link rel="stylesheet" href="https://unpkg.com/@phosphor-icons/web@2.1.1/src/regular/style.css"

The 4 Reasons Cyber and Safety Collide in OT

Anthony Mondelli
Alaska OT/ICS Cybersecurity Lead
min. read
April 7, 2026
View on Original Source
min. read

In the world of Operational Technology (OT), cybersecurity is not just about protecting data. It is intrinsically linked to safety. But here’s the catch: In OT, cybersecurity is part of safety, but it cannot act like it. Cyber decisions, if mishandled, can inadvertently trigger safety events. A routine patch can turn into a production halt or worse. Alignment between these two domains is not a buzzword or a one-off workshop. It is an essential operating model that ensures safe, reliable operations. Without it, organizations risk chaos where preventive measures in one area exacerbate risks in the other.

When Cyber and Safety Collide: 4 Root Causes

Understanding why safety and cyber often collide starts with their root causes. First, they have different priorities. Safety focuses on hazard prevention, like avoiding equipment failures that could harm people or the environment, while cyber emphasizes threat prevention against hackers and malware. These are not always in sync. A cyber team might prioritize blocking a vulnerability, unaware it disrupts a critical safety interlock. 

Second, their time horizons differ dramatically. Safety deals with immediate, predictable risks, such as a valve malfunction, whereas cyber contends with evolving adversaries who adapt over weeks or months. This mismatch can lead to rushed cyber actions that overlook real-time operational needs.

Third, change tolerance varies wildly. Safety thrives on stability. Processes are designed to be consistent and reliable, with changes vetted meticulously to avoid disruptions. Cyber, however, pushes for frequent updates such as patching software and upgrading firewalls to stay ahead of threats. This constant flux can unsettle safety systems that rely on proven, unchanging configurations. 

Finally, communication gaps widen the divide. Safety professionals speak in terms of hazards, consequences, and failure modes, while cyber experts use metrics like vulnerability scores and threat vectors. Without a common language, misunderstandings proliferate and lead to siloed decisions.

Cyber and Safety in Harmony: Building Better Bridges and Shared Outcomes

To bridge this, teams must define shared goals that form common ground. At the core are safe operations, reliable uptime, controlled change, and recoverability. Both sides can agree on what "unacceptable outcomes" look like, such as a cyber breach causing a chemical spill or a safety shutdown from a false-positive alert. By framing discussions around these, alignment shifts from adversarial to collaborative. It focuses on mutual protection rather than territorial defense.

This allows teams to focus on what matters: safe continuity rather than unattainable perfect security. 

Yet, even with good intentions, cyber efforts can accidentally heighten safety risks. Watch-outs include blocking network paths without grasping process dependencies. For instance, isolating a segment might cut off a safety-critical sensor. Aggressive scanning or tooling can overwhelm fragile legacy devices and cause them to crash during peak operations. "Pull the plug" responses, such as shutting down systems to contain a threat, might trigger fail-safes that lead to uncontrolled shutdowns like emergency venting in a plant. Poorly planned patching during critical windows exacerbates this. It can potentially introduce bugs when stability is paramount.

A practical alignment model offers a way forward. Begin with joint risk framing. Map cyber scenarios, like a ransomware attack, to process hazards and their consequences, such as loss of control over a reactor. This creates a shared risk register. Next, establish joint governance. Define who approves what and ensure safety teams sign off on controls that could impact operations. Joint design follows. Segmentation, remote access, and monitoring are co-created with operators to balance security and usability. Finally, develop joint response strategies. OT-safe incident response playbooks outline decision authority and prioritize actions that minimize downtime.

Running an OT-safe incident response plan requires nuance. Start by ranking containment options by safety impact. Favor isolating infected devices without halting the entire line. Incorporate manual operations and fallback procedures, like switching to analog controls during a digital outage.

A robust communication plan is key. Specify who notifies operations leadership and when. This ensures escalations happen swiftly but calmly to avoid panic-driven errors.

Metrics both sides respect can end vain arguments over irrelevant data. Focus on time to detect and contain incidents with minimal operational impact. This measures efficiency without sacrifice. Track restore capability and time to recover critical functions. This emphasizes resilience. Monitor reduction in uncontrolled access paths and unreviewed exceptions to quantify progress. Lastly, evaluate change success rates and reductions in emergency changes. This proves that alignment leads to smoother operations.

The big takeaway: Treat alignment between safety and cyber as a capability, not a compliance meeting you must attend. This is nuanced and exactly what works best for you and your organization will vary from someone else’s environment. However, it’s been my universal experience that teams that co-create shared rules, review and simulate experiences, and remove as much subjectivity from decision making as possible, more successfully bridge this gap between cyber and safety. This allows teams to focus on what matters: safe continuity rather than unattainable perfect security. 

About the resource
What you'll learn
Who is this resource for?
Download The 4 Reasons Cyber and Safety Collide in OT
Download Resource
Thank you and enjoy the resource
View Resource
Oops! Something went wrong while submitting the form.