12 Jan 2026 | A Year In OT Security
Creating an OT cyber asset inventory is not a one week task, and it may not be the right thing for you to do at this time. This week’s task is to determine what OT cyber asset inventory you are committed to achieving and maintaining over the next year, and, at a high...
5 Jan 2026 | A Year In OT Security
Many OT security standards and guideline documents have creating an OT cyber asset inventory as one of the first tasks that should be tackled; one of the key critical controls. As you can tell from this book, I disagree with this. An OT cyber asset inventory is not a...
22 Dec 2025 | A Year In OT Security
Most of the world is off during this time of year. Take a break. Rest and relax. Enjoy time with friends and family.
15 Dec 2025 | A Year In OT Security
As we come to the year’s end, it’s a good time to perform a first audit of the OT Security Patching Program you put in place in Weeks 36 – 37. If you have other OT cyber maintenance activities defined, audit these too. Is the team doing what they committed to do? A...
8 Dec 2025 | A Year In OT Security
You established a Recovery Time Objective (RTO) in Week 21. After recent weeks’ tasks on response and recovery, it’s time to take a second look at your ability to recover and meet the RTO. We can’t guarantee that any of our cyber security controls will prevent all...
1 Dec 2025 | A Year In OT Security
ICS in OT have achieved very high availability due to redundancy. This high availability decreases the frequency that backups are needed for recovery, and this often leads to less rigor in the backup process. This week’s task is to verify you can answer yes to the...
24 Nov 2025 | A Year In OT Security
Your company has had a cyber incident that impacts OT and Operations. You may need to communicate with your customers, investors, media, regulators, government agencies and others. While the details of the cyber incident will affect what is said, your company should...
17 Nov 2025 | A Year In OT Security
Regardless of your OT incident response plan status, non-existent to mature and tested, this week’s task is to identify the OT incident response team members. If you had an OT cyber incident, who would you involve in the response? List them and their roles / area of...
10 Nov 2025 | A Year In OT Security
Does your detection work? Will it identify aspects of a cyber attack as designed? Will it present the events / alerts / information to the appropriate role? Does that role understand their Call Outs? This week you will test each detection source and each Call Out...