OT Cyber Security Thought Leadership / White Papers
These articles draw on more than 20 years of OT cybersecurity consulting experience and close collaboration with clients across critical infrastructure and industrial sectors. They reflect my strategic perspective on translating complex cyber risk into business decisions that strengthen operational resilience and enterprise performance. The insights focus on turning emerging risk into actionable investment priorities and measurable organizational outcomes.
OT/ICS White Papers / Articles
Tom's 2026 OT Cybersecurity Predictions : This paper distills emerging cyber-physical risks into clear business implications for critical infrastructure leaders. The paper connects threat trends across AI, IoMT, and industrial environments to investment priorities, operating models, and resilience metrics demonstrating a strategic approach to aligning cybersecurity with enterprise risk and operational performance.
OT Tool Vendor Acquisitions :This article examines over a decade of OT cybersecurity acquisitions to reveal how the market is shifting from point solutions to integrated platforms aligned with safety, uptime, and enterprise risk. It reflects Tom’s ability to interpret industry signals, anticipate strategic direction, and advise leaders on technology investment decisions that support long-term operational resilience.
OT Cybersecurity 2.0 :This paper introduces the concept of OT Cybersecurity 2.0, outlining the strategic shift from compliance-driven programs to operational resilience. It demonstrates Tom’s ability to guide organizations toward data-driven risk decisions, align cybersecurity with uptime and safety, and position cyber investment as a driver of business continuity and enterprise value.
Why OT Cyber Risk Still Struggle to get funded :This paper explores why OT cyber initiatives often struggle to secure funding and outlines a leadership approach that translates technical risk into operational and financial impact. It highlights Tom’s ability to bridge engineering, cybersecurity, and executive priorities while guiding investment decisions that strengthen resilience and protect business performance.
What I Wished They Told Me When I Started in OT Cybersecurity : This paper takes a candid look at the realities of OT cybersecurity that never appear in frameworks or training—drawn from years of hands-on experience across plants, refineries, utilities, and critical infrastructure environments.
IoMT is OT Cybers Fastest Growing Blind Spot :This paper examines why the rapid growth of connected medical devices has created one of healthcare’s most significant and often overlooked cyber-physical risks, operating at the intersection of IT, OT, and clinical engineering where governance gaps can directly impact patient safety. It outlines a practical leadership framework for integrating IoMT into OT cybersecurity strategies to improve visibility, strengthen resilience, and align cyber risk with clinical and operational outcomes.
OT/ICS Podcast
Ironscales "Cyber Security Heroes" Podcast episode 8 "Safeguard Operational Technology and Protect your Kingdom"
Click here to listen to Episode 8
Technical OT/ICS Reference documentation
A key challenge when addressing OT/ICS Assessments is cross referencing the NIST 800-82 OT standard to the more widely used NIST 800-53 IT standard. I created the attached spreadsheet to include; a NIST 800-82 v NIST 800-53 cross reference, NIST 800-82 to NIST Cyber Security Framework (CSF) mapping as well as a NIST 800-82 based assessment questionnaire form for use in the field with clients.
OT/ICS Cyber security publications done at Schneider Electric
Excerpt from a video marketing campaign focused on OT Cyber Security and the OT team.
OT/ICS Cyber security sales training materials. Focused on OT basics and OT/ICS cyber solutions for a global sales force
Technical Sales Briefs on key OT cyber security market sectors
OT/ICS Cyber Security Solution guides. Technical overviews of specific cyber solutions along with their application, market segment, and value.
Monthly OT cyber security newsletter distributed to sales team and key accounts. Focusing on key OT topical issue for that month. I published this series during my tenure at Schneider 2011-2015 - over 50 volumes.
Sample of a 4-part newsletter series on the OT Cyber Life-cycle Methodology Feb-May 2015
All monthly newsletter by years
OT/ICS White Papers / Articles
Tom's 2026 OT Cybersecurity Predictions : This paper distills emerging cyber-physical risks into clear business implications for critical infrastructure leaders. The paper connects threat trends across AI, IoMT, and industrial environments to investment priorities, operating models, and resilience metrics demonstrating a strategic approach to aligning cybersecurity with enterprise risk and operational performance.
