What will your cyber attack look like? Adversary campaigns often use similar and recognizable techniques. As an ICS defender, your defensive actions (or lack of actions) will determine what your next attack will look like. Use this poster to take you through the steps of determining an attack.