Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Building Effective IT-OT Security Partnerships

Claroty
05/06/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Successful IT-OT security partnerships require early engagement with local site engineers rather than top-down corporate mandates that create friction and resistance.
  • Security programs should involve OT engineers from each site to provide feedback and advocate for initiatives, turning them into internal champions rather than obstacles.
  • Modern security tools deliver operational benefits to OT teams including automated inventory management and change detection, eliminating time-consuming manual processes and providing real-time visibility into system changes.

Summary

In this Ask an OT Engineer segment, Gary Kneeland addresses the common friction point between operational technology (OT) and IT teams when implementing security programs. Drawing from his experience in industrial facilities and at Schneider Electric, Kneeland emphasizes that successful IT-OT collaboration requires early engagement and local buy-in rather than top-down corporate mandates. He explains that OT environments are complex operational systems where changes require careful coordination and understanding of site-specific constraints. The most effective security programs involve local engineers from each site who can provide feedback and advocate for initiatives within their facilities. Kneeland highlights that security tools can deliver tangible operational benefits to OT teams, including automated inventory management and change detection, which eliminates manual walkthroughs. By framing security as a shared mission to protect safety and operations, organizations can build productive partnerships that serve both IT security objectives and OT operational needs.

Chapters

0:00 - IT-OT Relationship Challenges
0:45 - Why Corporate Mandates Fail
1:29 - Successful Engagement Strategies
2:08 - Shared Security Mission

Key Quotes

0:45 "What I've seen fail a lot of times is where you see like a corporate mandate. Your IT team shows up on site and they say, we're going to go do security. And then they run into the wall of, you know, the OT guys saying, what are you doing? You can't touch my equipment."
1:32 "The teams that I've seen have the most success do that, right? They bring in folks ideally from each site if they can, so that they can have local engineers not only give them feedback, but then turn around and sell the project back to the local folks."
2:10 "Security has a goal. We're trying to help protect the safety and operation of these systems, and that's a goal everybody shares, right? Your entire company cares a lot about that."
Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • OT
  • IoT Security
  • Best Practices
  • Security Operations
  • Getting Started
  • IT-OT convergence
  • operational technology security
  • industrial cybersecurity
  • cross-functional collaboration
  • change management
  • security program implementation
  • OT asset management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Building Effective IT-OT Security Partnerships

              Upcoming Webinar Calendar

              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: What to Do Now That You Still Have Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-what-to-do-now-that-you-still-have-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Existing Passwords.
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing AI Governance Foundations for GenAI at Every Deployment Stage
                https://www.truthinit.com/index.php/channel/1936/establishing-ai-governance-foundations-for-genai-at-every-deployment-stage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Insights into Our New Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-insights-into-our-new-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/

              Upcoming Events

              • May
                06

                World Password Day: What to Do Now That You Still Have Passwords

                05/06/202610:00 PM ET
                • May
                  07

                  World Password Day: Strategies for Managing Your Passwords Effectively.

                  05/07/202605:00 AM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Existing Passwords.

                    05/07/202601:00 PM ET
                    • May
                      12

                      Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                      05/12/202601:00 PM ET
                      • May
                        12

                        Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks

                        05/12/202611:30 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version