{"id":27774,"date":"2025-09-25T12:20:39","date_gmt":"2025-09-25T11:20:39","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=27774"},"modified":"2025-09-25T12:20:41","modified_gmt":"2025-09-25T11:20:41","slug":"cybersecurity-monitoring-for-ot-current-situation-perspectives","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/","title":{"rendered":"Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives"},"content":{"rendered":"\n<h1>OT, lower exposure but higher vulnerability<\/h1>\n<p>Operational Technology, while overall less impacted than IT, is not exempt from cyberthreats &amp; not immune to cyberattacks. Let\u2019s take a closer look at a simplified view of the threat landscape for industrial environments:<\/p>\n<ul>\n<li><strong>Hacktivism<\/strong>: Increased geopolitical tensions in 2025 have led to low-level attacks by groups like CyberArmyofRussia_Reborn and CyberAv3ngers.<\/li>\n<li><strong>Cyber Crime<\/strong> \/ <strong>Ransomware<\/strong>: There has been an 87% increase in ransomware attacks on industrial groups in 2025 according to Dragos in its annual report.<\/li>\n<li><strong>Nation-State<\/strong>: Notable campaigns include Voltzite OT information theft and the IOControl campaign.<\/li>\n<\/ul>\n<p>This threat landscape was notably depicted by Chris Sistrunk, ICS\/OT Technical Leader at Mandiant, Google Cloud Security, at Black Hat 2025:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27771 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN14.png\" alt=\"\" width=\"684\" height=\"374\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN14.png 958w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN14-350x191.png 350w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN14-71x39.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN14-768x419.png 768w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/p>\n<p>Given this increasing threat landscape targeting OT, continuous monitoring is essential. So, we know why industrial information systems need to be closely monitored, and we also know that our clients are actively working toward that goal. But one key question remains: <em><strong>how do we measure the effectiveness of detection?<\/strong><\/em> And how can we improve it?<\/p>\n<h1>How to assess the effectiveness and improve detection on industrial perimeter?<\/h1>\n<p>To answer that question, we developed a methodology aimed at evaluating detection capabilities within industrial SOCs.<\/p>\n<p>The evaluation was built around the core activities of a SOC, structured into four pillars:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27719 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN1.png\" alt=\"\" width=\"794\" height=\"395\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN1.png 1389w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN1-384x191.png 384w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN1-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN1-768x382.png 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/p>\n<p>Using this framework, <strong>we assessed ~15 industrial clients<\/strong> to better understand their level of maturity. In this article, we\u2019ll share the <strong>key trends and insights that emerged<\/strong>, focusing specifically on detection-related questions. Two follow-up articles will be published: one delving into the effectiveness of various detection strategies and solutions, and another explaining how to test detection capabilities in industrial environments with purple teaming and the custom modules developed for that purpose.<\/p>\n<h2>Governance &amp; Strategy<\/h2>\n<p>The first question we focused on was whether industrial sites monitoring is handled by a dedicated team using specialized tools \u2014 or if, on the contrary, it&#8217;s integrated into a broader, centralized SOC approach.<\/p>\n<p>Responses are unanimous:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-27779 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN2-1.png\" alt=\"\" width=\"765\" height=\"112\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN2-1.png 1153w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN2-1-437x64.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN2-1-71x10.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN2-1-768x113.png 768w\" sizes=\"auto, (max-width: 765px) 100vw, 765px\" \/><\/p>\n<p>These figures can be explained by several factors. One key reason is <strong>financial rationalization<\/strong>. Maintaining two separate teams with similar skill sets: managing alerts, configuring tools, duplicating capabilities\u2026 is costly. However, a unified SOC implies an<strong> extended scope to cover OT<\/strong>, but not the presence of OT-specific tools or expertise and in the end, OT detection capabilities.<\/p>\n<p>Even if this approach does not guarantee effective detection and response across the OT scope, a unified SOC can manage OT incidents efficiently, under the right conditions:<\/p>\n<h3>End-to-end monitoring<\/h3>\n<p>If we look closely at the simplified threat landscape, cyberattacks might not be IT or OT-specific. Cybercrime such as ransomware, the dominant threat today, is not limited to IT or OT alone. It often spreads across both, making it essential for alerts to be followed from end-to-end.