Security for operational technology (OT) is steadily gaining attention. Most chief information officers (CIOs) / chief information security officers (CISOs) have recognized by now that simply duplicating security measures from information technology (IT) to OT is not achievable given the limitations and different environments. As hackers go beyond the common attack approaches found in the IT world, the targeted attack in OT becomes tougher to maintain.