Organizations across critical infrastructure, manufacturing, and other industrial sectors face a widening operational technology (OT) cybersecurity skills gap. A challenge driven by the rapid convergence of IT and OT environments. While digital transformation has connected industrial systems to enterprise networks and the cloud, the workforce has not kept pace. Traditional IT security teams lack the deep process knowledge required to protect industrial control systems, and OT engineers often lack formal cybersecurity training. This disconnect leaves essential operations vulnerable to increasingly sophisticated cyber threats.
The consequences are significant: longer incident response times, heightened exposure to ransomware and nation-state attacks, and a greater risk of operational disruption due to misapplied security practices. As regulatory pressure grows and attackers target critical infrastructure, the need for specialized OT cybersecurity expertise has become urgent. Ultimately, closing the OT skills gap requires recognizing that OT cybersecurity is a distinct discipline, not an extension of traditional IT security.
Leading organizations are responding by building cross-functional IT/OT security teams, investing in OT-specific training, creating hybrid cybersecurity roles, and leveraging managed OT security services to bridge immediate gaps. They are also prioritizing asset visibility, documentation, and standardized processes to reduce reliance on tribal knowledge.
The operational technology (OT) skills gap has become one of the most pressing and least understood cybersecurity challenges facing modern organizations. As industrial environments become increasingly digitized, companies discover that traditional IT security expertise does not automatically translate into effective OT cybersecurity. The result is a widening talent gap that leaves critical infrastructure and manufacturing operations exposed.
The core issue is simple: OT and IT evolved for fundamentally different purposes, and the people who work in each domain bring different backgrounds, priorities, and mental models.
IT security professionals are trained to protect data, networks, and applications. They have specific priorities to consider. But OT systems (PLCs, SCADA, DCS, HMIs, sensors, and industrial controllers) operate under a different set of constraints. In OT, the priorities flip:
IT Priorities | OT Priorities |
Confidentiality | Safety |
Data Integrity | Availability |
Rapid Patching | Physical Process Integrity |
System Standardization | Predictability and Uptime |
Network Segmentation | Legacy System Stability |
An IT security expert may know how to harden a server, but that doesn’t mean they understand how a Modbus register works, how a PLC scan cycle behaves, or why patching a controller during production hours could shut down a plant.
On the other side of the divide, OT engineers and technicians are deeply knowledgeable about:
Industrial control systems
Process automation
Safety instrumented systems
Vendor-specific hardware and protocols
But cybersecurity has not historically been part of their training. Many OT professionals still operate in environments where systems were designed decades ago with no native security controls and where air-gapped networks were assumed to be safe.
Digital transformation has accelerated the blending of IT and OT through the introduction of:
Cloud-connected industrial assets
Remote access for vendors and technicians
Industrial IoT sensors
Predictive maintenance platforms
Data-driven optimization tools
Building management systems
This convergence creates new attack surfaces faster than organizations can train or hire people to secure them.
The shortage of hybrid IT/OT cybersecurity talent has real-world implications:
Increased vulnerability to ransomware and nation-state attacks: OT environments are now prime targets because downtime has immediate financial and safety consequences.
Longer incident response times: When an attack hits an industrial system, IT teams often lack the context to respond safely, and OT teams lack the cybersecurity expertise to contain the threat.
Operational disruptions: Misapplied IT security practices (like aggressive scanning or untested patching) can unintentionally shut down production.
Regulatory and compliance pressure: Industries like energy, manufacturing, and water management are facing new cybersecurity mandates that require specialized OT knowledge.
Forward-thinking companies are taking a multi-pronged approach to build the workforce they need.
Instead of forcing IT to “own” OT security or expecting OT engineers to become cybersecurity experts overnight, organizations are building blended teams that share responsibility and knowledge.
Training programs now exist for:
ICS/SCADA security
Industrial network architecture
Secure remote access
Incident response in OT environments
Vendor-specific controller security
This training helps IT professionals understand the physical process implications of their decisions and helps OT professionals build cybersecurity literacy.
New job titles are emerging:
OT Security Engineer
ICS Cybersecurity Analyst
Industrial Network Architect
OT SOC Analyst
These roles require a mix of engineering, cybersecurity, and industrial operations knowledge.
Because the talent pool is limited, many organizations are turning to specialized OT cybersecurity providers for:
24/7 monitoring
Threat detection
Asset inventory
Vulnerability management
Incident response
This approach buys time while internal teams develop.
A surprising amount of OT knowledge lives in the heads of long-tenured engineers. Documentation helps reduce reliance on tribal knowledge and makes it easier for new cybersecurity staff. Areas to focus include:
Network diagrams
Controller configurations
Vendor access pathways
Patching schedules
Asset inventories
As modern enterprises adopt AI and other advanced technologies, the OT cybersecurity skills gap is going to become more apparent. It's imperative that critical infrastructure organizations that are OT-asset heavy follow the lead of peers who are successfully bridging this gap. Invest in training, create hybrid IT/OT security roles that fit your environment, and create mechanisms to ensure that cross-functional teams secure critical OT processes.
Jon Holzbauer is Operations Technology Systems Manager at Silgan Containers.