<\/p>\n<p>In the end, unifying the detection teams &amp; tools make sense as <strong>attacks are not necessarily exclusively IT or OT. <\/strong><\/p>\n<h3>Link with industrial sites<\/h3>\n<p>Response time &amp; information sharing is crucial in cyber incidents. As most security teams are centralized in a unique location, there is a <strong>need for a link between central security teams and local industrial sites<\/strong> in cyber incident response process:<\/p>\n<ul>\n<li>This relay is familiar with industrial sites, their specific characteristics, operational context, and modes of functioning<\/li>\n<li>They also maintain contact on-site to quickly gather the information required for triage, doubt resolution or investigation<\/li>\n<li>In addition, in global organizations, having resources in the right time zones and ability to communicate in the local language is key, especially in the industrial world<\/li>\n<\/ul>\n<p>Referred to as Cyber-OT Referents, these relays play an <strong>active role in the incident resolution process<\/strong>, particularly during investigation and remediation:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27723 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN3.png\" alt=\"\" width=\"739\" height=\"308\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN3.png 1441w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN3-437x182.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN3-71x30.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN3-768x320.png 768w\" sizes=\"auto, (max-width: 739px) 100vw, 739px\" \/><\/p>\n<p>In conclusion, even though <strong>unified SOC covering IT and OT<\/strong> are often driven by cost optimization, the model makes sense considering that many threats span both domains. Still, this must not be treated as a simple extension of the perimeter to cover, <strong>dedicated OT relays and expertise are essential<\/strong> to properly handle industrial-specific contexts.<\/p>\n<h2>Tooling<\/h2>\n<p>When it comes to tooling, we observed that 100% of our clients have detection tools deployed on the IT side. However, only one-third extend monitoring down to the lower layers of the industrial environment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27725 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN4.png\" alt=\"\" width=\"769\" height=\"517\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN4.png 844w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN4-284x191.png 284w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN4-58x39.png 58w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN4-768x517.png 768w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Detection sources covering different levels of the Purdue model<\/em><\/p>\n<p>We will focus on popular solutions to address detection in industrial environments: EDR and OT probes.<\/p>\n<h3>2.2.1 EDR<\/h3>\n<p>Few figures regarding EDR:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27727 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN5.png\" alt=\"\" width=\"393\" height=\"95\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN5.png 982w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN5-437x105.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN5-71x17.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN5-768x185.png 768w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/p>\n<p>Most of our clients have started deploying EDR in their industrial environments.<\/p>\n<p>However, this does not mean that 100% of EDR-compatible OT machines are covered.<\/p>\n<p>For environments that support it, extending EDR coverage allows to:<\/p>\n<ul>\n<li>Address low maturity: Start with tools that are easier to implement and require less maturity.<\/li>\n<li>Broad coverage: Focus on quickly covering a wide range of systems, sites, and critical applications.<\/li>\n<li>Leverage IT tools: Use IT-based solutions like EDR for effective detection without heavy infrastructure requirements.<\/li>\n<\/ul>\n<p>To do so, most organizations opt to use the same EDR solution for both IT and OT environments. It enables faster rollout thanks to a known and already-integrated tool. Depending on needs and\u00a0available resources, a different solution may be selected to improve resilience and OT-compatibility.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-27729  aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN6-e1758784575390.png\" alt=\"\" width=\"741\" height=\"231\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN6-e1758784575390.png 1005w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN6-e1758784575390-437x137.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN6-e1758784575390-71x22.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN6-e1758784575390-768x240.png 768w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><\/p>\n<p>To conclude, with IT\/OT convergence, <strong>deploying EDR Agents on OT Servers and Workstations<\/strong> is becoming increasingly relevant, and a <strong>quick win for OT detection<\/strong>, according to our clients\u2019 feedback.<\/p>\n<h3>OT Probes<\/h3>\n<p>Few figures regarding probes:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27731 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN7.png\" alt=\"\" width=\"588\" height=\"149\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN7.png 970w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN7-437x111.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN7-71x18.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN7-768x195.png 768w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/p>\n<p>When it comes to probes, the gap between these two figures highlights the <strong>challenge of deploying probes at scale<\/strong> and effectively using them for detection in industrial networks.<\/p>\n<p>Indeed, probes collect and correlate information through network traffic capture. To be effective, their deployment requires carefully selecting listening points based on the intended targets. Listening points need to be tailored to each site architecture, often limited by local team&#8217;s knowledge and lack of documentation.