Why I'm Specialising in OT/ICS Cybersecurity
The Intersection of Digital and Physical
Most cybersecurity threats live in the digital world — stolen data, compromised accounts, ransomware encrypting files. OT/ICS security is different. When an attacker compromises an industrial control system, the consequences cross the boundary from digital to physical: chemical plants can release toxic materials, power grids can black out entire regions, and water treatment systems can be manipulated to endanger public health.
That’s what drew me to this field. The stakes are tangible, and the work matters in a very direct way.
A Critical Shortage
The cybersecurity industry broadly faces a talent shortage, but in OT/ICS security the gap is especially stark. Defending industrial systems requires a rare combination of IT security knowledge, understanding of operational technology, and awareness of industrial processes and safety systems. Most IT security professionals don’t understand PLCs and SCADA protocols. Most control engineers don’t think about cyber threats. The professionals who can bridge that gap are in enormous demand.
What I’m Studying
My self-directed learning path is focused on building competence across both IT security and OT engineering:
OT/ICS Fundamentals — understanding how PLCs, RTUs, HMIs, and SCADA systems work; learning industrial protocols (Modbus, DNP3, OPC UA, EtherNet/IP); studying the Purdue Model and ICS network architectures.
Security Frameworks — IEC 62443 (the primary standard for ICS security), NIST SP 800-82, NERC CIP for the energy sector, and MITRE ATT&CK for ICS for threat intelligence.
Hands-On Labs — building virtualized ICS environments with GRFICSv2, OpenPLC, and ScadaBR to practice both attacking and defending industrial systems in a safe setting.
Real-World Context — studying past incidents like Stuxnet, the Ukraine power grid attacks (2015 and 2016), TRITON/TRISIS, the Oldsmar water treatment incident, and the Colonial Pipeline ransomware attack to understand how real adversaries target critical infrastructure.
The Path Ahead
I’m preparing to pursue an MSc with a focus on cybersecurity, where I plan to concentrate my research on OT/ICS security challenges — particularly around securing legacy industrial protocols and developing better intrusion detection approaches for industrial networks. This portfolio documents my journey and demonstrates my commitment to this specialisation.
If you’re working in OT/ICS security and have advice for someone building toward this career, I’d genuinely love to hear from you.
Replace this with your personal story, motivations, and specific experiences that led you to OT/ICS security.