Attack Paths Don't Care About Your Org Chart

Your IT team stops at the IT boundary. Your OT team stops at the plant floor. Attackers stop for neither.

Attackers operate across your entire infrastructure simultaneously, flowing from an IT phishing email through shared credentials to a process control system without stopping to check who owns which domain. The shadow current doesn't wait for a handoff meeting.

Attack Paths Don't Care About Your Org Chart

Your IT security team monitors the enterprise network. Your OT team manages the plant floor. The CISO oversees both on paper. In practice, they use different tools, attend different meetings, and measure success in different ways.

Attackers don't have any of those constraints. They operate across your entire infrastructure simultaneously, flowing from an IT phishing email through shared credentials to a process control system without stopping to check who owns which domain. The shadow current doesn't wait for a handoff meeting.

This is the organizational gap most industrial organizations face: they fight half a war while attackers fight a full one.

Your Org Chart Is Also Your Attack Map

The connection between organizational structure and security posture isn't theoretical. According to a Dragos/Ponemon Institute survey, 43% of organizations report a lack of clear ownership for industrial cyber risk, with uncertainty around who leads initiatives, implements controls and supports the program. Only 35% have a unified security strategy covering both IT and OT environments.

That 65% gap? Attackers find it every time.

A 2024 survey by Palo Alto Networks and ABI Research of nearly 2,000 executives and practitioners across 16 countries found that 40% of IT and OT teams are "frictional" with each other. Only 12% are truly aligned. Given that IT is the primary attack vector into OT, this friction is more than a management headache. It's a structural vulnerability in your defenses.

The invisible line between IT team responsibility and OT team ownership is exactly where attackers do their best work.

The Dead Zone Between Teams

MITRE maintains two separate ATT&CK frameworks: Enterprise ATT&CK for IT attacks and ICS ATT&CK for OT attacks. That's not redundancy. It's acknowledgment of a reality that Mandiant researchers put plainly: "Threat actors do not respect theoretical boundaries between IT or ICS when moving across OT networks" and "both knowledge bases are necessary for tracking threat actor behaviors across OT incidents."

An IT team using only Enterprise ATT&CK misses the OT phase of an attack. An OT team using only ICS ATT&CK misses the IT precursor phase. Each team sees half the picture.

This plays out in practice as what Dragos calls the "persistent mischaracterization of OT incidents as IT only." Engineering workstations and human-machine interfaces run Windows. IT teams see Windows machines, log them as IT incidents and close tickets. The OT team never gets the notification. The attacker's foothold in the OT-adjacent zone goes unaddressed, and the dead zone between teams becomes persistent access.

Research published in January 2026 covering global OT security assessments found that where SOC coverage stopped at the IT boundary, attacker activity often went undetected once it moved into operational zones, extending dwell time and delaying containment. The same assessments found identity-related issues in approximately 60% of engagements, including credential reuse across IT and OT, non-rotated credentials and missing multi-factor authentication. These aren't exotic exploits. They're the normal trusted connections that cross organizational boundaries.

What the Coordination Gap Actually Costs

Dragos's 2026 OT/ICS Cybersecurity Report found that organizations with comprehensive OT visibility contained ransomware incidents in an average of five days. The industry-wide average is 42 days. That's an 8x difference, largely attributable to whether teams could see and act across the IT-OT boundary.

The Colonial Pipeline incident from May 2021 makes the organizational lesson concrete. DarkSide ransomware hit the company's IT billing systems through a single compromised VPN credential with no multi-factor authentication. The pipeline's OT systems were not directly compromised. Yet Colonial shut down the entire 5,500-mile pipeline carrying 45% of East Coast fuel because the organization couldn't quickly determine whether OT systems were also at risk.

That's a coordination failure that looked like a cybersecurity one. Had IT and OT teams shared situational awareness and cross-domain protocols, the precautionary shutdown may have been avoided or significantly shortened.

According to SANS Institute's 2024 State of ICS/OT Cybersecurity survey, only 56% of industrial organizations have ICS/OT-specific incident response plans. When a cross-domain incident occurs, nearly half improvise OT response while IT follows established playbooks. That divergence creates delays, and delays create impact.

When IT Says Patch, OT Says Wait

IT teams prioritize confidentiality, integrity and then availability. OT teams invert that order: availability first, then safety, then integrity, then confidentiality. They're not wrong. They're optimizing for different outcomes.

Even when IT and OT teams do communicate during an incident, inverted priorities mean they may disagree on what to do next. Jason Christopher, a SANS ICS expert, frames the required mindset directly: "Attackers do not care if you have an IT team and a separate OT team for security. They are simply attacking the organization. So, internally, it's vital to minimize friction as much as possible."

