The Role Nobody Owns
OT security's missing executive layer. The title changed. The capability didn't follow.
The numbers look like progress, until you understand what they don't show.
The Numbers That Hide the Problem
Fortinet's 2025 State of Operational Technology and Cybersecurity Report found that 52% of organizations now assign OT security responsibility to the CISO or CSO, up from just 16% in 2022. Problem solved.
Except it isn't. Fortinet's same report found only 35% of those organizations have a mature, fully integrated IT/OT security operations model. The title changed. The capability didn't follow.
That gap is not a personnel failure. It's a structural one: the absence of dedicated OT security executive leadership.
Why the IT CISO Can't Own OT Security
The CISO role was built for IT: confidentiality, integrity and availability, in that order. Data protection, access controls, endpoint security, cloud risk, regulatory compliance. The IT CISO knows this terrain.
OT environments work differently in almost every important dimension. The priority order inverts to availability, integrity, then confidentiality. A control system taken offline to prevent a data breach hasn't protected the organization. It has created a different kind of crisis.
OT environments run on equipment with 15-to-20-year lifecycles, where a patch that takes 10 minutes in IT can require weeks of vendor coordination, production window planning and safety review. Industrial protocols like Modbus, DNP3, EtherNet/IP and PROFINET don't behave like IT protocols under standard security tooling. An attack on a safety instrumented system doesn't compromise records. It can compromise people.
As Control Engineering noted in January 2025, securing OT environments requires a unique blend of IT, operational and domain-specific expertise, a combination that is hard to come by and takes years to develop.
The IT CISO typically has one of those three. Two, if they've made a genuine effort to bridge the gap. As PwC's 2025 OT security research notes, accountability for OT risk "typically spans security, operations, engineering and compliance," with no single executive owning the domain with depth enough to drive it forward. The consequence, per PwC: "funding gaps, decision-making paralysis and disorganised incident response."
What the Vacancy Actually Costs
When OT security lacks dedicated executive leadership, the consequences are measurable.
Dragos' 2026 OT Cybersecurity Year in Review found an 8-to-1 gap between organizations with comprehensive OT visibility and those without. Organizations with that visibility contained OT ransomware incidents in an average of five days. The industry-wide average was 42 days.
The financial stakes are escalating. IBM's 2024 data puts the average industrial sector breach cost at $5.56 million, an 18% year-over-year increase and the largest cost increase of any sector studied. Manufacturing accounted for more than two-thirds of ransomware victims in 2025, according to Dragos, while 119 ransomware groups impacted 3,300 industrial organizations, a 49% increase in group count from the prior year.
Response without OT-specific leadership is often improvised. SANS' 2024 State of ICS/OT survey found only 56% of respondents had an ICS/OT-specific incident response plan. Halliburton's August 2024 incident put the stakes in board-level terms: a $35 million pre-tax charge, disrupted billing operations, suspended share buybacks and a required SEC 8-K filing. Industrial cyber risk is no longer an operational abstraction. It's a shareholder event.
Why the Vacancy Persists
A full-time CISO salary runs $245,000 to $402,000 annually. An executive combining OT domain expertise, ICS/SCADA knowledge, safety system familiarity and board-level communication capability commands a premium above even that range. For most industrial organizations, manufacturing plants, utilities and energy operators outside the Fortune 500, that hire is prohibitive without an established ROI story.
Even organizations that can fund the role struggle to fill it. The global cybersecurity talent shortfall is estimated at nearly 5 million positions. OT-specific security expertise is a scarce subset of an already constrained pool. The result is organizational inertia: the IT CISO carries OT responsibility on paper, multiple teams share accountability informally and nobody owns it with enough domain expertise to drive the program forward.
Boards are beginning to sense the problem. Alignment between boards and CISOs on OT oversight has dropped from 84% in 2024 to 64% in 2025, according to Industrial Cyber. Even as formal CISO ownership of OT increased, board confidence in that leadership declined.
