The Purdue Model: ICS Defense Foundation or Relic?
Course
Lim Shih Hsien of Seatrium rigorously assesses whether the Purdue model still holds up as an ICS defense framework and how applying zero trust principles across its classic levels can strengthen resilience in modern OT environments.
The Purdue model has defined ICS segmentation for decades, but IT-OT convergence, remote access and IIoT proliferation have tested its limits. Does this layered architecture still hold up against modern threats, and can zero trust principles be applied across its classic levels?
In this session, led by Lim Shih Hsien of Seatrium, you will learn:
- How to analyze the Purdue model's continued relevance for modern OT environments;
- How zero trust principles map to Purdue levels, and why the model's deterministic traffic patterns make behavioral anomaly detection more effective in ICS than in IT;
- How to evaluate a future-ready ICS defense strategy that addresses emerging threats, including AI-driven lateral movement and supply chain attacks, by returning to first principles of segmentation and defense-in-depth.
Here is the course outline:
The Purdue Model: A Foundation for Today's ICS Defense or an Artifact of the Past? |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
