Application of RAMS methodologies in OT Security Previous PresentationFake Company, Fake Factory but Real Attacks: Stories of a Realistic, High Interaction ICS Honeypot. Stephen Hilt