Staying ahead of ICS security vulnerabilities