Exposing the Leadership Gap
Your OT red team's first finding isn't in a firewall. It's in your org chart.
Every OT red team engagement starts with the same scoping call. The questions feel procedural at first. They're not procedural. They're the first test.
The Leadership Gap Your OT Red Team Will Find
Every OT red team engagement starts with the same scoping call. The questions feel procedural at first: Who should receive the findings? Who has authority to approve scope changes? Who makes the call if we find something critical mid-assessment?
When those questions go unanswered — when the authorized decision-maker turns out to be an IT manager with no OT mandate or an operations engineer with no security authority — the Red Team has already found something. Not a vulnerability in a firewall. A vacancy in the organizational structure that shapes everything else the engagement will surface.
This is the Industrial CISO gap from the adversarial side.
The First Finding Isn't Technical
When CISA's Red Team assessed a U.S. critical infrastructure organization in 2024, it didn't start at the firewall. It started with open-source research on the organization's employees, their roles and what those roles revealed about the security program. What they found before the technical phase was itself a finding. According to CISA Advisory AA24-326A, the organization's leadership had deprioritized a vulnerability its own security team had already identified and flagged. The Red Team then exploited it.
That sequence tells the story directly: the governance gap was the technical gap. Leadership's risk misjudgment left a known vulnerability open. The Red Team walked through it.
This pattern is consistent enough that serious OT red team methodologies build it into the process. Mandiant's approach requires collaboration with the organization's leadership team during pre-engagement scoping. The ISA Global Cybersecurity Alliance's assessment framework specifies that organizational inputs — including stakeholder interviews and documentation reviews — precede technical discovery. Dragos's red team services require a designated decision-maker to define scope and safety thresholds before testing begins. Those requirements aren't formalities. They surface the organizational conditions that determine what the technical phase will find.
Ungoverned Environments Leave the Attack Surface Ready
The absence of a designated OT security executive produces specific, predictable conditions. They're not abstract governance problems. They're attack paths.
Trend Micro's April 2025 research found that 73% of cybersecurity incidents involve unmanaged assets. Unknown assets aren't edge cases in the threat landscape — they're preferred entry points. And according to SANS Institute's 2024 State of ICS/OT Cybersecurity research, organizations that map to security standards and use ICS/OT-specific threat intelligence are 53% more likely to have documented all external connections to their industrial environments — a capability strongly correlated with CISO-led programs. Without that ownership, a significant share of external connections remain undocumented and ungoverned.
Ungoverned vendor and remote access compounds the problem. Vendor connections, remote support tools and shared access mechanisms frequently bypass network segmentation assumptions built into the rest of the environment. A water treatment plant in Muleshoe, Texas was compromised through a remote access solution so poorly governed that the attacker publicly boasted about the ease of the breach.
This is what the Red Team finds in organizations without executive OT security ownership: not a single vulnerability, but a governance-shaped attack surface. In Mandiant's "Big Steam Works" engagement, a red team gained administrative control of OPC servers in six hours. The entry point wasn't a DCS vulnerability requiring sophisticated exploitation. It was weak password governance across OT systems — a failure of policy, not technology.
The Numbers on Leadership Are Hard to Ignore
SANS 2024 research found that when the CISO owns ICS security, 82% of programs are mapped to security standards. When no corporate-wide policies exist, that drops to 42%. The gap isn't incremental — it's close to the difference between a governed program and an ungoverned one. CISO-led programs also detect and respond to incidents faster, reflecting the same accountability that makes every other capability function more reliably.
Fortinet's 2025 survey of more than 550 OT security professionals found that organizations at the highest maturity levels report zero intrusions 65% of the time. The relationship between leadership and measurable security outcomes holds consistently across independent research.
But title assignment isn't the same as capability. Only 46% of organizations have reached Level 4 maturity — Fortinet's highest tier — even as more than half now place OT security under a CISO. Assigning the title moves the vacancy; it doesn't close it. That distinction matters when a Red Team is scoping an engagement. The question isn't who has the title. It's who has the knowledge, the authority and the accountability to act on what the assessment finds.