The Fix Isn't a New Org Chart

No one is suggesting that every industrial organization restructure into a unified IT-OT function; organizational change is slow, expensive and disruptive. The path forward is coordination, not reorganization.

The model gaining the most consensus is IT-OT SOC convergence: maintaining separation of duties while enabling coordinated detection and response across domains. Palo Alto Networks Unit 42 describes it directly: "IT teams often identify the early indicators of compromise, while OT teams apply operational context and execute domain-appropriate response actions."

Jonathon Gordon of Takepoint Research describes IT and OT convergence as "fundamentally a governance challenge," requiring unified ownership of assets, identities, access and change control across IT, OT, engineering and third parties. CISA recognized this directly in December 2025 when it released Cross-Sector Cybersecurity Performance Goals version 2.0, explicitly consolidating OT and IT goals into unified "universal goals," stating: "OT and Information Technology goals are now consolidated into universal goals, eliminating silos across IT, IoT and OT environments."

Practical coordination starts without restructuring: shared threat intelligence between IT and OT functions, joint incident response playbooks that cover cross-domain scenarios, regular tabletop exercises that include both teams, and unified monitoring that doesn't stop at the IT-OT boundary. According to SANS 2024 data, centralizing threat intelligence across IT and OT into a single team or senior leader ranks among the highest-correlation maturity indicators in the survey.

The shadow current flows through your org chart's invisible lines because those lines create blind spots. Shared visibility is the remedy. The question isn't who owns OT security. It's whether your teams can act together before attackers finish crossing from IT to your critical systems.

Your Teams Have a Boundary. Your Attackers Don't. Let's Close the Gap.

⚠️ 40% of IT and OT Teams Are Frictional. Attackers Move Through That Friction Freely.

Your organizational boundaries are invisible to adversaries. They flow from IT phishing to OT process control without checking who owns what. The coordination gap between your teams isn't a management problem — it's an 8x difference in how fast you contain an attack.

43%
of organizations lack clear ownership for industrial cyber risk (Dragos/Ponemon)
40%
of IT and OT teams are "frictional" — only 12% are truly aligned (Palo Alto/ABI Research 2024)
8x
faster ransomware containment with cross-domain visibility — 5 days vs. 42 days (Dragos 2026)
44%
of industrial organizations have no ICS/OT-specific incident response plan (SANS 2024)

Five Ways the Org Chart Becomes an Attack Path

Click each card to see how the boundary between teams creates the gap attackers exploit

🗂️

The Dual ATT&CK Problem

IT misses the OT phase. OT misses the IT precursor.

Click to explore

MITRE maintains separate Enterprise and ICS ATT&CK frameworks because attacks span both. Mandiant: "Threat actors do not respect theoretical boundaries." An IT team using Enterprise ATT&CK alone misses the OT phase. An OT team using ICS ATT&CK alone misses the IT entry. Each team sees half the attack.

🔥

The Friction Problem

40% frictional. 12% aligned. Attackers exploit the gap.

Click to explore

A 2024 survey of nearly 2,000 executives across 16 countries found 40% of IT and OT teams are actively frictional with each other. Only 12% are truly aligned. Since IT is the primary attack vector into OT, this friction isn't an organizational nuisance — it's a structural gap in your threat detection.

🚇

Colonial Pipeline — The Coordination Failure

OT never breached. Pipeline shut down anyway.

Click to explore

DarkSide hit Colonial's IT billing systems via one compromised VPN credential. OT was never directly compromised. Colonial still shut down 5,500 miles of pipeline carrying 45% of East Coast fuel — because IT and OT teams lacked the shared situational awareness to quickly confirm OT was safe. The coordination gap cost more than the breach did.

🔄

Inverted Priorities — Built-In Disagreement

IT: patch it now. OT: don't touch production.

Click to explore

IT prioritizes confidentiality, integrity, then availability. OT inverts that: availability first, then safety, then integrity, then confidentiality. Neither is wrong — they optimize for different outcomes. But inverted priorities mean teams disagree on response actions during exactly the incidents where speed matters most.

🏛️

CISA CPG 2.0 — Silos Are Now a Policy Problem

December 2025: OT and IT goals unified by federal standard

Click to explore

In December 2025, CISA released Cross-Sector Cybersecurity Performance Goals v2.0, explicitly consolidating OT and IT goals into "universal goals" and stating: "OT and Information Technology goals are now consolidated into universal goals, eliminating silos across IT, IoT and OT environments." The org chart boundary is now a compliance gap too.

