OT vCISO Series — Article 3

What the OT vCISO Measures First:
The Honest Maturity Baseline

81% of industrial organizations rate their OT security at Level 3 or 4. Only 5% can claim full asset visibility. The math doesn't add up.

"You can't close a gap you haven't measured. And you can't measure accurately what you've been assessing yourself."

The Maturity Math That Doesn't Add Up

According to Fortinet's 2025 State of Operational Technology and Cybersecurity Report, 81% of industrial organizations rate their OT security maturity at Level 3 or 4 on a five-level scale. That's a confident industry. Then consider this: the same survey shows that as organizations advance in genuine maturity, they discover more blind spots, not fewer. And Fortinet's own data shows the percentage of firms claiming complete OT asset visibility has declined from 13% in 2022 to roughly 5% today.

That math doesn't add up. The gap between those numbers is where security strategies quietly go wrong.

81% Rate their OT maturity at Level 3 or 4 — Fortinet 2025
5% Can claim full OT asset visibility today — down from 13% in 2022
34% Test incident response using OT-specific environments — SANS 2024

The first two articles in this series traced the accountability gap at the top of most OT security programs. With accountability clarified, the next question is: what does the program we're now accountable for actually look like? The honest answer often surprises organizations.

Why Self-Assessed OT Maturity Scores Run High

Self-assessment bias isn't unique to cybersecurity. But in OT environments, specific structural factors make the gap between perceived and actual maturity unusually wide.

The most common problem is measuring inputs instead of outcomes. According to the SANS 2024 State of ICS/OT Cybersecurity Survey, 84% of respondents have a policy for remote access. Only 34% test incident response using OT-specific environments. Having the policy and being able to execute it under pressure are very different things.

Compliance frameworks deepen the problem. Passing a compliance audit doesn't demonstrate operational security maturity. The APTA OT-CMF framework is explicit: an organization cannot claim a maturity level "unless they are performing all the practices successfully." Yet many self-assessment tools accept policy existence as proof of consistent practice.

Then there's the visibility paradox. Fortinet's 2025 data shows that the percentage of organizations claiming 100% OT asset visibility has been declining since 2022. As organizations gain genuine maturity, they develop a more honest picture of what they don't know. Confidence drops as capability rises. NCC Group notes that internal assessors frequently evaluate their own work, creating bias that independent assessment is designed to remove.

This is the structural problem the OT vCISO is designed to solve. Internal teams, even skilled and well-intentioned ones, are assessing their own work against standards they've internalized over time. The OT vCISO brings domain expertise shaped across multiple industrial environments, a clear sense of what genuine maturity at each level actually looks like in practice, and no organizational stake in the result being favorable. That combination produces a fundamentally different kind of assessment.

What an External OT Assessment Actually Uncovers

A self-survey asks whether processes exist. An external assessment asks whether they work.

That means physical inspection of the OT environment, not just document review. Network topology analysis that reveals segmentation gaps and undocumented connections. Technical validation of actual patch levels and access controls. A threat presence sweep for active indicators of compromise that existing monitoring may have missed. Dragos, which conducts OT assessments across industrial sectors, routinely finds suspicious activity that an organization's own tools had not detected.

CISA has made asset inventory the explicit starting point through its 2025 "Foundations for OT Cybersecurity" guidance, issued jointly with NSA, FBI, EPA and international partners. The framing is direct: you cannot protect what you cannot see. Physical inspection is required because environments change faster than documentation is updated.

The Adversarial Component

The external assessment extends into actively testing whether defenses hold under real attack conditions. Our companion Red Team series covers how adversarial testing validates or challenges the maturity picture a baseline establishes, and why that ongoing challenge keeps the picture honest over time.

The Four Gaps Every Honest OT Baseline Finds

An honest baseline, the kind the OT vCISO establishes in the early weeks of engagement, covers four areas. Each one reveals a different kind of gap, and together they define where the program actually stands.

  • 1

    Governance and Accountability

    Only 39% of SANS 2024 respondents have centralized governance under a CISO. Without clear ownership, decisions about OT risk investment and response authority get made ad hoc. The accountability gap isn't just a leadership problem; it's a risk amplifier for every other gap that follows.