Findings Without an Owner Don't Get Remediated
This is the practical consequence the Red Team sees more clearly than any other part of a security program: excellent technical findings in a comprehensive report accomplish nothing if no accountable executive exists to drive remediation.
NIST SP 800-82 Rev. 3, the primary U.S. government guide for OT security, states this directly. The CEO or COO, alongside the CIO or CSO, "accepts complete responsibility and accountability for the cybersecurity of the OT system and for any safety incidents, reliability incidents, or equipment damage caused directly or indirectly by cyber incidents." That language exists because governance isn't preliminary to security — it's the mechanism that makes security function.
PwC's 2025 OT security analysis described organizations without executive OT ownership as experiencing funding gaps, decision-making paralysis and disorganized incident response. When a Red Team delivers findings to an organization without an accountable owner, those findings tend to stay in the report. The absence of leadership doesn't just affect the assessment — it blocks the operational methodology needed to act on what the assessment produces.
Making the Invisible Visible
The Red Team's pre-engagement discovery phase doesn't only gather technical context. It maps the organizational conditions that will determine what the technical phase finds and what the organization actually does with the results.
Organizational structure creates the gaps that attack paths exploit — how silos in the org chart mirror the network boundaries that adversaries cross without friction. The Red Team applies that same logic in a live engagement, against your specific environment, with your specific governance conditions in scope.
When the scoping call questions go unanswered — who owns this, who decides, who acts on what we find — that's not absence of data. Those are the first findings already taking shape.
Identifying the leadership gap as an adversarial finding isn't an indictment. Organizations that see it clearly can begin closing it, whether through a fractional model, a direct hire or a defined delegation of authority. But the prerequisite is naming it clearly, in the executive briefing alongside the technical findings, as what it actually is: an exploitable organizational condition that every other security investment depends on resolving. The first question on the scoping call will tell you a great deal about what the engagement will find. Sometimes, that question alone is worth the call.
The Scoping Call Is Where the Assessment Starts. What Will Your First Answer Reveal?
⚠️ Before the First Exploit, the Red Team Already Found Something
The Industrial CISO gap isn't a governance problem on paper. It's an attack surface your adversaries map before they run a single scan. Leadership vacancies produce unmanaged assets, ungoverned vendor access and findings that never get remediated — all on a predictable, structural basis.
Five Ways the Leadership Gap Becomes an Adversarial Finding
Click each card to see how organizational structure shapes the attack surface
The Scoping Call Test
First questions reveal the first finding
Who receives findings? Who approves scope changes? Who decides if something critical surfaces mid-assessment? When those questions go unanswered, the Red Team has already found the governance gap — before a single packet is sent. The scoping call is the first phase of the assessment.
CISA AA24-326A — Governance Was the Gap
Leadership deprioritized a flagged vulnerability. The Red Team used it.
CISA's 2024 critical infrastructure assessment found that leadership had deprioritized a vulnerability the internal security team already flagged. The Red Team exploited it. The governance failure was the technical failure — the org chart gap and the network gap were the same gap.
Big Steam Works — 6 Hours to OPC Admin
Policy failure, not technology failure
Mandiant's "Big Steam Works" engagement gave a red team administrative control of OPC servers in six hours. The entry point was weak password governance across OT systems — not a sophisticated zero-day. No executive owned OT password policy. No one enforced it. The vacancy was the vulnerability.
Muleshoe, Texas — Publicly Boasted Breach
Ungoverned remote access, zero friction
A water treatment facility in Muleshoe, Texas was compromised through a remote access solution so poorly governed that the attacker publicly boasted about the ease of the breach. No one owned the remote access policy. No one reviewed the access controls. The attack required almost no effort because the governance required almost no effort either.
