The document discusses an analysis of nearly 900 public industrial control system (ICS) vulnerabilities, highlighting the need for improved communication and analytical expertise in addressing these vulnerabilities. It provides examples of vulnerabilities found in products from major vendors like Schneider Electric and Rockwell Automation, stressing the importance of proper disclosure and context from researchers. Key lessons include the necessity of unique identifiers for vulnerabilities, the critical role of trust in customer relationships, and the need for comprehensive analysis and proofreading.