Exploring the IT/OT Incentive Gap

Jon Holzbauer writes about how IT and OT organizations can butt heads over the incentives that drive decision-making and how they shape priorities in protecting critical systems.

IT cybersecurity teams inheriting operational technology security and cyber-physical systems protection programs often come into these situations with competing incentives. This dynamic creates gaps in protecting OT and CPS that must be assessed and addressed.

Essential Topics (for Security Leaders)

Discover expert insights on Risk Management, Cyber Resilience, Vulnerability Management, and more. Learn how top security leaders safeguard critical cyber-physical systems.

Latest Insights in

The Department of Defense has issued comprehensive guidance requiring all organizational units to implement zero-trust security principles across operational technology (OT) systems, marking a fundamental shift in how the military secures critical infrastructure from power grids to manufacturing control systems.
Zero Trust
Operational Technology
Cyber Resilience
Federal

Pentagon Mandates Zero Trust Security Framework for Operational Technology Environments

George V. Hulme
IT cybersecurity teams inheriting operational technology security and cyber-physical systems protection programs often come into these situations with competing incentives. This dynamic creates gaps in protecting OT and CPS that must be assessed and addressed.
Risk Management
Operational Resilience
Industrial
Operational Technology
Cyber Resilience

Competing Incentives Create IT/OT Security Gaps

Jon Holzbauer
Connected process control technologies force asset owners to change their perceptions of risk, cyber resilience, and operational resilience.
Operational Technology
Operational Resilience
Cyber Resilience
Risk Management

Nexus Reflections and Predictions: Steven Sim

Steven Sim
ASL Roma 1, a public health provider in Rome, has distinguished itself in the global healthcare landscape over the past two years by implementing advanced cybersecurity strategies, moving toward a hyper convergent security model, the so-called HyperSOC, in response to the growing cyber attacks in the global healthcare sector.
Healthcare
Risk Management
Cyber Resilience

Nexus Reflections and Predictions: Stefano Scaramuzzino

Stefano Scaramuzzino