Back to Resources
Field Note May 2025 7 min read

Building an OT Cybersecurity Program From Zero

Starting a cybersecurity program where none existed is daunting. We provide a phased approach that builds capability without overwhelming your team.

C

Cascadia OT Security

Founder · Managing Principal · CISSP · GICSP

T+0Initial AccessT+12hDiscoveryT+3dLateral MoveT+14dOT PivotT+84dDetonationDWELL TIME · 84 DAYSATTACK TIMELINET+84d DETONATE

Many industrial organizations operate without a dedicated cybersecurity program. Security is an afterthought, handled by IT generalists or external consultants on an ad-hoc basis. If you're in this position, starting a program is intimidating. You don't know where to begin, what investments are essential versus nice-to-have, or how to staff for it. You may not even have budget approval yet. Starting from zero requires a realistic, phased approach that builds competency over time and demonstrates value early.

We've guided dozens of organizations through this journey. The successful ones follow a predictable path: establish governance and risk framework, gain visibility into their assets, identify and remediate critical vulnerabilities, build incident response capability, and gradually mature their program over 18–24 months. This isn't quick, but it's achievable without heroic effort or massive budget.

Phase 1: Foundation (Months 1–3)

Your first priority is governance and leadership support. Establish a cybersecurity steering committee with representatives from operations, IT, engineering, and management. Clarify roles: who's accountable for cybersecurity decisions, incident response, and policy enforcement. Establish a cybersecurity policy that covers asset management, access control, change management, and incident response. Get board or executive leadership sign-off on the policy and the program. This governance work is not glamorous, but it's essential. You cannot build security without leadership alignment and clear accountability.

In parallel, conduct an asset inventory. Document every control system, every historian, every engineering workstation. Document network architecture. Document remote access points. This sounds tedious, but accurate inventory is foundation for everything that follows. You cannot manage risk if you don't know what you're protecting.

Phase 2: Visibility and Assessment (Months 3–9)

Phase 3: Maturity and Ongoing Management (Months 9–24)

By month 9, you should have basic controls in place, some visibility into your environment, and an incident response capability. In Phase 3, you deepen and mature each of these. Implement more sophisticated monitoring. Expand network segmentation. Conduct security training. Build a vulnerability management process. Establish a supply chain security program. Update and test your incident response plan regularly. By month 24, you should have a functioning program that aligns with industry frameworks like NIST or 62443.

Staffing and Budget

You don't need a large team to start. Assign 0.5–1.0 FTE to own the program: someone who understands your systems, can coordinate across departments, and can drive execution. Allocate budget for assessments, tools, and training. Most organizations spend $50K–$200K in their first year on assessments, basic tools, and consulting support. This is a good investment and should be easy to justify to leadership.

Building a cybersecurity program from zero is achievable. We help organizations establish governance, conduct assessments, build visibility, and mature their programs over time. Let's talk about starting your OT security program.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call