(Source: POWER magazine)¬†As the ICS security community tries to understand ICS cyber threats and how to defend against them, it often turns to publicly available case studies and metrics¬†…