“Jaguar Land Rover was breached recently… it was costing them fifty million pounds a week in disruption. And it didn’t just impact them, it impacted their entire supply chain.”
During our recent webinar, cyber risk expert Sandra Taylor from Cyber Critical Solutions Ltd, shared this striking example to highlight a growing reality where the line between IT (information systems) and OT (operational technology) has disappeared. With 30+ years of experience managing cyber risk across critical infrastructure sectors — including healthcare, energy, aviation, and organizations like Petronas and Shell — Sandra underscored that IT/OT convergence is now one of the biggest concerns for CISOs and boards. The gaps in preparedness and skilled talent make the risk even more urgent.
In this blog, we unpack why IT–OT convergence is now a critical cyber risk priority, highlight practical strategies from Sandra, and provide a CISO checklist to build stronger OT cyber resilience.
The Jaguar Land Rover breach isn’t an outlier. It’s part of a growing pattern where cyberattacks on IT systems spill into OT environments, halting operations and disrupting economies.
The American Water cyber attack that occurred in February 2024 caused the temporary shutdown of OT systems, forcing operators into manual mode. American Water Works is the largest regulated water and wastewater utility in the U.S., serving more than 14 million customers. In another incident in January 2024, ransomware shut down parts of French industrial giant Schneider Electric’s sustainability business division systems, impacting OT customer access and delaying operations.
According to PwC’s 2026 Global Digital Trust Insights, OT and IIoT are now among the top concerns for boards and CISOs, with major capability gaps. Critical infrastructure — manufacturing plants, power grids, hospitals, railways, and utilities — now depend on thousands of connected devices that were never designed for cybersecurity.
OT environments in 2025 are facing heightened cyber exposure due to multiple converging factors:
In our webinar, Sandra shared practical strategies for CISOs, risk leaders, and GRC professionals to enhance cyber and operational resilience in critical infrastructure sectors and beyond.
Integrate Governance Frameworks and Unify Risk Assessment for Holistic Cyber Resilience
To achieve a comprehensive cyber risk management function, organizations must integrate IT and OT domains under adaptable governance frameworks such as NIST, ISO 27001, and IEC 62443. Organizations benefit from aligning cyber risk programs with enterprise risk and compliance strategies to maintain a holistic view of risks and regulatory requirements. Using consistent business impact and vulnerability assessments based on enterprise-approved scoring models enables prioritization and a common language that resonates across business units, facilitating informed decision-making.
Deduplicate Controls and Implement Changes in Phases for Effective Risk Reduction
To manage regulatory complexity and audit demands effectively, organizations should deduplicate controls across the multiple standards they adhere to. This reduces redundant efforts and audit fatigue by allowing a single control to serve multiple compliance requirements, supported by maintaining evidence centrally. Adopting a phased approach to control deployment, starting with the highest risk vulnerabilities, helps avoid overwhelming teams, encourages cultural adoption of security practices, and enables more manageable progress toward full compliance, especially within operational technology environments.
Foster Strong Collaboration Across Domains with Clear Project Scoping
Precisely defining the scope of assessments, including systems and their interfaces, is essential to ensuring appropriate coverage without unnecessary complexity. Cyber functions must also coordinate clearly with other organizational functions such as legal compliance, procurement, and physical security to delineate responsibility and assure coverage without duplication. Documenting agreed control boundaries and assurance responsibilities fosters transparency and operational efficiency.
Address Legal Regulatory and Geographical Nuances in Cyber Risk Strategies
Cyber risk management must encompass the legal and regulatory environments of all operating regions. Differences like those between GDPR and local privacy laws require tailored approaches, including engaging local legal experts to confirm compliance obligations and integrate these into risk assessments and control requirements. Treating regulations as part of the risk matrix links cyber risk directly with business risks, increasing business stakeholder engagement and relevance.
Manage Third-Party Risks with Robust Contractual Controls
Third-party vendors often possess access to critical data or systems. This requires organizations to embed robust cyber controls into contracts and actively manage the associated risks. Contractual clauses should mandate timely notification of personnel changes and breaches, and gaps between regulatory requirements and third-party capabilities must be tracked and managed through remediation or risk acceptance within the organization’s cyber risk framework.
Build AI Security on a Foundation of Strong Cyber Hygiene Practices
While artificial intelligence introduces new risk dimensions, such as transparency, fairness, and accountability, these cannot be addressed in isolation. A strong foundation of IT and OT cybersecurity hygiene, including confidentiality, integrity, and availability controls, is essential before integrating AI governance. Managing AI-related cyber risks requires maturity in cybersecurity basics.
Leverage Integrated GRC Solutions to Enhance Cyber Resilience Value
Implementing an integrated Governance, Risk, and Compliance (GRC) approach yields long-term efficiency gains. Though initial setup requires effort – such as conducting baseline business impact and risk assessments, de-duplicating controls, and building centralized evidence repositories – these efforts reduce redundant audit activities and support rapid demonstration of compliance across multiple frameworks. Starting small, even with manual or spreadsheet-based processes, helps embed culture and understanding before scaling to technology-enabled GRC platforms.
Protecting interconnected systems requires visibility, collaboration, and a strong cyber GRC foundation that unites cybersecurity, operational safety, and regulatory oversight under a single governance model. Here’s how CISOs can prepare and strengthen their OT cyber resilience:
| Priority | What to Do |
| Visibility | Map OT/IIoT assets — you can’t protect what you can’t see. |
| Segmentation | Separate IT and OT networks to prevent lateral movement. |
| Risk Alignment | Use one enterprise scoring model for both IT and OT risks. |
| Control Deduplication | Reduce redundant audits and effort across frameworks. |
| Collaboration | Legal + procurement + physical security must align early. |
| Third-Party Accountability | Enforce contractual controls and breach notification SLAs. |
| Build Tale | Upskill teams in OT-specific cyber scenarios. |
| Continuous Monitoring | Use dashboards and anomaly detection for situational awareness. |
MetricStream’s AI-first Cyber GRC, built as an interconnected, intuitive, and intelligent connected GRC product set, empowers CISOs to connect cyber risk data from across the enterprise, including third and fourth-party vendors, and then use the actionable business intelligence to make data-driven decisions to build cyber resilience.
With MetricStream Cyber GRC, you can:
See Cyber GRC in action. Request a personalized demo today.
Want to learn more? Watch the original webinar here: