Prior to publication of the 2006 Gartner research paper introducing the term operational technology ( OT ), there was either engineering or information technology ( IT ). The word OT created a cross between architecture and IT that hasn’t been adequately connected. Engineers come from a “physics-based” control, whereas OT comes from a data-centric control. OT is known in the security area but not necessarily around. That is, electric, mechanical, chemical, nuclear, business, systems and other engineers and technicians often do not consider themselves to be OT and may not be aware of the term.
A new work request from a medium-size water utility was seeking young, mid-level and mature engineers. The call stated the important functions were to:
” …assist with or lead providing electrical engineering and technical support to ensure reliable operation of the utility’s SCADA controlled facilities including remote terminal units (RTUs ), programmable logic controllers ( PLCs ), programmable automation controllers ( PACs ), associated industrial communications, networking equipment and protective relaying equipment”.
Even though the specialists were responsible for the industrial networks and communication equipment ( these would be considered OT network ), the engineers were not responsible for security of those networks as there was no mention of security in the job descriptions. Also, there was no mention of the word OT nor any concern with working with the community safety organization.
Another new career request was from a big electric power for an OT Cybersecurity Senior Analyst. According to the request, the analyst may be part of a team consisting of qualified OT cybersecurity professionals to ensure the cybersecurity resilience and regulatory compliance of the utility’s business operating sites. The focus would be on identifying vulnerabilities and assessing risks to uphold and continuously improving the security posture of industrial control systems ( ICS) and OT environments. There was no notice of understanding the actual process or working with the executive companies.  ,
This difference in mutual knowledge has prevented essential plant processes and manage program equipment from being cybersecure and safe. The report” Who’s In Charge of OT Security”, written for the Institute for Homeland Security at Sam Houston State University,  , explores these social issues in greater detail.