comments for ppt:All three items under the ICS Processes Employed are missing. The Profile ICS devices section is missing, and when you submit the paper make sure you cover ALL devices not just one. You need more detail on the Apply ICS Security Best Practices section. The Identify Vulnerability Continous Monitoring Strategy is missing. Are these IA certified toosl is missing. Create scripts section is missing. You can trash the section taking about waste management, etc and focus on the content.