When IT professionals and security admins look at their organization’s
OT network, too often they see nothing but a black hole. This is due to two reasons, the first, the
standard security controls applicable to IT are not valid in OT environments and secondly, security is usually not a top concern for OT teams. Additionally, in most cases, when
IT teams are faced with
OT-based incidents, these look like a collection of words with no real meaning, not to mention standardized response playbooks that fit into their current
SecOPS procedures.