SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis 5th and final control involves understanding which cyber digital controls are deployed and what device operating conditions aid in risk-based vulnerability management decisions to patch vulnerabilities. This enables appropriate safety-informed mitigations to the impact and monitoring for possible attack exploitation internal to the control network.
Oil and natural energy consideration—Passively (safely) leverage control network traffic analysis to discover unpatched engineering asset vulnerabilities and prioritize mitigation and patching based on exploitability, while planning to mitigate high-rated vulnerabilities in upcoming scheduled downtime or maintenance windows.
Watch All Parts in This Series:
Dean Parsons, CEO of ICS Defense Force, has established comprehensive ICS security programs and leading industrial-grade incident responses across sectors like telecommunications and energy. He wrote the pivotal SANS ICS Cybersecurity Field Manuals.
Read more about Dean Parsons