OT Tool Vendor Acquisitions :This article examines over a decade of OT cybersecurity acquisitions to reveal how the market is shifting from point solutions to integrated platforms aligned with safety, uptime, and enterprise risk. It reflects Tom’s ability to interpret industry signals, anticipate strategic direction, and advise leaders on technology investment decisions that support long-term operational resilience.
OT Cybersecurity 2.0 :This paper introduces the concept of OT Cybersecurity 2.0, outlining the strategic shift from compliance-driven programs to operational resilience. It demonstrates Tom’s ability to guide organizations toward data-driven risk decisions, align cybersecurity with uptime and safety, and position cyber investment as a driver of business continuity and enterprise value.
Why OT Cyber Risk Still Struggle to get funded :This paper explores why OT cyber initiatives often struggle to secure funding and outlines a leadership approach that translates technical risk into operational and financial impact. It highlights Tom’s ability to bridge engineering, cybersecurity, and executive priorities while guiding investment decisions that strengthen resilience and protect business performance.
What I Wished They Told Me When I Started in OT Cybersecurity : This paper takes a candid look at the realities of OT cybersecurity that never appear in frameworks or training—drawn from years of hands-on experience across plants, refineries, utilities, and critical infrastructure environments.
IoMT is OT Cybers Fastest Growing Blind Spot :This paper examines why the rapid growth of connected medical devices has created one of healthcare’s most significant and often overlooked cyber-physical risks, operating at the intersection of IT, OT, and clinical engineering where governance gaps can directly impact patient safety. It outlines a practical leadership framework for integrating IoMT into OT cybersecurity strategies to improve visibility, strengthen resilience, and align cyber risk with clinical and operational outcomes.
OT/ICS Podcast
Ironscales "Cyber Security Heroes" Podcast episode 8 "Safeguard Operational Technology and Protect your Kingdom"
Click here to listen to Episode 8
Technical OT/ICS Reference documentation
A key challenge when addressing OT/ICS Assessments is cross referencing the NIST 800-82 OT standard to the more widely used NIST 800-53 IT standard. I created the attached spreadsheet to include; a NIST 800-82 v NIST 800-53 cross reference, NIST 800-82 to NIST Cyber Security Framework (CSF) mapping as well as a NIST 800-82 based assessment questionnaire form for use in the field with clients.
OT/ICS Cyber security publications done at Schneider Electric
Excerpt from a video marketing campaign focused on OT Cyber Security and the OT team.
- Tom Jackson video - OT Cyber Security Life-cycle Methodology
OT/ICS Cyber security sales training materials. Focused on OT basics and OT/ICS cyber solutions for a global sales force
- OT Cyber Security for Dummies
- OT Cyber Security Sales Reference
- OT Cyber Security Best Practices (operational sales approach)
Technical Sales Briefs on key OT cyber security market sectors
OT/ICS Cyber Security Solution guides. Technical overviews of specific cyber solutions along with their application, market segment, and value.
- OT Cyber Security Life Cycle Methodology
- 7-Cornerstone Solutions for OT Cyber
- Global OT cyber security compliance platform
- OT Managed Services
- OT/ICS Best Practices Guide and solutions
- OT Best Practices summary
Monthly OT cyber security newsletter distributed to sales team and key accounts. Focusing on key OT topical issue for that month. I published this series during my tenure at Schneider 2011-2015 - over 50 volumes.
Sample of a 4-part newsletter series on the OT Cyber Life-cycle Methodology Feb-May 2015
All monthly newsletter by years
- 2011 Newsletters (.zip)
- 2012 Newsletters (.zip)
- 2013 Newsletters (.zip)
- 2014 Newsletters (.zip)
- 2015 Newsletters (.zip)