What Genuine OT Security Leadership Delivers
When OT security has genuine executive ownership, the program looks measurably different.
SANS 2024 data found that when an industrial CISO owned OT cybersecurity, 82% of those programs were mapped to standards, compared to 42% in organizations without clear executive ownership. Organizations with dedicated ICS/OT leadership were 53% more likely to have documented all external connections to their industrial environments. Detection speed improves. Response coordination improves. Board communication becomes substantive.
The industrial security executive translates the realities of the plant floor into risk language the board can act on, ensuring security investments reflect OT priorities rather than defaulting to IT frameworks. SANS' 2025 Leadership Lens identified the consistent pattern: organizations that performed best treated ICS/OT security as a business-critical discipline and aligned investment to operational risk first.
Filling the Gap Before the Full-Time Hire
The fractional OT vCISO model was built for this problem.
A fractional engagement provides OT-specific executive leadership at a fraction of the cost of a direct hire, typically $50,000 to $150,000 annually, representing 60-75% savings compared to full-time employment. It bypasses the six-to-12-month hiring timeline for a scarce talent pool and provides access to OT domain expertise most mid-market industrial organizations cannot attract full-time.
The OT vCISO establishes governance, develops the OT-specific security roadmap, ensures board communications reflect actual industrial risk and builds the program architecture that supports a full-time hire when scale and complexity eventually warrant it. This isn't a consulting engagement. It's the executive ownership layer that industrial cybersecurity programs need, and that almost none currently have.
The rest of this series examines what that leadership layer builds. Most organizations already sense the vacancy. The question is whether you close it proactively, or wait until the incident makes the case for you.
The Vacancy Is Costing You. Close It.
⚠️ 52% of Organizations Assigned OT Security to the CISO. Only 35% Have a Mature IT/OT Model. The Title Changed. The Capability Didn't.
Industrial cybersecurity has a leadership problem. Not a tooling problem. The executive layer between IT security, OT engineering and the board doesn't exist in most organizations.
Five Dimensions of the Leadership Gap
Click each card to see what's behind the problem
The Priority Inversion
IT and OT measure security in opposite order
IT prioritizes confidentiality, then integrity, then availability. OT inverts that completely. Taking a control system offline to prevent a data breach creates its own crisis. A CISO trained in IT security applies the wrong framework to environments where uptime is the first priority and safety is non-negotiable.
The Financial Impact
$5.56M average breach, $35M Halliburton charge
IBM puts the average industrial breach at $5.56M, the largest cost increase of any sector. Halliburton's 2024 incident resulted in a $35M pre-tax charge, disrupted billing, suspended buybacks and an SEC 8-K filing. Industrial cyber risk is now a shareholder event, not an operational abstraction.
The Talent Shortage
5M cybersecurity shortfall. OT is a scarce subset.
A full-time OT CISO runs $245K-$402K+ annually. The global cybersecurity talent shortfall is nearly 5 million positions. OT-specific expertise combining ICS/SCADA knowledge, safety systems and board communication is a rare subset. Most mid-market industrials can't attract or fund this role full-time.
Falling Board Confidence
84% to 64% alignment in one year
Board-CISO alignment on OT oversight dropped from 84% in 2024 to 64% in 2025. Even as formal CISO ownership of OT increased, board confidence in that leadership declined. Boards are sensing the gap between the title and the actual capability behind it.
The Fractional Solution
60-75% cost savings. Immediate expertise.
The fractional OT vCISO provides dedicated executive leadership at $50K-$150K annually, 60-75% savings over a full-time hire. It bypasses the 6-12 month hiring timeline and provides access to OT domain expertise that builds the program architecture until a full-time hire is warranted.
🔄 The IT/OT Priority Inversion in Detail
Why 15-year equipment lifecycles, industrial protocols and safety systems break IT security models
Equipment Lifecycles: OT environments run on equipment with 15-to-20-year lifecycles. A patch that takes 10 minutes in IT can require weeks of vendor coordination, production window planning and safety review. Applying IT patching cadences to OT can create more operational risk than the vulnerability itself.
