ALL INSIGHTS
    PILLAR ESSAY/3 May 2026/By Matthew Carr

    OT Security for Boards: The Questions Directors Should Ask

    What audit committees and executive teams need on the table — and what their CISOs rarely bring on their own.

    TLDR

    • OT security is now a board-level risk in any business with industrial assets — not a back-office concern.
    • The five priority questions every board should be asking are about asset visibility, third-party access, segmentation, monitoring, and incident response — in that order.
    • CISOs typically over-report on tooling and under-report on residual risk closure. That's the opposite of what boards need.
    • Regulatory compliance does not equal OT security. They overlap maybe 60% in mature sectors, less elsewhere.
    • An external annual assessment by someone who is not your incumbent vendor is the highest-ROI piece of governance hygiene most boards aren't doing.

    BOARD PRE-READ · PDF

    Want this as a board pre-read?

    A 12-page PDF version of this essay — title page, TLDR, numbered sections, FAQ, and an "About the author" page. Designed to drop straight into a board pack. Email it to yourself, then forward to your audit committee.

    We'll email the PDF link and a one-click confirmation if you opted in. The download itself is free; we ask for your email so we can actually send it.

    Most boards I sit with treat OT security as a special category — an "engineering issue" the CISO will handle, distinct from the cyber risk reviewed quarterly. That framing was reasonable a decade ago. It is no longer.

    Industrial control systems and operational technology now sit on the same balance-sheet impact tier as fraud, supply chain, and regulatory exposure. NIS2 in Europe codifies this for critical sectors. US sector regulators are signalling the same direction with TSA pipeline rules, FDA medical device guidance, and the SEC's incident disclosure regime. Insurers are repricing on the back of high-profile OT incidents. None of this is hypothetical.

    Boards therefore need to ask better questions. Not technical questions — the CISO will answer those — but the structural ones that determine whether the answers being given actually mean anything. This is a guide to what to ask, what to expect to hear, and what to do when the answers don't add up.

    01 / 07

    Why OT security is now a board-level question

    OT used to be operationally important but governance-quiet. The kit was air-gapped, the protocols were proprietary, and the IT team's domain ended at the wall of the plant. Few directors needed to know what an HMI was, let alone how it was patched.

    Three changes broke that arrangement.

    First, IT/OT convergence. Almost every plant now shares networking with corporate IT, often by accident — an integrator added a maintenance VPN, a vendor needed remote access, an ERP system pulled production telemetry. The air gap, where it ever existed, has been quietly demolished by operational necessity.

    Second, threat actor capability. Nation-state and organised criminal groups now treat OT as an attractive target, particularly in critical sectors. The 2021 Colonial Pipeline incident demonstrated that OT compromise can produce national-scale consequences within hours. Continued investment in OT-specific malware (Industroyer2, FrostyGoop) shows the trend is structural, not anomalous. Treating these as headline events that won't happen here is a poor risk model.

    Third, regulation. NIS2 is now law in the EU and operationalised across member states. US sector regulators (TSA, NERC, FDA, EPA) are issuing OT-specific cyber requirements. The SEC's 2024 incident disclosure rule applies to material OT incidents the same way it applies to data breaches. Material OT incidents are now public-disclosure events.

    Boards that don't have OT on quarterly agendas are running a regulatory and reputational exposure that D&O insurance increasingly doesn't fully cover. Putting it on the agenda is the easy part. Knowing what to ask once it's there is the harder one.

    02 / 07

    The five questions every board should ask

    These are in priority order. If you only have time for one, ask the first.

    1. What do we own, and how do we know? Asset inventory is the foundation of everything else. The question to listen for: can your CISO produce, on the call, a count of OT-connected assets within 5% accuracy? If they can't, every subsequent answer about segmentation, monitoring, and patch state is operating on guesswork. The follow-up to ask: how was that inventory built — from vendor lists, from passive network discovery, from active scanning, or from manual walkdowns? Each method has a known accuracy ceiling. Vendor lists overstate by ~30%; passive discovery understates by ~20%; only manual walkdowns combined with passive monitoring approach the truth.

    2. Who has remote access to OT, and how often does that list change? Third-party access is the single most common entry point in OT incidents. Ask how many third-party integrators, vendors, and contractors currently have credentialed access to OT environments, and what the access-recertification cadence is. You want to hear quarterly recertification, named individuals (not shared credentials), and time-bound access (revoked at engagement end). What you'll often hear is "we use a privileged access management solution" — necessary but not sufficient. PAM doesn't tell you whether the access list reflects current need.

    3. How segmented are our OT networks from corporate IT? Segmentation is the difference between a contained incident and one that turns the next quarter into a crisis. Ask for the number of network zones, the number of crossing points, and the controls at each crossing point. The right answer references a published framework — Purdue or IEC 62443 is fine. The wrong answer references "our firewall." Boards don't need to understand the technical detail; they need to hear that the architecture has been thought through against an established model.

