Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

asset thumbnail
Book
Dec 10, 2025

Executive Edge: Peer Insights - Complexity at the intersection of IT and OT

Executive Edge: Peer Insights - Complexity at the intersection of IT and OT

Preview PDF Download
Preview PDF Download

Operational technology (OT) systems have traditionally been a fertile environment for cyberattackers. Today, digital transformation is tightly integrating OT systems with traditional information technology (IT) systems and frameworks, creating a hairball of complexity and increasing vulnerability to cyberattacks.

This brand new Peer Insights guide captures key insights and perspectives from industry experts in technology, utilities, manufacturing, and more, on their IT/OT cybersecurity journeys. Each chapter, authored by a senior security leader, shares their actionable advice and real-world examples that will help you apply these learnings to your own IT/OT infrastructure and drive change within your organisation.

The guide comes at a critical time for security leaders seeking new solutions to streamline security, reduce complexity, and keep pace with present and future threats across the IT/OT environment.

Overview & Authors


Thierry Karsenti
VP, EMEA Technical Solutions
Palo Alto Networks

Introduction - The strategic imperative for OT/IT convergence
Securing OT represents an entirely new set of challenges and threats as it becomes tightly integrated with traditional IT systems. New mindsets and strategies are crucial for securing mission-critical OT systems in key vertical markets, such as manufacturing and utilities.


Anirudha Dambal
Head of Services for Process Automation
Siemens

1. The new operational technology mindset
OT teams have traditionally prioritised safety, availability, and reliability, but digital transformation, growing data volumes, and increasingly sophisticated cyberattacks are putting new emphasis on security-focused requirements. Ensuring cybersecurity readiness in OT/IT convergence requires a new OT mindset that considers financial, operational, regulatory, and technological implications, and delivers defense in depth.


Laurent Guerin
VP - CISO
CMA CGM

2. Modern technology matters when securing OT systems
Most OT systems were designed in an era when the architecture was engineered without cybersecurity expertise and OT/IT connectivity. Today’s systems – and those in the future – must be built with modern security risks in mind from the start. How can organisations ensure that OT systems can evolve with new and emerging technologies, while remaining secure against growing cyberthreats?


Jean-Charles Hardouin
CIO
Arkema

3. Compliance can be complex when OT and IT converge: Try a simpler approach
Compliance in manufacturing usually centres on ensuring a safe working environment for employees. With increasing data volumes and connected devices, and the adoption of AI and other technologies, manufacturers must be hyper-vigilant in protecting data, user identities, and credentials. All these requirements have stringent regulatory demands, made even more challenging by the intersection of OT and IT, but there are ways to simplify approaches to compliance.


Philippe Netzer-Joly
Group Chief Cybersecurity Officer
Arkema


Edwin Erckens
Chief Digital Technology Officer
UCB

4. Managing divergent OT and IT teams for cybersecurity excellence
In many organisations, the mindsets and experiences of OT and IT professionals are miles apart. This is especially true for cybersecurity, where different priorities and approaches can create friction. Bridging that gap is crucial to protecting OT/IT systems. How can organisations create the right environment for these teams to collaborate and thrive?


Mark Cunningham
IT/OT Evangelist
A leading energy company

5. Leveraging the cloud to overcome and manage OT/IT cybersecurity complexity
OT systems are following the path blazed by IT in developing, deploying, and running workloads in the cloud. This opens up myriad cybersecurity risks—especially considering the massive proliferation of devices and data resulting from converged workloads in the cloud. To tackle complexity in converging OT/IT environments, organisations need to embrace the inevitable shift to the cloud and implement stronger, more resilient cyber defences.


Alfonso Álvarez
Global IT/OT Lead
Exolum

6. Now what? Steps organisations can take today to secure OT/IT environments for the future
This guide has covered OT/IT cybersecurity from a variety of perspectives. Now, it’s time to take action. Organisations need new defensive strategies that can keep pace with new, hyper-intelligent threats across the OT/IT environment. What are the most important steps that you should take to position your organisation for success – both now and in the future – when securing OT/IT systems?

Share page on facebook Share page on linkedin Share page by an email
Create an account Sign In

Already have an account? Sign in to continue reading.

Sign in here if you are a customer, partner or an employee.

Sign in with SSO
OR
Continue with Google Continue with LinkedIn
OR
Sign In

For unlimited access to ebooks and other resources, create an account today.

Join us to become a Member

Continue with Google Continue with LinkedIn
OR

Please complete reCAPTCHA to enable form submission.

I'd like to speak with a specialist
Email me exclusive invites, research, offers, and news

By clicking on "Join us to become a member", you agree to our Terms of Use and acknowledge our Privacy Statement.

Almost Done!

I'd like to speak with a specialist
Email me exclusive invites, research, offers, and news

By clicking on "Create Account", you agree to our Terms of Use and acknowledge our Privacy Statement.

Thank you for registering!

We have sent a confirmation email to {0}. Please check your email and click on the link to activate your account.

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language