- Register

 
 

Home>IIot & Smart Technology>Cyber Security>Exploring OT cybersecurity
ARTICLE

Exploring OT cybersecurity

03 December 2025

Digital transformation is putting new responsibilities on already-busy OT professionals and requiring a new outlook on the ownership of the complex task of cybersecurity, asserts Lee Carter, Cyber Security Product Manager - SolutionsPT

ULTIMATELY, DIGITAL transformation is a force for good, opening the flow of data in industrial settings to give the all-important human operators the tools for continuous improvement and operational excellence. However, the increased digitalisation of industrial operations has exposed OT systems to new cybersecurity risks. These can potentially impact an entire enterprise and are putting new responsibilities and actions into the hands of OT professionals.

Industrial settings have many unique cybersecurity considerations which can’t be ignored. These risks must inform a holistic approach to cybersecurity that works from the network edge to the data centre and cloud. While this is complex, there are steps that can simplify the journey and ensure that cybersecurity does not hinder digital transformation efforts.

Holistic approach

Recent statistics are demonstrating the need for a holist approach to cybersecurity:

- In June this year BT warned that UK SMEs are primary targets for hackers after ransomware incidents on businesses have doubled in the space of a year and many still do not view training as a priority.

- The UK Government’s official statistics for cyber security breaches in 2025 shows that just over four in ten businesses (43%) and three in ten charities (30%) reported having experienced any kind of cyber security breach or attack in the last 12 months.

- An interesting statistic from Statista shows that even with growing OT responsibility for cybersecurity, only 5% of organisations are outsourcing cybersecurity management and training for OT, compared with 3% in 2023.

- Perhaps the most significant figure comes from the National Cyber Security Centre’s annual review 2025, which reported that nearly half of all incidents handled by the NCSC over the last 12 months were of national significance. And 4% of these were categorised as ‘highly significant’ (having a serious impact on central government, UK essential services, a large proportion of the UK population, or the UK economy).

Together, these statistics highlight the growing risk of cyber-attacks on OT systems and that many businesses think that current IT-cybersecurity measures are enough to protect the full enterprise, without considering the unique needs of OT or seeking out dedicated expertise.

OT environments of all sizes include a combination of new and legacy assets, often not operating to the same cyber secure standards. The addition of IIoT devices and the connection of previously standalone assets to enterprise-wide operations, extends the potential attack surface. Combine these elements with the fact that OT systems often operate continuously and staying ahead of OT cybersecurity becomes a full-time job. For industry to be protected and realise its full potential, cybersecurity must be tailored to address the specific needs of OT applications.

What does a cybersecure OT enterprise look like? 

The human operator has and will always remain the most valuable element in every OT environment, with individual operators becoming more crucial as the skills gap grows.

Today, OT operations is a blend of manual policing practices developed in the 1970s combined with modern day forensics. Many plants still operate based on experience led process knowledge to understand how things should look and feel, supported by real time data which confirms operator instincts. In the days of steam engines, wheels were hit with a hammer and the sound acted as an indication of asset integrity, today x-ray or ultrasound assessment of hardware serves a similar purpose in identifying asset fatigue.

Adding the important task of ensuring OT cybersecurity to that job role brings a host of complex considerations and actions, including training. With the right support in place, a consistent approach to skills development, and a culture shift that reflects cybersecurity as the responsibility of everyone, industrial business will create a cybersecure OT enterprise that will deliver the following:

- Understanding that due to safety requirements and availability needs an OT network requires a completely unique approach to cyber security: For OT systems containment or segmentation is needed to reduce unintended disruption to operations. Focus more reducing the impact of threats rather than prioritising the ease of recovery.

- Improved visibility for cyber resilience: Real-time monitoring and advanced analytics, including AI options, that can identify threats in OT systems before they impact the entire enterprise.

- Future-proofed operations: Businesses no longer have the luxury of thinking it won’t happen to them, it’s now important to see cyberattack on OT systems as a matter of time. Therefore, it’s imperative that all OT professionals are involved in business continuity and disaster recovery plans, with every member of staff made aware of potential issues with set actions for achieving business continuity.

- Proactive risk management: In modern industrial applications, especially when cybersecurity is concerned, there is very little separation between IT and OT. Conducting regular vulnerability assessments essentially becomes everyone’s responsibility, and it’s crucial this work isn’t done in isolation. In a cybersecure enterprise OT and IT teams both need to leverage their expertise to support operational excellence.

- Scalability/training: OT cybersecurity is a constantly moving target with attacks evolving to target OT environments. There’s no single endpoint to declare that securing an OT enterprise is complete. OT professionals, much like IT specialists, must stay aware of new threats and understand their role in maintaining security through training and dedicated support. This is especially true for businesses that are growing and advancing digital transformation as any technology has the potential to increase the attack surface. Ensuring cybersecurity for OT is an equal balance of people, process, and technology.

Simplifying the complex

Securing OT applications from cyber threats is complex and can be daunting for OT staff who are already balancing busy workloads. For teams looking for a cybersecure position, it’s worth exploring dedicated cybersecurity support that is tailored for the OT environment. With the right support, OT teams can simplify the process and explore the latest cybersecurity solutions, ensuring that digital transformation can be advanced with minimised risk and maximised results.

SolutionsPT makes industrial cybersecurity simple, with dedicated expertise to create end-to-end solutions for OT applications and support through targeted training programs that help teams to stay ahead of the cybersecurity curve. Digital transformation is a necessary journey for businesses to remain competitive but only when completed in a secure way that continues to protect OT systems as new technology is added.

Lee Carter is cyber security product manager at SolutionsPT

www.solutionspt.com

 
OTHER ARTICLES IN THIS SECTION
FEATURED SUPPLIERS
 
 
TWITTER FEED