Industrial Protocols: Modbus, DNP3, EtherNet/IP and PROFINET don't behave like IT protocols under standard security tooling. Most IT security tools can't parse, monitor or protect these protocols effectively. An IT CISO's toolchain doesn't translate to the plant floor.
Safety Systems: An attack on a safety instrumented system doesn't compromise records. It can compromise people. Safety instrumented systems are the last line of defense against physical harm in industrial environments. The consequences of getting OT security wrong extend beyond data loss to physical safety.
The Expertise Gap: As Control Engineering noted in January 2025, securing OT environments requires a unique blend of IT, operational and domain-specific expertise. The IT CISO typically has one of those three. PwC's 2025 research confirms: accountability for OT risk spans security, operations, engineering and compliance, with no single executive owning it deeply enough to drive progress.
💰 Halliburton: When Industrial Cyber Risk Becomes a Shareholder Event
$35M charge, suspended buybacks, SEC 8-K filing required
The Incident: In August 2024, Halliburton disclosed a cybersecurity incident that disrupted operations and required immediate SEC notification. The incident demonstrated how industrial cyber events escalate beyond technical containment into board-level financial events.
The Financial Impact: Halliburton recorded a $35 million pre-tax charge. Billing operations were disrupted. Share buybacks were suspended. The company was required to file an SEC 8-K, making the incident a matter of public record and shareholder concern.
The Leadership Lesson: Without dedicated OT security executive leadership, incident response is often improvised. SANS' 2024 survey found only 56% of organizations had an ICS/OT-specific incident response plan. The organizations that lack executive ownership of OT security are the same ones most likely to face improvised responses during the incidents that matter most.
The Board-Level Reality: Industrial cyber risk is no longer something boards can delegate and forget. It requires executive leadership that can translate technical exposure into operational and financial terms the board can act on. That translation is precisely what the missing OT security executive layer provides.
🛡️ The Fractional OT vCISO Model: Closing the Gap Now
Executive ownership at 60-75% cost savings, bypassing the talent shortage
The Cost Equation: A fractional OT vCISO engagement runs $50,000 to $150,000 annually, representing 60-75% savings compared to a full-time hire at $245K-$402K+. For mid-market industrial organizations, this makes dedicated OT security leadership accessible without the budget commitment of a full-time executive.
Bypassing the Talent Shortage: The six-to-12-month timeline to recruit an OT security executive is time most organizations don't have. The fractional model provides immediate access to OT domain expertise, ICS/SCADA knowledge, safety system familiarity and board-level communication capability.
What the OT vCISO Builds: Governance frameworks. OT-specific security roadmaps. Board communications that reflect actual industrial risk. Incident response plans designed for operational environments. The program architecture that supports a full-time hire when scale and complexity eventually warrant it.
Not Consulting. Ownership. This isn't a consulting engagement that delivers a report and exits. It's the executive ownership layer that industrial cybersecurity programs need. The OT vCISO owns the OT security program with the domain depth to drive it forward.
Three Realities About OT Security Leadership
The Gap Is Structural, Not Personnel
52% of organizations assigned OT to the CISO. Only 35% have mature IT/OT operations. The title changed. The capability, domain expertise and dedicated focus required for OT security leadership didn't follow. This is a structural gap, not a hiring failure.
The Vacancy Has Measurable Costs
An 8:1 visibility gap. 42-day average ransomware containment. $5.56M average breach cost. $35M Halliburton charge. 56% with ICS/OT incident plans. The absence of dedicated OT security leadership shows up in every metric that matters.
The Fractional Model Closes the Gap Now
60-75% cost savings. Immediate domain expertise. No 6-12 month hiring timeline. The OT vCISO builds governance, roadmaps and board communication while the organization determines whether scale warrants a full-time hire.
