SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe 5th and final Module of the cybersecurity series on ICS Critical Controls for the Electric Sector focuses on understanding and managing risk. A successful ICS cybersecurity strategy balances defense and offense.
A mature vulnerability management program must consider many factors. It should focus on strategically patching vulnerabilities, implementing safety-informed mitigations to mitigate potential impacts, and actively monitoring for signs of pre-attack positioning from within the control network. But that’s only part of a risk-based vulnerability management program for ICS.
This training module describes how organizations can identify vulnerabilities by understanding adversaries. This module will include safe and informed mitigation, workarounds, and monitoring for attack preposition and pre-exploitation attack attempts. It will be complete with a nuanced discussion of the probability of exploitation, where, and how an adversary gets into the system.
Watch All Parts in This Series:
Dean Parsons, CEO of ICS Defense Force, has established comprehensive ICS security programs and leading industrial-grade incident responses across sectors like telecommunications and energy. He wrote the pivotal SANS ICS Cybersecurity Field Manuals.
Read more about Dean Parsons