Explore industrial control systems (ICS) and SCADA threat hunting techniques in this comprehensive conference talk from BSides Augusta 2016. Delve into the fundamentals of threat hunting, including its definition, the sliding scale of cybersecurity, and how to initiate a threat hunting program. Learn about hunting maturity and the threat hunting jawbreaker model. Discover methods for generating hypotheses using threat intelligence, situational awareness, and domain expertise specific to ICS environments. Examine real-world case studies from Ukraine, the UK, Norway, and a naval ship incident to understand common attack patterns. Gain practical insights on developing sample hypotheses and implementing effective threat hunting strategies in critical infrastructure environments.