<\/p>\n<p>Operating these probes also comes with challenges and requires a <strong>significant workload<\/strong>. They tend to generate a high number of false positives, which means teams must create tailored detection rules and playbooks to filter and respond effectively.<\/p>\n<p>In the end, OT Probes may be popular, but <strong>deployment and tuning costs and resources limit their full utilization.<\/strong><\/p>\n<h3>Start basic with OT detection tools<\/h3>\n<p>In the end, for OT detection, we believe in starting basic by leveraging \u201cIT\u201d tools to ensure a first level of coverage across all sites, critical apps, and infrastructure:<\/p>\n<ul>\n<li><strong>Prioritize critical assets<\/strong>: Focus on key systems (MES, safety tools, network) essential for production, ensuring they are closely monitored before extending deployment to the lower levels of the Purdue model.<\/li>\n<li><strong>Implement basic detection<\/strong>: Establish foundational detection across sites and infrastructure for early issue identification, before advancing to complex OT solutions.<\/li>\n<\/ul>\n<h2>Training &amp; Testing<\/h2>\n<p>Detection does not rely on deploying tools alone; we will focus here on team&#8217;s ability to use them effectively.<\/p>\n<h3>A need for more OT-specific knowledge<\/h3>\n<p>Benchmark figures revealed a limited understanding and adaptation of both teams and processes to industrial environments:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-27733 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN8.png\" alt=\"\" width=\"612\" height=\"145\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN8.png 928w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN8-437x104.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN8-71x17.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN8-768x182.png 768w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><\/p>\n<p>To bridge the gap, teams need training tailored to industrial contexts, basic for all SOC analysts, and in-depth for OT specialists.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-27735 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN9.png\" alt=\"\" width=\"745\" height=\"180\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN9.png 1009w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN9-437x106.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN9-71x17.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN9-768x186.png 768w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/p>\n<p>In the same way, <strong>investigation and response processes must also be adapted<\/strong> to address the specific needs of industrial environments, where priorities such as availability differ from those in the IT world.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-27737 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN10.png\" alt=\"\" width=\"729\" height=\"159\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN10.png 1003w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN10-437x95.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN10-71x16.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN10-768x168.png 768w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/p>\n<h3>Test your detection!<\/h3>\n<p>Finally, improving detection starts with evaluating it but today \u2026<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27810 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN11-1.png\" alt=\"\" width=\"436\" height=\"105\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN11-1.png 498w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN11-1-437x105.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN11-1-71x17.png 71w\" sizes=\"auto, (max-width: 436px) 100vw, 436px\" \/><\/p>\n<p>Only a small minority test their real detection capabilities, but we believe that there is <strong>room for purple team exercise in OT<\/strong>. These collaborative exercises with the OT SOC, tailored to its maturity and goals, can <strong>test and enhance both detection tools and OT SOC processes.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27741 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN12.png\" alt=\"\" width=\"745\" height=\"496\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN12.png 1015w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN12-287x191.png 287w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN12-59x39.png 59w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN12-768x511.png 768w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/p>\n<p>It can start simple: by selecting appropriate production environments and performing a few basic tests like inserting a USB key with a standard malware sample or attempting a couple of privilege escalation actions\u2026 we can evaluate whether the EDR deployed on a workstation connected to your SOC will trigger an investigation.<\/p>\n<p>This exercise helps <strong>identify the blind spots and adjust tooling, process and playbooks<\/strong> accordingly.<\/p>\n<h1>Conclusion: How to enhance the overall low maturity in detection for industrial systems?<\/h1>\n<p>The benchmark\u2019s first conclusion is clear: <strong>maturity levels are low<\/strong>, and this is a consistent answer across all collected responses. How to enhance this overall low maturity in detection for industrial systems?<\/p>\n<p>Here are the<strong> key outcomes<\/strong> regarding the three topics covered in this article:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-27743 alignnone\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN13.png\" alt=\"\" width=\"1545\" height=\"595\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN13.png 1545w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN13-437x168.