logo
Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks

Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks

Zawya4 days ago
More than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022, while 95% of organizations report that the C-suite is responsible for OT, up from 41% in 2022
Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced the findings from its global 2025 State of Operational Technology and Cybersecurity Report. The results represent the current state of operational technology (OT) cybersecurity and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In addition to trends and insights impacting OT organizations, the report offers best practices to help IT and OT security teams better secure their cyber-physical systems.
'The seventh installment of the Fortinet State of Operational Technology and Cybersecurity Report shows that organizations are taking OT security more seriously. We see this trend reflected in a notable increase in the assignment of responsibility for OT risk to the C-suite, alongside an uptick in organizations self-reporting increased rates of OT security maturity,' said Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. 'Alongside these trends, we're seeing a decrease in the impact of intrusions in organizations that prioritize OT security. Everyone from the C-suite on down needs to commit to protecting sensitive OT systems and allocating the necessary resources to secure their critical operations.'
Key findings from the global survey include:
Responsibility for OT security continues to elevate within executive ranks: There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives. As accountability continues to shift into executive leadership, OT security is elevated to a high-profile issue at the board level. The top internal leaders who influence OT cybersecurity decisions are now most likely to be the CISO or CSO by an increasingly wide margin. Now more than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022. For all C-suite roles, this has spiked to 95%. Additionally, the number of organizations intending to move OT cybersecurity under CISO in the next 12 months has increased from 60% to 80% in 2025.
OT cybersecurity maturity is affecting the impact of intrusions: Self-reported OT security maturity has made notable progress this year. At the basic Level 1, 26% of organizations report establishing visibility and implementing segmentation, up from 20% in the previous year. The largest number of organizations state their security maturity is at the Level 2 access and profiling phase. The report also found a correlation between maturity and attacks. Those organizations that report being more mature (higher of Levels 0–4) are seeing fewer attacks or indicate that they are better able to handle lower-sophistication tactics, such as phishing. It's worth noting that some tactics, such as advanced persistent threats (APT) and OT malware, are difficult to detect, and less mature organizations may not have the security solutions in place to determine they exist. Overall, although nearly half of organizations experienced impacts, the impact of intrusions on organizations is declining, with a noteworthy reduction in operational outages that impacted revenue, which dropped from 52% to 42%.
Adopting cybersecurity best practices is having a positive impact: In addition to the Levels of maturity affecting the impact of intrusions, it appears that adopting best practices such as implementing basic cyber hygiene and better training and awareness are having a real impact, including a significant drop in business email compromise. Other best practices include incorporating threat intelligence, which spiked (49%) since 2024. Additionally, the report saw a significant decrease in the number of OT device vendors, which is a sign of maturity and operational efficiency. More organizations (78%) are now using only one to four OT vendors, which indicates that many of these organizations are consolidating vendors as part of their best practices. Cybersecurity vendor consolidation is also a sign of maturity and corresponds to Fortinet customer experiences with the Fortinet OT Security Platform. Unified networking and security at remote OT sites enhanced visibility and reduced cyber risks, leading to a 93% reduction in cyber incidents vs. a flat network. The simplified Fortinet solutions also led to a 7x improvement in performance through reductions in triage and setup.1
Best Practices
Fortinet's global 2025 State of Operational Technology and Cybersecurity Report provides actionable insights for organizations to strengthen their security posture. Organizations can address OT security challenges by adopting the following best practices:
Establish visibility and compensating controls for OT assets: Organizations need the ability to see and understand everything that's on their OT networks. Once visibility is established, organizations then need to protect critical devices and ones that may be vulnerable, which requires protective compensating controls that are designed for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent compromise of vulnerable assets.
Deploy segmentation: Reducing intrusions requires a hardened OT environment with strong network policy controls at all access points. This kind of defensible OT architecture starts with creating network zones or segments. Standards such as ISA/IEC 62443 specifically call for segmentation to enforce controls between OT and IT networks and between OT systems. Teams should also evaluate the overall complexity of managing a solution and consider the benefits of an integrated or platform-based approach with centralized management capabilities.
Integrate OT into security operations (SecOps) and incident response planning: Organizations should be maturing toward IT/OT SecOps. To get there, OT needs to be a specific consideration for SecOps and incident response plans, largely because of some of the distinctions between OT and IT environments, from unique device types to the broader consequences of an OT breach impacting critical operations. One key step in this direction is to have playbooks that include your organization's OT environment. This kind of advanced preparation will foster better collaboration across IT, OT, and production teams to adequately assess cyber and production risks. It can also ensure that the CISO has proper awareness, prioritization, budget, and personnel allocations.
Consider a platform approach to your overall security architecture: To address rapidly evolving OT threats and an expanding attack surface, many organizations have assembled a broad array of security solutions from different vendors. This has yielded an overly complex security architecture that inhibits visibility while placing an increased burden on limited security team resources. A platform-based approach to security can help organizations consolidate vendors and simplify their architecture. A robust security platform with specific capabilities for both IT networks and OT environments can provide solution integration for improved security efficacy while enabling centralized management for enhanced efficiency. Integration can also provide a foundation for automated responses to threats.
Embrace OT-specific threat intelligence and security services: OT security depends on timely awareness and precise analytical insights about imminent risks. A platform-based security architecture should also apply AI-powered threat intelligence for near-real-time protection against the latest threats, attack variants, and exposures. Organizations should ensure their threat intelligence and content sources include robust, OT-specific information in their feeds and services.
Report Overview
The Fortinet 2025 State of Operational Technology and Cybersecurity Report is based on data from a global survey of more than 550 OT professionals, conducted by a third-party research company.
Survey respondents were from different locations around the world, including Australia, New Zealand, Argentina, Brazil, Canada, Mainland China, Colombia, Denmark, Egypt, France, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Philippines, Poland, Portugal, Singapore, South Africa, South Korea, Spain, Taiwan, Thailand, United Kingdom, and the United States, among others.
Respondents represent a range of industries that are heavy users of OT, including: manufacturing, transportation/logistics, healthcare/pharma, oil, gas, and refining, energy/utilities, chemical/petrochemical, and water/wastewater.
Most of those surveyed, regardless of title, are deeply involved in cybersecurity purchasing decisions. Many respondents are responsible for operations technology at their organization and/or have reporting responsibility for manufacturing or plant operations.
About Fortinet
Fortinet (Nasdaq: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere our customers need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. Collaboration with esteemed organizations from both the public and private sectors, including Computer Emergency Response Teams ('CERTS'), government entities, and academia, is a fundamental aspect of Fortinet's commitment to enhance cyber resilience globally. FortiGuard Labs, Fortinet's elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Amiseq's Z‑Deploy to streamline, accelerate cybersecurity solutions; opens Dubai office
Amiseq's Z‑Deploy to streamline, accelerate cybersecurity solutions; opens Dubai office

