Hit enter to search

IT/OT Convergence Is Redefining OT Security

Author Avatar
Joris Ignoul
Security Engineer

OT security is no longer a niche topic reserved for industrial specialists. Today, we observe that most OT environments aren’t hacked, but simply accessed. 

Earlier this year, coordinated cyberattacks targeted multiple organizations in Poland’s energy sector, including wind farms, solar plants, and a major combined heat and power facility. What makes this incident particularly alarming is not just the scale, but the lack of complex exploits: attackers relied on exposed VPN access, weak authentication, and poor segmentation to move from IT into OT. 

It reflects a clear shift: attackers are no longer targeting only IT environments, but are actively exploiting the connection between IT and Operational Technology (OT).

Our security experts Joris Ignoul and Gerrit Neyrinck explain why this scenario was not exceptional, but rather expected: 

The Attack Surface is Expanding

Traditionally, Operational Technology (OT) environments — such as SCADA systems, substations, and industrial controllers — were isolated, but that is long gone. To enable remote monitoring, maintenance, and efficiency, OT environments are increasingly connected to IT systems.

In the Polish incident, attackers leveraged exactly this convergence:

  • Remote access to substations via VPN
  • Connectivity between IT systems and industrial controllers
  • Centralized management through SCADA environments

 
👉  These connections are essential for operations, but also create a direct attack path into critical infrastructure.

OT Security Weaknesses Start With Remote Access

The Polish CERT report highlights a recurring issue in OT security:

  • Internet-exposed VPN gateways
  • No multi-factor authentication (MFA)
  • Reused credentials across multiple sites

This allowed attackers to scale access quickly across environments.

Once inside, they leveraged:

  • RDP access to internal systems
  • Jump hosts for lateral movement
  • Misconfigured permissions


👉 This is not advanced hacking, but exploiting weak foundations.

From IT Breach to OT Impact

The most critical takeaway? This was not a data breach. It was a destructive attack on operational systems.

The attackers:

  • Corrupted firmware on industrial controllers
  • Disabled communication between systems
  • Deployed wiper malware across IT environments
  • Attempted to destroy entire infrastructures

The impact went beyond IT, and directly affected operational visibility and control.

 👉 CERT Polska describes these actions as comparable to digital sabotage.

Why OT Security Still Falls Behind

Despite growing threats, many organizations still treat OT security differently from IT.

Common gaps include:

⚠️ Default Credentials Still Exist

Industrial devices often run with:

  • Default usernames and passwords
  • Weak authentication mechanisms

⚠️Lack of Network Segmentation

Flat networks allow attackers to:

  • Move from IT to OT
  • Access critical systems without barriers

⚠️ Legacy Systems

OT environments prioritize uptime, meaning:

  • Patching is delayed
  • Security controls are limited

 
👉 All of these gaps result in high-value environments with low security maturity

OT Security Is a Business Risk Beyond IT

This is where OT security becomes strategic, because a successful attack can lead to:

  • Operational downtime
  • Production loss
  • Safety risks
  • Regulatory non-compliance (e.g. NIS2)
  • Reputational damage

 
👉 This is why OT security is increasingly a C-level concern. 

OT Security Priorities for 2026

To reduce risk, organizations should focus on:

💡Securing remote access

  • Enforce MFA everywhere
  • Eliminate shared accounts
  • Monitor all remote sessions
  • ...

💡Segmenting IT and OT networks

  • Define clear zones
  • Restrict lateral movement
  • ...

💡Removing default configurations

  • Change all default credentials
  • Harden industrial devices
  • ...

💡Improving visibility

  • Monitor OT environments continuously
  • Detect anomalies early
  • ....

💡Aligning with compliance frameworks

  • NIS2
  • ISO 27001
  • IEC 62443
  • ...

Conclusion: From Awareness to Action

The key lesson is simple: OT environments are no longer “too specific” to be targeted. They have become prime targets.

The convergence of IT and OT means that actions such as a single compromised VPN account, a single reused password or a single misconfiguration can lead to operational disruption.

Source: Republic of Poland - Ministry of Digital Affairs - Energy Sector Incident Report

 


How Easi Supports Your OT Security Strategy

At Easi, we help organizations secure their IT/OT ecosystem. Our approach includes:

  • OT security assessments
  • Network segmentation strategies
  • Secure remote access implementation
  • Continuous monitoring and response

👉 Discover more about our approach on IT security and OT security
👉 Contact us for tailored guidance

GNEY (1)  JIGN (1) 

Gerrit Neyrinck
Expert Security Engineer

Joris Ignoul
Security Engineer

 

Join us at Cybersec Europe 2026

This year, Easi returns to  the largest IT trade fair in Belgium with a brand-new and expanded booth. Here, OT security takes a central role alongside the latest innovations in IT and cybersecurity.

Meet our experts, explore how to secure your IT/OT environments, and get answers to your questions on SOC, SASE, and more. We’ll also dive into other key topics such as AI in IT and GRC.

 

Current job openings

We are constantly looking for new colleagues!

If you share our values and you're looking for a challenging job in Belgium's Best Workplace, visit our website.

Apply now

Get our top stories in your inbox every month

Follow us

  

Share this article