How does Threat Hunting specifically for ICS/SCADA environments differ from standard alerting procedures?

Answer

It involves proactively searching for signs of adversary persistence or reconnaissance

ICS/SCADA threat hunting is a proactive measure where specialists look actively for hidden adversary activity within control system networks, rather than passively waiting for alarms generated by automated security tools.

How does Threat Hunting specifically for ICS/SCADA environments differ from standard alerting procedures?
jobcareerinfrastructuresecurity