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN13-71x27.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN13-768x296.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/SOCOT1_EN13-1536x592.png 1536w\" sizes=\"auto, (max-width: 1545px) 100vw, 1545px\" \/><\/p>\n<p>Do not hesitate to reach out to discuss how you can <strong>strengthen your detection capabilities<\/strong> and <strong>measure your maturity against the market<\/strong>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OT, lower exposure but higher vulnerability Operational Technology, while overall less impacted than IT, is not exempt from cyberthreats &amp; not immune to cyberattacks. Let\u2019s take a closer look at a simplified view of the threat landscape for industrial environments:&#8230;<\/p>\n","protected":false},"author":20,"featured_media":27784,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3274],"tags":[],"coauthors":[780,4526],"class_list":["post-27774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity monitoring for OT - Current situation &amp; perspectives - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity monitoring for OT - Current situation &amp; perspectives - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"OT, lower exposure but higher vulnerability Operational Technology, while overall less impacted than IT, is not exempt from cyberthreats &amp; not immune to cyberattacks. Let\u2019s take a closer look at a simplified view of the threat landscape for industrial environments:...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-25T11:20:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T11:20:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1721\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arnaud Soulli\u00e9, Juliette BARBIER\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arnaud Soulli\u00e9, Juliette BARBIER\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\"},\"author\":{\"name\":\"Arnaud Soulli\u00e9\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79\"},\"headline\":\"Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives\",\"datePublished\":\"2025-09-25T11:20:39+00:00\",\"dateModified\":\"2025-09-25T11:20:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\"},\"wordCount\":1405,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\",\"name\":\"Cybersecurity monitoring for OT - Current situation &amp; perspectives - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg\",\"datePublished\":\"2025-09-25T11:20:39+00:00\",\"dateModified\":\"2025-09-25T11:20:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg\",\"width\":2560,\"height\":1721},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79\",\"name\":\"Arnaud Soulli\u00e9\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/arnaud-soullie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity monitoring for OT - Current situation &amp; perspectives - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity monitoring for OT - Current situation &amp; perspectives - RiskInsight","og_description":"OT, lower exposure but higher vulnerability Operational Technology, while overall less impacted than IT, is not exempt from cyberthreats &amp; not immune to cyberattacks. Let\u2019s take a closer look at a simplified view of the threat landscape for industrial environments:...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/","og_site_name":"RiskInsight","article_published_time":"2025-09-25T11:20:39+00:00","article_modified_time":"2025-09-25T11:20:41+00:00","og_image":[{"width":2560,"height":1721,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Arnaud Soulli\u00e9, Juliette BARBIER","twitter_misc":{"Written by":"Arnaud Soulli\u00e9, Juliette BARBIER","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/"},"author":{"name":"Arnaud Soulli\u00e9","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79"},"headline":"Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives","datePublished":"2025-09-25T11:20:39+00:00","dateModified":"2025-09-25T11:20:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/"},"wordCount":1405,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/","name":"Cybersecurity monitoring for OT - Current situation &amp; perspectives - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg","datePublished":"2025-09-25T11:20:39+00:00","dateModified":"2025-09-25T11:20:41+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/09\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg","width":2560,"height":1721},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/09\/cybersecurity-monitoring-for-ot-current-situation-perspectives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ba5826fcf8223b1c6c350c1d1fffc79","name":"Arnaud Soulli\u00e9","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/arnaud-soullie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/27774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=27774"}],"version-history":[{"count":18,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/27774\/revisions"}],"predecessor-version":[{"id":27817,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/27774\/revisions\/27817"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/27784"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=27774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=27774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=27774"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=27774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}