Securing the IT/OT Convergence in Energy Data Environments
A CISO's framework for protecting the expanding attack surface where operational technology meets enterprise IT
Abstract
The convergence of information technology (IT) and operational technology (OT) systems in energy operations has created unprecedented operational efficiencies — and an equally unprecedented cybersecurity challenge. This white paper examines the unique threat landscape at the IT/OT boundary, presents a defense-in-depth framework for energy data environments, and provides practical guidance for CISOs navigating the regulatory and operational complexities of securing converged infrastructure.
Key Takeaways
- 1 The IT/OT air gap has effectively disappeared, expanding the attack surface in energy operations dramatically.
- 2 Defense-in-depth across five domains — segmentation, IAM, monitoring, data protection, and incident response — is essential.
- 3 OT-specific NDR solutions that understand industrial protocols (Modbus, DNP3, OPC-UA) are critical for threat detection.
- 4 Regulatory mandates (TSA directives, SEC rules, NIS2) have made cybersecurity a board-level governance issue.
- 5 Cross-functional training bridging IT security and OT operations knowledge is the highest-impact cultural investment.
1. The Converging Attack Surface
For decades, operational technology systems in energy operations — SCADA controllers, programmable logic controllers (PLCs), distributed control systems (DCS), and flow computers — operated in isolation from enterprise IT networks. This 'air gap' provided a natural security boundary: even if an attacker compromised the corporate email system, they couldn't reach the pipeline control systems.
That air gap has effectively disappeared. Modern energy operations require real-time data flow between field devices and enterprise systems. A flow computer measuring crude oil volume at a custody transfer point must transmit data to the ETRM system for deal validation, to the accounting system for revenue recognition, and to the regulatory reporting system for compliance filings — all in near-real-time. IoT sensors on pipeline segments feed predictive maintenance algorithms running in cloud environments. Terminal automation systems interface with carrier scheduling platforms and marine vessel tracking systems.
This convergence has expanded the attack surface dramatically. A 2025 survey by the SANS Institute found that 67% of energy companies experienced at least one cybersecurity incident involving OT systems in the preceding 12 months, up from 41% in 2022. The Colonial Pipeline ransomware attack demonstrated that disruption to IT systems can cascade into OT shutdowns even without direct OT compromise, as operators lose the visibility and control systems needed to operate safely.
"67% of energy companies experienced at least one cybersecurity incident involving OT systems in 2024, up from 41% in 2022."
2. Threat Landscape Analysis
The threat actors targeting energy IT/OT environments fall into four categories, each with distinct motivations, capabilities, and attack patterns.
Nation-state actors represent the most sophisticated threat. Groups attributed to Russia (Sandworm, Triton/TRISIS), China (Volt Typhoon), and Iran (APT33) have demonstrated the ability to compromise industrial control systems and, in some cases, manipulate physical processes. These actors typically employ multi-stage attacks that begin with spear-phishing or supply chain compromise, establish persistent access in IT environments, and then pivot laterally into OT networks over periods of months or years.
Ransomware operators have increasingly targeted energy companies, recognizing that operational disruption creates intense pressure to pay ransoms quickly. The average ransom demand against energy companies reached $4.2 million in 2025, with total incident costs (including downtime, remediation, and regulatory penalties) averaging $12.8 million.
Insider threats — both malicious and negligent — account for approximately 30% of energy sector incidents. Common scenarios include contractors with excessive access privileges, employees who bypass security controls for convenience, and disgruntled workers who sabotage systems during or after employment.
Hacktivists and ideologically motivated actors have targeted energy companies in response to environmental controversies, geopolitical events, and corporate policy disputes. While their technical sophistication is generally lower, their attacks can cause significant reputational damage and operational disruption.
3. Defense-in-Depth Framework for Energy Data Environments
Securing the IT/OT boundary requires a defense-in-depth strategy that layers multiple security controls across the converged environment. We recommend organizing these controls into five domains: network segmentation, identity and access management, monitoring and detection, data protection, and incident response.
