The Accountability Map: Who Really Owns OT Risk?

95% of organizations claim C-suite ownership. Only 35% have a mature integrated program. The gap between claiming accountability and mapping it is where the risk lives.

Colonial's OT systems were never directly compromised. Yet the pipeline shut down because nobody could quickly answer one question: Is our OT safe to keep running? That question requires documented ownership. Colonial didn't have it.

The Question That Shut Down 45% of East Coast Fuel Supply

In May 2021, attackers compromised a single legacy VPN account at Colonial Pipeline. No multi-factor authentication. Likely unmonitored. Possibly unknown to the security team.

What followed: 5,500 miles of pipeline shut down for nearly a week, fuel shortages across the U.S. East Coast, a $4.4 million ransom payment and a national emergency declaration.

What gets less attention is why. Colonial's operational technology systems were never directly compromised. The attackers touched IT. But Colonial still shut down its entire pipeline, because nobody could quickly answer one question: Is our OT safe to keep running?

That question requires documented ownership of OT risk, clear boundaries between IT and OT, and defined decision authority. Colonial didn't have those things. After the incident, TSA's initial security directive prioritized accountability over technical controls, requiring operators to designate a Cybersecurity Coordinator with defined responsibilities and 24/7 availability, well before mandating specific technical remediation.

Title Is Not Accountability

More than half of organizations now say the CISO is responsible for OT security, according to Fortinet's 2025 State of Operational Technology and Cybersecurity Report. 95% report C-suite responsibility for OT security. The numbers suggest the governance problem is largely solved.

Only 35% of those organizations, however, report having a mature, fully integrated IT/OT security operations model. As PwC's 2025 OT security research notes, accountability for OT risk "typically spans security, operations, engineering and compliance," with no one coordinating it, resulting in "funding gaps, decision-making paralysis and disorganized incident response."

A title change is not an accountability map. The gap between nominal ownership and functional ownership is exactly where the risk lives.

Two Teams, Two Languages, One Broken Accountability Structure

The accountability gap is not a coordination failure. It's a design consequence.

IT security follows the CIA triad: confidentiality, integrity, availability, in that order. OT engineering inverts those priorities: availability first, then integrity, then confidentiality. Production uptime and physical safety are paramount. A control system taken offline to prevent a breach hasn't protected the organization. It may have created a different crisis.

The equipment lifecycles compound the divide. IT infrastructure refreshes every three to five years. OT environments run equipment for 15 to 20 years or more, where even applying a patch qualifies as a high-risk operation that may require a planned production stoppage. Neither approach is wrong. They were designed for different operational realities.

The reporting lines rarely converge below the C-suite. IT security reports to the CISO or CIO. OT engineering reports to the plant manager or VP of operations. Coordination must happen laterally, without structural authority, between teams that don't share vocabulary, tooling or metrics. A survey cited in ISACA Journal found that 68% of senior managers admitted miscommunication involving IT or security teams contributed to at least one cybersecurity incident in their organizations.

Where the Gaps Actually Live

Remote access is the most consistently unowned gap. Many organizations have no uniform solution and no documented owner for who approves, manages and monitors external connections to industrial systems. SANS' 2025 State of ICS/OT Security found that despite MFA improvements, gaps persist in remote access segmentation and vendor-managed access controls.

Vendor and third-party access is where the gap becomes invisible. Third-party integrators and maintenance providers routinely access OT networks without a named owner restricting or vetting that access. IT may set policies it lacks OT context to enforce. OT manages the relationships without applying security controls. Nobody owns the boundary.

OT incident response is where unclear accountability becomes dangerous. According to SANS 2024, 28% of organizations still lack an ICS/OT-specific incident response plan. Applying IT-centric tactics — aggressive containment, automated shutdowns, indiscriminate isolation — in an OT environment can halt production, damage equipment or create unsafe conditions. The question that consistently has no documented answer: who makes the call to isolate a production system?

Identity and access is where the patterns become striking. In approximately 60% of adversary simulations across multiple industries between 2022 and 2025, access to OT was achieved via legitimate pathways, not exploits. Credential reuse, non-rotated passwords, oversized administrative groups, missing MFA. These weren't sophisticated attacks. They were accountability failures.

The Budget and Talent Forces Keeping These Gaps Open

OT environments have their own capital budgets controlled by operations and engineering. IT security has separate budgets controlled by the CISO and CIO. When nobody controls a shared OT security budget, investments fall into the gap. SANS 2024 found that 38% of organizations have a shared IT-OT budget, rising to 48% when the CISO formally leads OT security. Budget clarity follows ownership clarity.

The talent gap reinforces it. SANS 2024 found that 51% of the ICS/OT security workforce lacks ICS/OT-specific certifications. IT professionals are trained for TCP/IP networks. OT engineers are trained for industrial protocols and process control. Without someone who speaks both languages, accountability stays incomplete: IT owns the firewall, OT owns the PLC, nobody owns the boundary.

What the Accountability Map Changes

The accountability mapping exercise answers seven questions most industrial organizations have never formally resolved: Who owns remote access security? Who vets vendor access? Who makes isolation decisions during an incident? Who owns compensating controls for legacy systems that can't be patched? Who controls the OT security budget? Who owns IT-OT boundary decisions? Who coordinates response across both teams?

Those seven questions produce documented ownership, defined handoffs, escalation paths and governance that bridges both worlds.

The impact data is consistent. SANS 2025 found that regulated sites experience roughly the same number of cyber incidents as their peers but suffer approximately 50% fewer financial and safety impacts. Same attack surface. Half the damage. SANS 2024 adds specifics: when a CISO formally leads ICS/OT security, 82% of those programs are mapped to standards; without centralized governance, that number falls to 42%. Ownership alone, before any tool is deployed, nearly doubles standards alignment.

The OT vCISO brings accountability assignments that are operationally realistic, not just organizational chart entries. That distinction — between a theoretical statement and a policy that actually works in an industrial environment — is domain knowledge. It's what makes the map functional.

Seven Questions. Most Organizations Can't Answer Them. Can Yours?

⚠️ 95% Claim C-Suite OT Ownership. Only 35% Have a Mature Integrated Program.

Title-based accountability doesn't close the gap between IT and OT. In 60% of adversary simulations, OT access came through legitimate pathways — credential reuse, unrotated passwords, missing MFA. These aren't breaches. They're accountability failures that look like breaches.

95%
claim C-suite responsibility for OT security — but only 35% have a mature integrated IT/OT model (Fortinet 2025)
60%
of adversary simulations reached OT via legitimate pathways — credentials, not exploits (Sygnia 2022-2025)
82%
of CISO-led ICS programs mapped to standards — vs. 42% without centralized governance (SANS 2024)
50%
fewer financial and safety impacts at regulated sites — same attack surface, half the damage (SANS 2025)

Five Accountability Failures That Shape Your Risk

Click each card to see where the gap between title and ownership becomes an attack surface

🚇

Colonial Pipeline — The Unanswered Question

OT never breached. $4.4M ransom. National emergency.

Click to explore

Colonial's OT systems were never compromised. The pipeline shut down because no one could quickly answer: "Is OT safe to keep running?" That's a documented ownership problem, not a technical one. TSA's first post-incident directive required a named Cybersecurity Coordinator with 24/7 availability — before mandating any technical fix.

🔄

CIA vs. AIC — Built-In Priority Conflict

Same incident, opposite response priorities

Click to explore

IT prioritizes confidentiality first. OT prioritizes availability first. Taking a control system offline to prevent a breach may create a physical safety crisis. Neither team is wrong — they were designed for different outcomes. Without an accountability map that defines who decides under which conditions, every cross-domain incident is improvised under pressure.

🔌

Remote Access — The Unowned Gap

No documented owner. No uniform solution.

Click to explore

Remote access to industrial systems is the most consistently unowned gap in OT security. No approved tool list. No documented owner for who approves, manages and monitors external connections. SANS 2025 found persistent gaps in remote access segmentation and vendor-managed controls even in organizations that have improved MFA elsewhere.

🔑

Vendor Access — The Gap That Turns Invisible

IT sets policies it can't enforce. OT manages relationships it can't secure.

Click to explore

Third-party integrators and maintenance providers routinely access OT networks without a named owner vetting or restricting access. IT may write policies without OT context. OT manages vendor relationships without security controls. The boundary between them is owned by nobody — which is why 60% of adversary simulations reach OT through legitimate pathways.

📋

The 7 Questions Nobody Has Answered

The accountability map most organizations have never built

Click to explore

Who owns remote access? Who vets vendor access? Who makes isolation decisions during an incident? Who owns compensating controls for legacy systems? Who controls the OT security budget? Who owns IT-OT boundary decisions? Who coordinates cross-team response? Most organizations have no documented answers. The accountability map answers all seven.