Tahawul Tech

time4 hours ago

  • Tahawul Tech

Amiseq's Z‑Deploy to streamline, accelerate cybersecurity solutions; opens Dubai office

With its new AI-powered platform and regional hub, Amiseq aims to redefine cybersecurity deployments and deepen its footprint across the Middle East and beyond. Amiseq, a global IT services company at the forefront of cybersecurity and intelligent automation, has marked a major milestone with the launch of its new regional office in Dubai and the introduction of its pioneering zero-touch deployment platform, Z-Deploy. Designed to streamline and accelerate the implementation of cybersecurity solutions, Z-Deploy promises to cut deployment times drastically—from days to hours—while ensuring consistency across cloud, hybrid, and even air-gapped environments. Nilesh Jadhav, CEO & Co-Founder of Amiseq, shares with insights on the significance of the Dubai expansion, the innovation journey behind Z-Deploy, and the company's ambitious roadmap for global growth. Interview excerpts: What does the inauguration of your new office represent for the company's growth and presence in the region? The opening of our new office in Dubai is a pivotal moment in Amiseq's journey. It symbolizes our long-term commitment to the Middle East and our confidence in the region's digital transformation momentum. This space is more than just a workplace—it's a regional innovation hub designed to bring us closer to our clients, accelerate collaboration, and scale our operations to meet growing demand. What inspired the development of Z-Deploy, and what key problems does it aim to solve for your customers? Z-Deploy was born from a clear market need. Our clients were facing significant delays and resource constraints when deploying cybersecurity solutions. The process was often manual, time-consuming, and dependent on certified engineers. We envisioned Z-Deploy as a zero-touch, intelligent automation platform that could eliminate these bottlenecks, enabling faster, more secure, and scalable deployments across complex IT environments. How does Z-Deploy enable faster and more efficient deployment processes across modern IT environments? Z-Deploy leverages AI-driven orchestration to automate the entire deployment lifecycle—from configuration to validation—across cloud, on-prem, hybrid, and even air-gapped environments. It reduces deployment time from days to hours, ensures consistency, and minimizes human error. For example, we've successfully reduced the deployment time for a market leader with a Vulnerability Management solution from five days to under two hours. What was the role of your in-house team in developing Z-Deploy, and how does this reflect your approach to innovation? Z-Deploy is a 100% in-house innovation, developed by our Intelligent Automation team. From ideation to MVP and go-live, every milestone was achieved internally. This reflects our belief in cultivating homegrown talent and fostering a culture of ownership and experimentation. 'Our agile development approach ensured rapid iteration, scalability, and alignment with real-world customer needs.' Following this launch, what future plans do you have for expanding your technology offerings and regional footprint? This launch is just the beginning. We're actively expanding Z-Deploy's capabilities to support a broader range of enterprise applications and cybersecurity tools. Regionally, we're scaling our presence in EMEA, APAC and North America, with new offices and strategic hires already in motion. Our roadmap includes deeper OEM integrations, enhanced analytics, and AI-powered decision support—ensuring we continue to deliver transformative value to our clients worldwide.

♏ Scorpio Daily Horoscope for July 18, 2025
♏ Scorpio Daily Horoscope for July 18, 2025

UAE Moments

time4 hours ago

  • UAE Moments

♏ Scorpio Daily Horoscope for July 18, 2025

❤️ Love & Relationships Intense emotional currents may rise—embrace vulnerability. Today brings opportunities to connect through authenticity. Single Scorpios could experience magnetic encounters; for couples, deep conversation sparks renewed intimacy. 💼 Career & Ambitions Your determination sharpens, and long-term goals come into focus. It's a perfect time to tackle complex projects or propose ambitious ideas. Your passion is persuasive—confidantes will rally to your side. 💰 Finance & Resources Financial insight blooms under Scorpio's influence. You may notice overlooked opportunities or hidden expenses. Trust your instincts when evaluating potential investments or purchases. Avoid impulsive splurges, especially in the evening. 🌿 Health & Well‑Being Energy and resilience are strong mid-day. Yet, emotional depth may require moments of self-care. A short nature walk or quiet breathwork can reset your mental and energetic balance. 🧭 Personal Growth Your transformative powers are amplified—embrace discomfort to access deeper growth. A reflective practice, like mindful writing or guided meditation, may help integrate insights and powerfully shift your mindset. 🎨 Lucky Color: Burgundy 🔢 Lucky Numbers: 8, 21, 35

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store