Network segmentation remains the foundational control. The Purdue Enterprise Reference Architecture (PERA) provides a well-established model for segmenting industrial networks into hierarchical zones, from Level 0 (physical process) through Level 5 (enterprise network). In converged environments, the critical boundary is the Industrial Demilitarized Zone (IDMZ) between Levels 3 and 4, which should enforce unidirectional data flow from OT to IT while strictly controlling any data flow in the reverse direction.
Modern implementations augment PERA with micro-segmentation and zero-trust network access (ZTNA). Rather than trusting all traffic within a zone, zero-trust architectures verify every connection request against identity, device health, and contextual policies. This is particularly important for securing remote access to OT environments, which expanded significantly during the COVID-19 pandemic and has remained elevated.
Identity and access management in converged environments must handle both human and machine identities. Privileged access management (PAM) solutions should enforce just-in-time access, session recording, and credential vaulting for all administrative access to OT systems. Service accounts and machine-to-machine communications should use certificate-based authentication with automated rotation.
4. Monitoring and Threat Detection
Effective monitoring of converged IT/OT environments requires specialized tooling that understands industrial protocols (Modbus, DNP3, OPC-UA, HART) alongside traditional IT protocols (HTTP, DNS, SMB). Legacy IT security tools — SIEMs, EDR, NDR — lack the protocol awareness and behavioral baselines needed to detect anomalies in OT traffic.
We recommend deploying OT-specific network detection and response (NDR) solutions at the IDMZ boundary and within OT network zones. These solutions passively monitor network traffic, build behavioral models of normal industrial communications, and alert on deviations — such as an unexpected write command to a PLC, a SCADA station communicating with an unknown IP address, or a change to a safety instrumented system (SIS) configuration outside a scheduled maintenance window.
Correlation between IT and OT security events is essential for detecting multi-stage attacks. A phishing email delivered to a control room operator's workstation may appear benign in isolation, but when correlated with subsequent lateral movement toward the OT network, it reveals a potentially serious intrusion attempt. Modern security orchestration, automation, and response (SOAR) platforms can automate this correlation and trigger appropriate response actions.
5. Regulatory Compliance Landscape
The regulatory environment for energy cybersecurity is evolving rapidly. In the United States, the Transportation Security Administration (TSA) has issued binding security directives for pipeline operators requiring cyber incident reporting, vulnerability assessments, and implementation of specific security controls. The NERC Critical Infrastructure Protection (CIP) standards impose detailed cybersecurity requirements on operators of the bulk electric system.
The SEC's cybersecurity disclosure rules, effective since 2024, require public companies to disclose material cybersecurity incidents within four business days and to describe their cybersecurity governance, risk management, and strategy in annual filings. For energy companies, this means that cybersecurity is no longer solely a technical concern — it has become a board-level governance issue with direct implications for financial reporting and shareholder communication.
Internationally, the EU's NIS2 Directive expands cybersecurity obligations to a broader range of energy sector entities and introduces personal liability for management bodies that fail to oversee cybersecurity risk management. The directive requires entity-level risk assessments, supply chain security measures, and incident reporting within 24 hours of discovery.
"Cybersecurity has shifted from a technical concern to a board-level governance issue with direct implications for financial reporting."
6. Building a Security-First Culture
Technology controls alone are insufficient. The human element remains the most frequently exploited vulnerability in energy cybersecurity. Building a security-first culture requires sustained investment in training, awareness, and organizational alignment.
OT personnel — control room operators, field technicians, instrumentation engineers — often have deep process knowledge but limited cybersecurity training. Conversely, IT security professionals may lack understanding of industrial processes, safety systems, and the operational constraints that limit security control options in OT environments. Bridging this knowledge gap requires cross-functional training programs, joint tabletop exercises, and organizational structures that promote collaboration between IT security and OT operations teams.
Executive leadership must champion cybersecurity as an operational safety issue, not merely an IT compliance checkbox. When cybersecurity is framed in terms of operational reliability, environmental protection, and worker safety — outcomes that resonate with operations leadership — it receives the organizational support and budget allocation needed for effective implementation.
Ready to implement these strategies?
Our team can help you assess your current capabilities and build a roadmap tailored to your operations.
Request a Consultation