An unexpected error occurred: 
      

OT Cybersecurity Looks to IT in 2026

Companies are investing in threat detection services and performing OT asset inventory initiatives while bringing IT departments along for the ride.

The future is now for management to implement OT cybersecurity strategies, including training of IT staff.
The future is now for management to implement OT cybersecurity strategies, including training of IT staff.
adam121/Adobe Stock

Investments in cybersecurity tools are paying off. In the recent 2025 SANS State of ICS/OT Security Survey, the study revealed that nearly half (49%) of all incidents were detected within 24 hours, and 55% were contained within 48 hours in the manufacturing and industrial sectors. The study suggests investments in threat detection services are working, and visibility into OT processes, with the help of Information Technology (IT) departments, is making substantial gains.

However, the 2025 SANS report reveals that visibility into deeper operational levels of the ISA-95 (Purdue model) manufacturing standard is lacking.

Below are the results: (Source: SANS report):

  • Level 3 (Operations Systems): 19.7% report full visibility
  • Level 2 (Supervisory Control - SCADA/HMI): Just 10% report full visibility
  • Level 1 (Basic Control - PLCs/RTUs): Coverage is even thinner
  • Remote Sites: 17.5% report coverage across distributed operations

Recent studies show OT cybersecurity investments are coming from IT departments. The reason for these cybersecurity investments are legacy devices that were never meant to be online and to prioritize OT asset inventory initiatives since experienced operators and plant managers are retiring.

With numerous industrial networking protocols at food plants, threat detection services deliver much needed visibility at this level for OT and IT personnel.With numerous industrial networking protocols at food plants, threat detection services deliver much needed visibility at this level for OT and IT personnel.2025 SANS Report

“As IT and OT environments continue to converge, organizations must focus on foundational security practices that improve visibility and resilience without disrupting operations,” says Sean Tufts, Field CTO at Claroty, a supplier of cyber-physical systems protection and asset visibility services, enabling brands to automatically map and virtually segment networks. “This includes maintaining accurate asset inventories, securing remote and third-party access, improving network segmentation, and continuously monitoring asset behavior across geographically dispersed facilities.”

Growing OT cybersecurity investments 

The 2025 SANS report ranked asset inventory/visibility as the top investment category, with 50% of respondents citing asset inventory as their main investment. Another 54% responded that it will remain the top priority for 2026-27.

“The initial customer goal with threat monitoring is to create and automate OT asset inventory,” says Alexandre Peixoto, Cybersecurity Business Director at Emerson. “IT has said to OT that IP addresses are showing up in our networks, so what kind of asset inventory and protection mechanics are in place for your devices?” Emerson works with multiple reputable cybersecurity vendors to deliver native OT tools to food manufacturers.

In addition, Emerson enables plants to conduct OT asset inventory using its Guardian Digital Platform before implementing any threat monitoring solution. “The most important piece of threat monitoring is to perform threat and vulnerability management, but many companies are still in the asset inventory phase,” adds Peixoto. 

“Our clients still need more data about all assets,” adds Rick Kaun, Global Director of Cybersecurity Services at Rockwell Automation. “They also need to provide context to that asset list, such as the asset criticality to operations, information about the obsolescence (support or capabilities) of the asset, vulnerabilities present, configuration, redundancy, location in the network, manufacturer type, etc.”

        An unexpected error occurred: