OT Red Team · vCISO Series — Article 8

Who Owns OT Risk?
What Red Team Tabletops Actually Find

When a Red Team asks who can isolate your OT segment and the room goes quiet, that silence is a finding.

"That moment, right there, is a finding."

What the Tabletop Is Actually Testing

The scenario is straightforward: a ransomware infection is spreading through your IT network and indicators suggest it may be approaching your OT environment. The Red Team facilitator pauses the simulation and asks a simple question. Who has the authority to isolate the OT segment? The room goes quiet. People look at each other. Someone mentions the CISO. Someone else says it's an operations call. A third person suggests waiting for legal. The facilitator writes it down.

When a Red Team runs a tabletop exercise in an industrial environment, most participants expect to work through technical scenarios. What they often don't expect is that the most significant findings have nothing to do with firewalls or detection tools.

A Red Team tabletop tests decision authority, escalation paths and IT-OT coordination under time pressure. It examines who has organizational standing to make calls when minutes matter. And it creates the specific conditions where accountability gaps stop being theoretical. Under simulated pressure, the structure on paper is tested against the one that actually exists in practice.

These two structures are rarely identical.

According to SANS Institute's 2025 ICS security report, regulated industrial sites experience roughly the same number of incidents as their peers but suffer about 50% fewer financial and safety impacts. The difference, SANS concluded, comes down to structure and accountability. The gap isn't how often attacks happen. It's what happens after they do.

The Five Accountability Gaps Red Teams Find Every Time

Across IT-OT tabletop exercises, five accountability gaps appear with enough consistency to treat them as structural patterns rather than exceptions.

  • 1

    Undefined Incident Ownership at the IT-OT Boundary

    When an attack is IT-side but the consequences are operational, nobody owns the intersection. IT security stops at the IT boundary. OT engineering teams don't typically think in security terms. The tabletop reveals who bridges that gap, and often discovers the answer is nobody. Adversaries move freely through the gaps accountability structures create. The tabletop shows organizations exactly where those gaps are in their own structure.

  • 2

    No Established Authority to Isolate OT Segments

    NIST SP 800-82 recommends that organizations define authority for operations to isolate a compromised system from the process control network if safety is at immediate risk, guidance that many organizations paper over in practice with distributed C-suite responsibility rather than a documented, exercised authority structure.

  • 3

    Vendor Access With No On-Call Accountability

    Third-party remote access exists in almost every industrial environment. What's frequently missing is a designated contact for incidents, a revocation process and confirmed escalation coverage. The Verizon 2025 Data Breach Investigations Report found that third-party involvement in breaches doubled to 30%. When a vendor connection becomes the threat vector, undefined accountability makes a fast response nearly impossible.

  • 4

    Unclear Escalation Paths From OT to Executive Leadership

    The tabletop exposes this when a simulated critical finding requires an executive decision and nobody knows who to call. This pattern isn't hypothetical. In the 2021 Colonial Pipeline incident, DHS was not alerted through any planned notification process. Following the JBS attack that same year, DHS leadership learned about the incident when the White House Situation Room called them, not the other way around. In both cases, escalation paths to federal partners failed because they hadn't been defined.

  • 5

    Nobody Empowered to Approve Emergency Changes

    Change control in OT environments is deliberately slow, for good safety reasons. Emergency response is not. These two realities rarely get reconciled in advance. As Dragos documented in its 2026 OT Cybersecurity Year in Review, access can persist after detection because removing it requires coordination with operations, not just technical cleanup. That coordination requires authority that isn't always assigned.

The Difference Between Compliance and Red Team Exercises

Compliance tabletops validate that a plan exists. Red Team tabletops test whether that plan actually works when pressure is applied.

A Red Team tabletop puts real people in a room, applies realistic time pressure and injection events they didn't anticipate, and observes what actually happens. According to Security Risk Advisors, clear thinking is often the first thing to exit the building during a crisis. The tabletop creates that stress deliberately, where the lessons surface as findings rather than incident costs.

"That structure existed before the attack. It didn't emerge under pressure; it held under pressure."

Case Study — Norsk Hydro 2019

With 22,000 systems compromised across 40 countries and $70 million in damages, Norsk Hydro's LockerGoga response recovered without paying ransom and was praised by law enforcement as a gold standard. According to MITRE and Microsoft case studies, what enabled it was defined accountability at the corporate, business area and plant level. That structure existed before the attack. It didn't emerge under pressure; it held under pressure.

What Tabletop Findings Actually Change

The structural changes that tabletop findings drive are specific: a single incident ownership role at the IT-OT boundary, documented OT isolation authority with named individuals, 24/7 vendor access contact and revocation procedures, and pre-approved emergency change categories that bypass full change control during active incidents.

These aren't aspirational recommendations. They're the direct output of what the tabletop exposed.

According to IBM's 2024 Cost of a Data Breach report, organizations that regularly test IR plans average $3.26 million in breach costs. Those without average $5.29 million, a 58% difference. Tested accountability isn't just a governance exercise. It's a financial outcome.

SANS 2025 found that organizations testing IR plans more frequently are far more likely to conduct executive-level tabletops, and that this broader testing discipline correlates strongly with improved readiness and faster incident response. The vCISO translates those findings into governance work, mapping accountability gaps and closing them through structural changes the organization can sustain. The exercise is how you know if the map matches the territory. The vCISO work makes closing it stick.

Organizational accountability is the first thing the Red Team tests. The second is the one that surprises organizations most: whether their security maturity is actually what they believe it is. The answer, almost universally, is more complicated than the internal assessment suggested. That's where we go next.

Close the Accountability Gaps Before the Tabletop Finds Them

The OT vCISO program translates tabletop findings into governance changes that stick. Defined ownership at the IT-OT boundary, documented isolation authority, vendor escalation procedures, and emergency change frameworks that don't conflict with operational safety requirements.

Who has the authority to isolate the OT segment?
The room goes quiet. The facilitator writes it down.

That silence is a finding. Red Team tabletops make it visible before attackers exploit it.
50% Fewer financial and safety impacts at regulated industrial sites with defined accountability structures — SANS 2025
30% Third-party involvement in breaches — doubled from prior year. Verizon DBIR 2025.
$3.26M Average breach cost for organizations that regularly test IR plans — IBM 2024
58% More expensive breaches at organizations that don't test IR plans ($5.29M vs $3.26M)
1
🚧

IT-OT Boundary Ownership Gap

Click to explore

When an attack is IT-side but consequences are operational, nobody owns the intersection. IT stops at the IT boundary. OT doesn't think in security terms. The tabletop reveals who bridges that gap. The answer is usually: nobody. This is where adversaries move freely.

2
🛑

No Authority to Isolate OT Segments

Click to explore

NIST SP 800-82 recommends defining authority to isolate compromised OT systems if safety is at immediate risk. Most organizations paper over this with distributed C-suite responsibility instead of a documented, exercised authority structure. In a real incident, nobody pulls the trigger.

3
👥

Vendor Access Without Accountability

Click to explore

Third-party remote access exists in almost every industrial environment. What's missing: a designated incident contact, a revocation process, and confirmed escalation coverage. Third-party breaches doubled to 30% in Verizon's 2025 DBIR. When the vendor connection is the threat vector, undefined accountability makes fast response impossible.

4
📞

Unclear Escalation to Leadership

Click to explore

Colonial Pipeline: DHS was not alerted through any planned notification process. JBS: DHS leadership learned from the White House Situation Room, not their own channels. Both escalation paths failed because they had never been defined. The tabletop exposes this before an actual incident does.

5
🔄

No Emergency Change Authority

Click to explore

Change control in OT is deliberately slow. Emergency response is not. These two realities rarely get reconciled in advance. Per Dragos 2026, access can persist after detection because removing it requires operational coordination that needs pre-assigned authority. Without it, attackers stay in the network during the approval process.

