SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
This 5th and final control involves understanding which cyber digital controls are deployed and what device operating conditions aid in risk-based vulnerability management decisions to patch vulnerabilities. This enables appropriate safety-informed mitigations to the impact and monitoring for possible attack exploitation internal to the control network.
Oil and natural energy consideration—Passively (safely) leverage control network traffic analysis to discover unpatched engineering asset vulnerabilities and prioritize mitigation and patching based on exploitability, while planning to mitigate high-rated vulnerabilities in upcoming scheduled downtime or maintenance windows.
Watch All Parts in This Series:


Dean Parsons, CEO of ICS Defense Force, teaches ICS515 and co-authors ICS418, emphasizing ICS-specific detection, incident response, and security programs that support OT operations—aligning practitioners and leaders on clear, defensible action.
Read more about Dean Parsons