🗂️ The Four Gaps Where Accountability Breaks Down

Remote access, vendor access, OT incident response, and identity — the unowned boundary layer

Remote Access: No uniform solution, no documented owner for who approves and monitors external connections to industrial systems. SANS 2025 found persistent gaps in remote access segmentation even where MFA has improved. The access exists. The owner doesn't.

Vendor and Third-Party Access: IT sets policies without OT context. OT manages vendor relationships without security controls. Nobody owns the boundary. This is why legitimate access pathways account for 60% of successful OT compromises in adversary simulations — not exploits, but unmanaged trusted connections.

OT Incident Response: 28% of organizations still lack an ICS/OT-specific incident response plan (SANS 2024). IT-centric tactics — aggressive containment, automated isolation — can halt production, damage equipment or create unsafe physical conditions in OT environments. As SANS ICS expert Dean Parsons noted: "Without purpose-built ICS/OT incident response planning, organizations risk turning a cyber event into a self-inflicted control system outage." The undocumented question: who makes the call to isolate a production system?

Identity and Access: Credential reuse across IT and OT, non-rotated passwords, oversized administrative groups, missing MFA — these patterns appear in approximately 60% of adversary simulations. They aren't exploits. They're the predictable output of an accountability structure where no single owner manages identities end-to-end across both domains.

💰 Budget Silos and the Talent Gap Keeping Accountability Broken

When budgets don't converge, investments fall into the gap — and stay there

The Budget Structure: OT environments run on capital budgets controlled by operations and engineering. IT security runs on separate budgets controlled by the CISO and CIO. When nobody controls a shared OT security budget, security investments fall into the gap between them. SANS 2024 found only 38% of organizations have a shared IT-OT budget — rising to 48% when the CISO formally leads OT security. Budget clarity follows ownership clarity.

The Talent Gap: 51% of the ICS/OT security workforce lacks ICS/OT-specific certifications (SANS 2024). IT professionals speak TCP/IP, endpoint detection and SIEM. OT engineers speak industrial protocols, process control and operational safety. Without bilingual security leadership — someone who understands both worlds — accountability stays structurally incomplete: IT owns the firewall, OT owns the PLC, nobody owns the boundary.

The Compound Effect: Separate budgets and siloed expertise mean security investments rarely reach the boundary layer where the risk actually concentrates. The gaps in remote access, vendor access and identity persist not because organizations don't care, but because no one is funded and equipped to own them.

🗺️ What the Accountability Map Actually Changes

Seven questions, documented ownership, and why 82% vs. 42% matters before a single tool is deployed

The Seven Questions: The accountability mapping exercise formally resolves who owns remote access security, who vets vendor access, who makes isolation decisions during an incident, who owns compensating controls for legacy systems that can't be patched, who controls the OT security budget, who owns IT-OT boundary decisions, and who coordinates cross-team response. Most industrial organizations have never documented answers to all seven. The map produces them.

The SANS Data: When a CISO formally leads ICS/OT security, 82% of those programs are mapped to security standards. Without centralized governance, that number falls to 42%. Ownership alone — before any tool is deployed, any vulnerability is patched, any alert is tuned — nearly doubles standards alignment. The accountability map is the highest-ROI first step in an OT security program.

Same Attack Surface, Half the Damage: SANS 2025 found that regulated sites experience roughly the same number of cyber incidents as their peers but suffer approximately 50% fewer financial and safety impacts. The difference isn't the volume of attacks. It's the governance structure that determines how the organization responds. Documented accountability is what converts that governance structure into operational performance.

Building the Map That Makes Accountability Real

Title Is Not Accountability

95% claim C-suite OT ownership. Only 35% have a mature integrated model. The gap between nominal and functional ownership spans remote access, vendor access, incident response and identity — four boundary-layer gaps that persist because no single owner is responsible for closing them.

The Gap Lives in the Boundary

IT owns the firewall. OT owns the PLC. Nobody owns what's between them. 60% of adversary simulations reach OT through legitimate access pathways — not exploits. The accountability failures that enable those pathways are structural, not technical, and they follow predictably from the absence of a documented accountability map.

Ownership Changes the Numbers

CISO-led ICS programs achieve 82% standards alignment. Programs without centralized governance land at 42%. Regulated organizations with clear ownership suffer 50% fewer financial and safety impacts. The accountability map is the first investment — and it produces measurable outcomes before a single tool is deployed.

Seven Questions. Most Organizations Can't Answer Them. Can Yours?

Scroll to Top