Compliance vs. Red Team: What Actually Gets Tested

Why compliance tabletops and red team tabletops measure completely different things

Compliance tabletops validate that a plan exists. Red Team tabletops test whether that plan actually works when pressure is applied. A Red Team tabletop puts real people in a room, applies realistic time pressure and injection events they didn't anticipate, and observes what actually happens.

According to Security Risk Advisors, clear thinking is often the first thing to exit the building during a crisis. The tabletop creates that stress deliberately, where the lessons surface as findings rather than incident costs.

  • Compliance exercises check boxes; red team exercises reveal whether the boxes mean anything
  • Time pressure and unexpected injections expose the difference between a documented plan and an exercised plan
  • SANS 2025: organizations testing IR plans more frequently are far more likely to conduct executive-level tabletops
  • That broader testing discipline correlates strongly with improved readiness and faster incident response
  • The vCISO translates findings into governance changes the organization can sustain — the exercise is how you know the map matches the territory
📋

Colonial Pipeline, JBS, and Norsk Hydro

Real incidents where defined (or undefined) accountability structures determined outcomes

In the 2021 Colonial Pipeline incident, the Department of Homeland Security was not alerted through any planned notification process. Following the JBS attack that same year, DHS leadership learned about the incident when the White House Situation Room called them. In both cases, escalation paths to federal partners failed because they hadn't been defined before the incident.

Norsk Hydro's 2019 LockerGoga response illustrates the opposite outcome. With 22,000 systems compromised across 40 countries and $70 million in damages, the company recovered without paying ransom and was praised by law enforcement as a gold standard response.

  • Norsk Hydro: defined accountability at corporate, business area, and plant level existed before the attack
  • That structure held under pressure — it did not emerge under pressure
  • Colonial and JBS: escalation paths failed because they had never been documented, practiced, or validated
  • The difference between these outcomes is structural, not technical
  • The Red Team tabletop surfaces the structural gaps before an actual incident forces the discovery
🛠

What Tabletop Findings Produce Structurally

The specific governance changes that are direct outputs of tabletop exercises

The structural changes that tabletop findings drive are specific and actionable. These aren't aspirational recommendations. They are the direct output of what the tabletop exposed.

  • A single incident ownership role at the IT-OT boundary with a named individual and a backup
  • Documented OT isolation authority: who can make the call, under what conditions, and without requiring additional approvals
  • 24/7 vendor access contact and a tested revocation procedure that doesn't require the vendor's cooperation to execute
  • Pre-approved emergency change categories that bypass full change control during active incidents
  • Defined escalation path from OT floor to executive leadership to federal partners with contact names and fallback contacts

IBM 2024: organizations that regularly test IR plans average $3.26M in breach costs. Those without average $5.29M, a 58% difference. Tested accountability is a financial outcome, not just a governance exercise.

Takeaway 01

Structure Before Pressure

Norsk Hydro's accountability structure held under pressure because it existed before the attack. Colonial and JBS's escalation paths failed because they hadn't been defined. The difference is entirely structural, not technical.

Takeaway 02

Silence Is a Finding

When a Red Team asks who can isolate the OT segment and the room goes quiet, that pause is a documented gap. Five of these gaps appear in every industrial tabletop. They're structural patterns, not exceptions.

Takeaway 03

58% Is the Cost of Not Testing

Organizations that test IR plans average $3.26M in breach costs. Those that don't average $5.29M. The tabletop exercise is the cheapest way to discover accountability gaps. Discovering them in a real incident is not.

Close the Accountability Gaps Before the Tabletop Finds Them

The OT vCISO program translates tabletop findings into governance changes that stick. Defined ownership at the IT-OT boundary, documented isolation authority, vendor escalation procedures, and emergency change frameworks that don't conflict with operational safety requirements.

Scroll to Top