You may not realize it, but your organization's Industrial Control System (ICS) environments are a target for cyber attackers. The ICS automation, process control, access control devices, system accounts, and asset information all have tremendous value to attackers. This poster demonstrates the many ways attackers can gain access to an ICS environment and demonstrates the need for active security efforts. The poster also incorporates the Purdue Model to illustrate the layered defense strategies necessary for informed engineering decisions and to reinforce secure behaviors when interacting with an Industrial Control System.