    4. What do we monitor, and how do we know if something's wrong? Detection in OT is harder than in IT because operational engineers are trained to ignore anomalies that a security team would flag. Ask: do we have an OT-specific monitoring capability, or are we extending IT tooling? What's the ratio of alerts investigated to alerts generated? When was the last suspected OT incident, even if it turned out benign? The right answer is "we have OT-specific monitoring, we tune the alert volume to manageable, and the last false-positive investigation was within the last quarter." The wrong answer is "we haven't had any incidents." That answer means the monitoring isn't working.

    5. If something happens, what's the first hour look like? Incident response in OT is a different problem than in IT. The right answer references a playbook that has been tabletop-exercised in the last 12 months, includes the operations leader in the call tree (not just IT), and has pre-agreed criteria for when to take production offline. The wrong answer is "we'd call our cyber insurer." That's necessary; it's not sufficient.

    03 / 07

    The information CISOs should be bringing — and rarely do

    In my experience, CISOs over-report on activity (tools deployed, controls implemented, training completed) and under-report on residual risk (what's still exposed and why). Boards are typically polite about this and accept the activity report.

    Don't. The question to ask after any activity report: "What's our residual risk position now versus six months ago, and what's the trajectory?" If the CISO can't answer in plain language with quantified change, the activity report is theatre.

    The information that should be in board packs — and rarely is, in the businesses I review:

    A live residual-risk register, scored consistently quarter-on-quarter, with the top five items called out by name and owner.

    Year-on-year trend on time-to-detect and time-to-recover for the most recent simulated OT incident. Trend matters more than absolute numbers; a programme that's getting worse is a different story than one improving slowly.

    Third-party access count and change versus last quarter. The direction of change is the signal. Growing third-party access without explicit business justification is a governance gap.

    Asset inventory accuracy — and how it was measured. "100%" without a method statement is a red flag, not a reassurance.

    A plain-English summary of the top three regulatory questions the board should be aware of in the next 12 months, with a position on whether the current programme is ahead or behind on each.

    If the board pack you're getting on OT doesn't have these, you're getting a vendor's cover sheet, not a CISO's report.

    04 / 07

    Reading the regulatory horizon

    The regulatory landscape is moving faster than most boards' refresh cycles. Three frameworks deserve specific attention in the next year.

    NIS2 (EU). Operationalised in 2024, applies to most sectors with critical infrastructure exposure. Personal liability for senior management is a notable feature — director-level governance failures can attract individual accountability, not just corporate fines. If your business operates in EU member states and hasn't done a NIS2 readiness review, that's the gap. The first regulator to bring an enforcement action against a director personally will reframe the board conversation industry-wide.

    TSA pipeline / sector-specific (US). Pipeline operators have specific cybersecurity directives with audit teeth. Other US sectors are following the same pattern at varying speeds — chemical, water, healthcare, transportation. The SEC's 2024 incident disclosure rule overlays the whole landscape: material incidents (and OT incidents are usually material) require timely public disclosure. "Material" determination is the board's call, and getting that wrong has begun to attract its own enforcement attention.

    EU AI Act and sector AI guidance. This isn't OT-specific yet, but the trajectory matters: OT increasingly includes AI-driven control systems, predictive maintenance, and autonomous decision systems. Boards should be asking how the AI Act and sector AI guidance will intersect with their OT environment over the next 24 months. The answer is rarely yet rehearsed.

    Compliance with all three is necessary. Compliance with all three is not the same as security. The two overlap in mature sectors (energy, finance) more than they do in less mature ones (manufacturing, water, regional logistics). Don't confuse a clean audit with a sound risk position.

    05 / 07

    Three failure modes to watch for

    The patterns I see most often in boards that get caught flat-footed:

    The single-vendor failure. The OT security programme is run by one outsourced vendor with no independent oversight. Vendors aren't malicious, but they have an obvious conflict: their job is to keep the contract. Independent annual review is governance hygiene that boards take for granted in financial audit and consistently skip in cyber. The cost of an independent annual review is typically 10–15% of the total programme spend; the cost of not having one is the residual confidence interval on every assurance the incumbent vendor provides.

    The compliance-ceiling failure. The programme is calibrated to pass the audit, not to defend the business. This produces predictable output: clean reports, weak detection, and the kind of incident that becomes a public learning moment. Audit and security are different problems with overlapping tooling. A programme that has stopped finding issues isn't necessarily mature; it may be looking in places it knows are clean.

    The centralised-IT failure. Cyber reporting is owned by the CIO, who has organisational incentive to underreport OT issues that look like IT failures. Separate the OT cyber risk reporting line — at minimum a dotted line to the audit committee — and you de-risk this in a single board cycle. Boards that try to fix it through the CIO's existing reporting are usually fixing the wrong thing.