☠️ The Dead Zone Between Teams — Where Attackers Live

How misclassified incidents and credential reuse create persistent access in the boundary layer

The Mischaracterization Problem: Engineering workstations and human-machine interfaces run Windows. IT teams see Windows machines, log them as IT incidents and close tickets. The OT team never gets the notification. Dragos calls this "persistent mischaracterization of OT incidents as IT only" — and the attacker's foothold in the OT-adjacent zone goes unaddressed while both teams believe the incident is resolved.

Identity Issues in 60% of Engagements: January 2026 research covering global OT security assessments found identity-related issues in approximately 60% of engagements — credential reuse across IT and OT domains, non-rotated credentials, and missing multi-factor authentication. These aren't exotic exploits. They're the normal trusted connections that cross team boundaries, and they persist because no single team owns them end-to-end.

Extended Dwell Time: Where SOC coverage stopped at the IT boundary, the same research found that attacker activity often went undetected once it moved into operational zones — extending dwell time, delaying containment, and giving attackers the time needed to understand the OT environment before acting.

💸 What the 8x Gap Actually Costs You

5 days vs. 42 days — and the Colonial Pipeline shutdown that never had to happen

The Dragos 2026 Finding: Organizations with comprehensive OT visibility contained ransomware incidents in an average of five days. The industry-wide average is 42 days. That 8x difference is largely attributable to whether teams could see and act across the IT-OT boundary together — or whether they had to wait for handoffs, escalations and manual coordination during an active incident.

Colonial Pipeline — The Coordination Lesson: DarkSide compromised IT billing systems through a single VPN credential with no MFA. OT was not directly breached. Colonial shut down 5,500 miles of pipeline carrying 45% of East Coast fuel anyway — because without shared situational awareness, the organization couldn't quickly confirm whether OT was at risk. The shutdown wasn't a cybersecurity outcome. It was a coordination outcome.

The IR Plan Gap: SANS 2024 found only 56% of industrial organizations have ICS/OT-specific incident response plans. When a cross-domain incident hits, nearly half improvise OT response while IT follows established playbooks. That divergence creates the delays that convert contained incidents into extended shutdowns.

🔗 Practical Coordination Without Restructuring

IT-OT SOC convergence, joint playbooks, and CISA's universal goals framework

IT-OT SOC Convergence: The leading model maintains separation of duties while enabling coordinated detection and response across both domains. Palo Alto Networks Unit 42 describes the division of labor: "IT teams often identify the early indicators of compromise, while OT teams apply operational context and execute domain-appropriate response actions." The goal isn't a merged team — it's a shared operational picture.

Shared Threat Intelligence: SANS 2024 data identifies centralizing threat intelligence across IT and OT into a single team or senior leader as one of the highest-correlation maturity indicators in the survey. Organizations that achieve this don't necessarily change their org chart — they create a cross-domain intelligence function that serves both teams simultaneously.

Joint Playbooks and Tabletops: Cross-domain incident response plans that explicitly cover IT-to-OT attack paths, paired with regular tabletop exercises that require both teams to respond together, are the fastest path to coordination without reorganization. The playbook makes the first coordinated decision before the incident starts — removing the improvisation that extends dwell time.

CISA's Framework: CISA Cross-Sector Cybersecurity Performance Goals v2.0 (December 2025) provides the governance foundation: "OT and IT goals are now consolidated into universal goals, eliminating silos across IT, IoT and OT environments." The standard validates coordination as the target state — and gives organizations a framework for measuring progress.

Closing the Boundary Attackers Cross Freely

The Org Chart Is the Attack Map

43% of organizations lack clear ownership of industrial cyber risk. 65% have no unified IT/OT security strategy. The invisible lines between your teams are exactly where attackers do their best work — because those lines create detection gaps that neither team can close alone.

Coordination Beats Reorganization

Restructuring is slow, expensive and disruptive. Shared threat intelligence, joint IR playbooks and unified monitoring across the IT-OT boundary close the gap without changing the org chart. CISA CPG 2.0 provides the governance framework. SANS 2024 shows shared intelligence as the highest-correlation maturity indicator.

Shared Visibility Is the Remedy

Organizations with cross-domain visibility contain ransomware in five days. The industry average is 42. The difference isn't tools — it's whether teams can see and act across the boundary together. Colonial Pipeline's OT was never breached. The coordination gap shut down 45% of East Coast fuel supply anyway.

Your Teams Have a Boundary. Your Attackers Don't. Let's Close the Gap.

Scroll to Top