Many organizations have their IT space well protected from cyber-attacks, but likewise, many do not have adequate protection in place to protect their OT assets. Do you have a plan to get your OT Cyber Security to a properly protected level?
Using a well-defined maturity model to identify the steps necessary to protect OT is a great way to get started!