
Read more about Dean Parsons