NIST SP 800-82 — Accountability Is Explicit
Complete responsibility language, not suggestion
NIST SP 800-82 Rev. 3 places complete responsibility for OT cybersecurity — including safety incidents, reliability incidents and equipment damage — on the CEO or COO alongside the CIO or CSO. The standard doesn't treat governance as preliminary to security. It treats governance as the mechanism that makes security function.
🗺️ The Governance-Shaped Attack Surface
What the Red Team finds in organizations without executive OT security ownership
Unmanaged Assets: Trend Micro's April 2025 research found 73% of incidents involve unmanaged assets. In the absence of CISO-led asset inventory programs, unknown devices accumulate across OT environments. Attackers prefer them — unmonitored and unpatched, they offer the path of least resistance.
Undocumented External Connections: SANS 2024 found organizations with CISO-led programs are 53% more likely to have documented all external connections. Without that ownership, remote access channels, vendor links and supplier connections operate outside visibility — and outside the segmentation model designed to protect everything else.
Vendor Access That Bypasses Segmentation: Vendor remote support tools and shared credentials frequently connect directly to operational systems without traversing the network controls built around them. When no executive governs these connections, the segmentation investment becomes irrelevant at the points that matter most.
Structural, Not Coincidental: These aren't random findings. They follow predictably from the absence of accountable leadership. The Red Team doesn't discover them. It confirms what the org chart already predicted.
📊 What the Leadership Data Actually Shows
SANS, Fortinet, and the difference between a title and a capability
SANS 2024 — The Standards Gap: When the CISO owns ICS security, 82% of programs are mapped to security standards. When no corporate-wide policies exist, that falls to 42%. That isn't an incremental difference — it is close to the difference between a governed program and an ungoverned one. The same accountability drives faster detection and response across the board.
Fortinet 2025 — Maturity and Outcomes: Among organizations at the highest OT security maturity level, 65% report zero intrusions. The relationship between leadership accountability and measurable security outcomes is consistent across independent research from multiple firms.
The Title vs. Capability Problem: Only 46% of organizations have reached Level 4 maturity — Fortinet's highest tier — even as more than half now place OT security under a CISO. Assigning the title moves the vacancy; it doesn't close it. The Red Team scoping call tests this directly. The question isn't who has the title. It's who has the knowledge, the authority and the mandate to act on what the assessment finds.
📁 Why Findings Without Owners Stay in the Report
NIST, PwC, and the remediation gap that follows governance gaps
The NIST Standard: NIST SP 800-82 Rev. 3 places complete responsibility and accountability for OT cybersecurity — including safety, reliability and equipment damage — on the CEO or COO alongside the CIO or CSO. That language isn't aspirational. It reflects the operational reality that security governance requires an accountable owner, not a shared assumption.
PwC 2025 Analysis: PwC's 2025 OT security analysis described organizations without executive OT ownership as experiencing three consistent failure modes: funding gaps that prevent remediation, decision-making paralysis when findings require action, and disorganized incident response when something breaks. These aren't separate problems. They are the same problem at different stages.
The Remediation Reality: A technically excellent Red Team report delivered to an organization without an accountable owner tends to stay in the report. The findings document the risk. The governance gap is what converts that documented risk into a permanent condition. Closing the leadership gap is the prerequisite for every other remediation action.
The Organizational Finding Your Assessment Will Surface
The First Finding Is Organizational
When the scoping call questions go unanswered, the Red Team has already found something. The governance gap is mapped before the technical phase begins — and it shapes every finding the technical phase produces.
Governance Shapes the Attack Surface
Unmanaged assets, undocumented external connections and ungoverned vendor access are structural conditions that follow predictably from the absence of accountable leadership. The Red Team doesn't discover them — it confirms what the org chart already predicted.
Accountability Drives Remediation
Technical findings without an accountable owner stay in the report. The leadership gap isn't preliminary to the security program — it is the mechanism that determines whether the security program functions at all. Naming it is the first step to closing it.
