The SANS Institute, a global leader in cybersecurity training, and the SERC Reliability Corporation, one of the regional entities responsible for ensuring the reliability of North America's bulk power system, have announced a strategic partnership. The collaboration is designed to provide advanced, hands-on cybersecurity training specifically for professionals in the U.S. electric utility sector. The initiative aims to strengthen the security and reliability of the nation's power grid, enhance the NERC Critical Infrastructure Protection (CIP) compliance posture of utilities, and address the growing skills gap in the operational technology (OT) security workforce.
The partnership is launching a national NERC CIP training initiative. The primary goals are:
The inaugural event of this partnership will be the ICS456: NERC Critical Infrastructure Protection (CIP) course, hosted at SERC's facilities from August 3-7, 2026. This course is tailored to both the technical practitioners who implement security controls and the compliance professionals who must document and audit them.
This partnership represents a significant investment in the security of the U.S. critical infrastructure.
Jason Blake, CEO of SERC, emphasized that the partnership is a direct investment in the human element of grid security. Tim Conway, ICS Curriculum Lead at SANS, highlighted the importance of building trust and collaboration between utilities and regional leadership.
The ICS456 course and the GCIP certification are designed to provide tangible benefits for NERC CIP compliance.
This initiative is a proactive measure to mitigate the risk of cyberattacks against the electric grid. By upskilling the workforce, utilities can improve their ability to:
This entire initiative is a form of advanced, specialized user training for critical infrastructure protection.
The training helps professionals understand and prepare for the rigorous auditing requirements of NERC CIP.
Training on ICS/OT security inherently covers best practices for network segmentation between IT and OT environments.
The SANS and SERC partnership directly supports Platform Hardening for the electric grid by educating the workforce on how to properly secure Industrial Control Systems (ICS) and Operational Technology (OT). The ICS456 course teaches professionals how to implement security controls that are specific to the NERC CIP standards. This includes hardening devices like PLCs and RTUs by disabling unnecessary ports and services, implementing secure configurations, and managing access control effectively. By training the people who manage these systems, the initiative ensures that hardening is not just a one-time checklist item but an ongoing process informed by deep technical understanding of both the systems and the regulatory landscape.
SANS Institute and SERC Reliability Corporation officially announce their strategic partnership.
The first joint training course, ICS456, is scheduled to begin.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.