(Source: POWER magazine) As the ICS security community tries to understand ICS cyber threats and how to defend against them, it often turns to publicly available case studies and metrics …