    06 / 07

    Building the cadence

    OT security at the board level is best handled as a quarterly fixture, not a special-topic deep dive. A suggested rhythm:

    Q1: Asset inventory and access management review. The "what do we own" question.

    Q2: Segmentation and architecture review. The "how is it isolated" question.

    Q3: Detection and monitoring review. The "would we know" question.

    Q4: Incident response and tabletop exercise. The "what happens" question.

    This rotation keeps OT in the agenda continuously, builds director familiarity over time, and ensures all five priority questions are revisited annually. Add an annual external review across all four — done by someone who is not your incumbent vendor — and you have a defensible governance posture. "Defensible" is the right word: the regulator, the litigator, and the insurer all asks variants of the same question after an incident, which is whether the board exercised reasonable oversight. A documented quarterly cadence with documented external review is what reasonable oversight looks like in 2026.

    07 / 07

    When to call an outside advisor

    Not every OT cyber question needs an external advisor. The patterns where one is genuinely useful:

    The board has materially diverging views on OT risk and needs an independent third party to surface the actual position. Internal disagreement that has gone two cycles without resolution is the signal — by cycle three, positions harden and the conversation becomes political.

    There's been an incident, even a minor one, and the post-mortem feels too internal. Internal post-mortems systematically underweight the failures everyone present is implicated in. An external review either confirms the internal narrative (which strengthens it) or surfaces what the internal team can't see.

    Regulatory pressure is intensifying and the existing programme was built for a quieter era. Programmes designed pre-NIS2 frequently miss the personal-liability dimension — they were built to satisfy audit, not to protect the directors signing off on it.

    M&A activity makes the OT environment heterogeneous overnight. This is the most under-resourced governance gap in PE-owned operating companies, where post-acquisition cyber due diligence is typically a checkbox and the integrated environment becomes a unique risk surface that nobody has independently assessed.

    A new senior leader (CEO, CFO, board chair) needs an independent baseline before signing off on the programme they inherited. Inheriting an unassessed programme is a personal liability question more often than incoming executives realise.

    CONCLUSION

    OT security is a governance question now, not a technical one. Boards that treat it as the latter outsource the entire problem to people whose job is to deliver good news. The questions in this guide aren't technical because the answers aren't where the board's value lies. The board's value is in the questions themselves — and in noticing when the answers don't quite add up.

    If your board pack doesn't include answers to all five priority questions, that's the next agenda item. If it does, keep asking.

    FAQ

    Frequently asked questions

    What's the difference between OT security and IT security from a board perspective?

    IT security is concerned primarily with information confidentiality and integrity. OT security adds availability and physical safety as primary concerns — production downtime and safety incidents have direct, often regulated, business impact. Boards typically have IT cyber on the agenda and miss the additional OT dimensions. The questions that matter at board level are largely the same in shape; the consequences of getting the answers wrong are different.

    How often should boards review OT security?

    Quarterly is standard for businesses with material OT exposure. Annual reviews are too infrequent for the regulatory and threat-actor velocity of 2026. More often than quarterly tends to drift into operational detail that doesn't belong at the board level. The four-quarter rotation in this guide — inventory, segmentation, detection, response — covers the priority questions in a single year without crowding out the rest of the board agenda.

    Should OT cybersecurity report to the CISO or to operations?

    Functionally to the CISO; with an additional reporting line to the operations leader and a dotted-line briefing path to the audit committee. Pure CIO/CISO ownership without operations input misses the operational reality. Pure operations ownership misses the cyber capability. Both are wrong individually. The dotted line to the audit committee is what closes the failure mode where OT issues get filtered through CIO incentives.

    What does NIS2 require of boards specifically?

    NIS2 introduces personal management liability for cybersecurity governance failures in covered sectors. In practice this means boards need documented evidence of governance: minutes showing OT cyber discussion, evidence of independent review, and demonstrable risk-reduction trajectory over time. The compliance text is one thing; the enforcement reality, once the first cases land, will reframe the conversation. Boards that have already moved to a quarterly cadence with external review are positioned ahead of that.

    How much should mid-size organisations spend on OT security?

    There's no clean ratio because variation by sector and asset criticality is too wide, but a useful sanity check: if your OT cyber spend is less than 0.5% of OT operational budget, the programme is almost certainly under-resourced for the regulatory environment of 2026. Mature sectors are typically running 1–3%. Spend ratio alone doesn't tell you whether the money is well-deployed; for that, the residual-risk register and external review matter more than the line item.

    Need this for your board?

    Book a 30-minute strategic consultation. Bring your specific question; I'll bring the analytical lens this essay applies to your situation.

    STRATEGIC CONSULTATION

    Book a Strategic Consultation

    30 minutes. Your specific OT or board governance question. Direct, candid, non-sales.

    • Direct call with Matthew — not a sales conversation
    • Pre-call brief: I read what you send before we talk
    • Walk out with something concrete for your next board cycle
    $50030 minutes

    Or read more like this in The Operator's Briefing or browse full advisory engagements.