  • 2

    Visibility

    Fortinet's 2025 data shows fewer than 1 in 20 industrial organizations can claim full OT asset visibility, a share that has been declining since 2022. This is the foundational capability everything else depends on. You can't monitor what you haven't mapped. Attack paths move through exactly these visibility gaps, the same environments where organizations believe their monitoring is adequate.

  • 3

    Response Capability

    NCC Group's OT incident response data shows just over half of organizations have a dedicated ICS/OT incident response plan, and nearly one in three have no plan at all. Applying IT-centric response actions in OT environments, including aggressive containment and automated shutdowns, can halt production, damage equipment or create safety hazards.

  • 4

    Recovery Readiness

    Return-to-service time has been the top OT security success metric for four consecutive years per Fortinet 2025. Yet Dragos and Marsh McLennan's 2025 OT Security Financial Risk Report estimates that in a severe worst-case scenario, global OT cyber losses could reach $329.5 billion, with $172.4 billion attributable to business interruption alone.

How an Accurate Baseline Redirects Security Investment

Investment decisions made on incorrect maturity assumptions don't just fail to improve security. They misallocate resources. According to Nexus Connect's 2025 OT security economics analysis, much of the industry's investment favors surface-level defenses while foundational architectural risks remain unaddressed. SANS 2025 data shows more than half of organizations cite compliance obligations as their primary investment driver, frequently at the expense of long-term resilience.

Organizations buy detection tools for environments they haven't fully mapped. They invest in sophisticated capabilities built on foundations they haven't validated.

Case Study — Major U.S. Energy Company

When a major US energy company engaged an external assessment partner, the evaluation revealed inconsistent security maturity across tens of thousands of geographically distributed IT and OT assets. With a structured starting point and a prioritized remediation roadmap, the company achieved measurable maturity improvement in eight months, well ahead of the initial one-year target. The honest baseline was the accelerant. The program didn't change what it was trying to do. It finally knew where to begin.

That's the earliest and most important contribution the OT vCISO makes. Not an audit. Not a judgment of the existing team. A clear picture of where the program stands, built on evidence, benchmarked against real standards, translated into a roadmap that sequences the right investments in the right order.

SANS 2024 data captures what that difference produces: organizations using both ICS/OT standards and threat intelligence are described as "lightyears ahead" of peers in maturity and operational capability. They detect events faster, have better-mapped environments and are more likely to have OT-specific incident response in place.

The honest baseline isn't a confession. It's the strategic foundation every subsequent decision depends on. You can't close a gap you haven't measured. And the continuous validation loop we'll examine later in this series is what prevents the maturity mirage from quietly re-forming after the initial baseline work is done.

Start With an Accurate Picture of Where You Stand

The OT vCISO program begins with an honest baseline: physical inspection of your OT environment, network topology analysis, technical validation of patch levels and access controls, and findings mapped against recognized frameworks in a prioritized remediation roadmap.

81% of industrial organizations rate their OT security at Level 3 or 4.
Only 5% can claim full asset visibility. The math doesn't add up.

The gap between those numbers is where security investment quietly goes wrong. The OT vCISO measures it first.
81% Rate OT security maturity at Level 3 or 4. Only 5% can back it up with full asset visibility — Fortinet 2025
5% Organizations with full OT asset visibility today — down from 13% in 2022 as genuine maturity reveals more blind spots
34% Organizations that test incident response using OT-specific environments. 84% have a remote access policy — SANS 2024
58% Cite compliance obligations as primary investment driver — often at the direct expense of foundational architectural fixes
🔍

The Visibility Paradox

Click to explore

As organizations gain genuine maturity, visibility claims decline because they develop a more honest picture of what they don't know. Confidence drops as capability rises. The organizations claiming highest maturity often have the least accurate self-picture. NCC Group: internal assessors evaluate their own work, creating bias independent assessment is designed to remove.

🏛

Gap 1: Governance

Click to explore

Only 39% of organizations have centralized OT security governance under a CISO. Without clear ownership, decisions about OT risk investment and response authority get made ad hoc. This accountability gap is the risk amplifier for every other gap that follows it in the assessment.

🗺

Gap 2: Visibility

Click to explore

Fewer than 1 in 20 industrial organizations can claim full OT asset visibility and the share has been declining since 2022. This is the foundational capability everything else depends on. You can't monitor what you haven't mapped. Attack paths move through exactly these gaps in monitoring coverage.

