Building a Secure IT/OT Enterprise Program: Key Questions Answered
Before you hire a consultant, before you purchase a single product, before you write a single policy — you need to answer these questions. They are not technical questions. They are strategic questions that determine whether your OT cybersecurity program will succeed or become expensive shelfware.
InnoVAKT has developed this framework from dozens of engagements where the difference between success and failure came down to whether these questions were answered honestly at the outset.
Understanding Your Current State
What OT assets do you have, and where are they? If you cannot answer this question completely and accurately, nothing else matters. Passive asset discovery is the essential first step — and it will reveal the 15–30% of assets that nobody knew existed.
What is your actual network architecture? Not the diagram from the last project. The real one. Is IT/OT segmented, and if so, how? An honest assessment of actual segmentation versus assumed segmentation reveals the real attack surface. Most organizations are surprised — and not pleasantly.
What are your crown jewels? Which systems, if compromised, would cause the greatest safety, production, or environmental impact? These systems drive the prioritization of every subsequent security decision.
Defining Governance and Accountability
Who owns OT cybersecurity? The CISO? The VP of Operations? The Plant Manager? The answer determines budget authority, decision-making speed, and organizational alignment. Ambiguity here is the single most common organizational failure pattern.
What is your risk appetite? What level of OT cybersecurity risk is leadership willing to accept — and has this been formally acknowledged? Informal risk acceptance is not risk management. It is risk ignorance with extra steps.
How do you resolve IT/OT conflicts? When IT security requirements conflict with OT operational requirements — and they will — what is the escalation and resolution process? Without one, every decision becomes a political negotiation.
Assessing Capabilities and Gaps
What OT cybersecurity skills exist today? The global skills shortage means most organizations have significant gaps. Be honest about this — it determines whether you build, buy, or partner.
Do you have OT-specific incident response plans? An IT IRP does not address process manipulation, safety system compromise, or the constraint that you cannot simply isolate a DCS server that is controlling a running reactor. If your OT IRP is ‘see IT IRP,’ you do not have one.
What is your patch management reality? How many OT systems are unpatched, how many are unpatchable, and what compensating controls are in place? The honest answer to this question is always uncomfortable — and always necessary.
Planning the Engagement
What standards and frameworks will you align to? IEC 62443, NIST CSF, NERC CIP, NCA ECC-1:2018? The choice depends on industry, geography, and regulatory requirements. InnoVAKT’s GoSecure™ assessment supports multi-standard alignment.
What is your realistic budget and timeline? Are you building a program or checking a compliance box? The answer determines scope, approach, and the partner you need.
Do you need vendor independence? If the consultant sells products, their recommendations will favor their products. If you want recommendations driven by your architecture and risk profile, choose an independent advisory firm.
The right questions lead to the right program. The right program leads to operational resilience. That is the foundation upon which InnovAKT builds every engagement.