🚨

Gap 3: Response Capability

Click to explore

Just over half of organizations have a dedicated ICS/OT IR plan. Nearly one in three have no plan at all. Applying IT-centric containment actions in OT environments can halt production, damage equipment, or create safety hazards. IT response playbooks were not built for OT consequences.

🔄

Gap 4: Recovery Readiness

Click to explore

Return-to-service time has been the top OT security metric for four consecutive years. Dragos and Marsh McLennan estimate global OT cyber losses in a severe worst-case scenario at $329.5 billion, with $172.4 billion from business interruption alone. Recovery capability is the gap with the largest financial consequence.

📊

Why Self-Assessment Scores Systematically Run High

The structural reasons OT maturity self-assessments overstate capability

Three structural factors combine to inflate OT maturity self-assessments consistently across the industry.

  • Measuring inputs, not outcomes: 84% have a remote access policy; only 34% test IR with OT-specific environments. Policy existence is treated as proof of execution capability.
  • The compliance trap: Passing a compliance audit doesn't demonstrate operational security maturity. APTA OT-CMF: an organization cannot claim a maturity level "unless they are performing all the practices successfully." Many tools accept policy existence as proof of consistent practice.
  • The visibility paradox: As genuine maturity rises, visibility claims decline because honest assessment reveals what you don't know. The declining 100% visibility figure (13% in 2022 to 5% today) is a sign of improving maturity awareness, not declining capability.
  • Self-assessment bias: NCC Group notes internal assessors evaluate their own work, creating structural bias. The OT vCISO brings no organizational stake in the result, no prior relationship with the assessment subjects, and domain expertise shaped across multiple industrial environments.
🔬

What an External OT Assessment Actually Uncovers

Physical inspection, topology analysis, threat sweeps, and what document review misses

A self-survey asks whether processes exist. An external assessment asks whether they work. The difference in scope is significant.

  • Physical inspection of the OT environment — required because environments change faster than documentation is updated (CISA 2025 guidance)
  • Network topology analysis that reveals segmentation gaps and undocumented connections not captured in architecture diagrams
  • Technical validation of actual patch levels and access controls versus stated policies
  • Threat presence sweep for active IOCs that existing monitoring has missed — Dragos routinely finds suspicious activity an organization's own tools had not detected
  • CISA "Foundations for OT Cybersecurity" (2025): asset inventory is the explicit mandatory starting point for any OT security program
  • The adversarial component: Red Team testing validates or challenges the maturity picture the baseline establishes
🎯

How an Accurate Baseline Redirects Security Investment

Why wrong maturity assumptions misallocate budget, and how the energy company case study demonstrates the payoff

Investment decisions made on incorrect maturity assumptions don't just fail to improve security. They misallocate resources in ways that compound over time.

  • Organizations buy detection tools for environments they haven't fully mapped
  • They invest in sophisticated capabilities built on foundations they haven't validated
  • Nexus Connect 2025: industry investment favors surface-level defenses while foundational architectural risks remain unaddressed
  • SANS 2025: 58% cite compliance as primary investment driver — frequently at the expense of long-term resilience

When a major US energy company engaged an external assessment partner, the evaluation revealed inconsistent maturity across tens of thousands of distributed IT and OT assets. With a structured starting point and prioritized remediation roadmap, the company achieved measurable improvement in eight months, well ahead of the one-year target. The honest baseline was the accelerant.

SANS 2024: organizations using both ICS/OT standards and threat intelligence are "lightyears ahead" of peers in maturity, event detection speed, environment mapping, and OT-specific incident response capability.

Takeaway 01

High Confidence, Low Visibility

81% of industrial organizations rate their OT maturity at Level 3 or 4. Only 5% can claim full asset visibility. The gap between confidence and capability is where investment goes wrong.

Takeaway 02

Policy Isn't Practice

84% have a remote access policy. Only 34% test incident response using OT-specific environments. Self-assessment measures inputs. External assessment measures whether they work under pressure.

Takeaway 03

The Baseline Is the Accelerant

The honest baseline doesn't change what the program is trying to do. It gives the program a structured starting point it didn't have. You can't close a gap you haven't measured.

Start With an Accurate Picture of Where You Stand

The OT vCISO program begins with an honest baseline: physical inspection of your OT environment, network topology analysis, technical validation of patch levels and access controls, and findings mapped against recognized frameworks in a prioritized remediation roadmap.

Scroll to Top