Follow Me on
Thomas Jackson - CISSP, OT / ICS / IoT / IoMT / IT Cybersecurity
  • Home
  • Portfolio
    • OT Cyber Security White Papers
    • Data Comm White Papers
    • Publications in Circulation
    • Semiconductor Application Notes
    • Product Portfolios
    • Press Releases
  • Resume
    • Awards
    • Technology Summary
    • Training & Certifications
  • Sale Fish Marketing
    • Tom's Tips: Lessons of a Job Seeker
    • DFW Company Database
    • Additional DFW/Texas Resources
    • Adding Hyperlinks to Email
    • Getting Security Clearance
    • Overcoming Call Reluctance
    • Using LinkedIn & Social Media
  • Volunteer Work
  • Contact

​OT Cyber Security Thought Leadership / White Papers

Picture
 These articles draw on more than 20 years of OT cybersecurity consulting experience and close collaboration with clients across critical infrastructure and industrial sectors. They reflect my strategic perspective on translating complex cyber risk into business decisions that strengthen operational resilience and enterprise performance. The insights focus on turning emerging risk into actionable investment priorities and measurable organizational outcomes.

OT/ICS White Papers / Articles
Tom's 2026 OT Cybersecurity Predictions : This paper distills emerging cyber-physical risks into clear business implications for critical infrastructure leaders. The paper connects threat trends across AI, IoMT, and industrial environments to investment priorities, operating models, and resilience metrics demonstrating a strategic approach to aligning cybersecurity with enterprise risk and operational performance.

OT Tool Vendor Acquisitions :This article examines over a decade of OT cybersecurity acquisitions to reveal how the market is shifting from point solutions to integrated platforms aligned with safety, uptime, and enterprise risk. It reflects Tom’s ability to interpret industry signals, anticipate strategic direction, and advise leaders on technology investment decisions that support long-term operational resilience. 

OT Cybersecurity 2.0 :This paper introduces the concept of OT Cybersecurity 2.0, outlining the strategic shift from compliance-driven programs to operational resilience. It demonstrates Tom’s ability to guide organizations toward data-driven risk decisions, align cybersecurity with uptime and safety, and position cyber investment as a driver of business continuity and enterprise value.

​Why OT Cyber Risk Still Struggle to get funded :This paper explores why OT cyber initiatives often struggle to secure funding and outlines a leadership approach that translates technical risk into operational and financial impact. It highlights Tom’s ability to bridge engineering, cybersecurity, and executive priorities while guiding investment decisions that strengthen resilience and protect business performance.

What I Wished They Told Me When I Started in OT Cybersecurity : This paper takes a candid look at the realities of OT cybersecurity that never appear in frameworks or training—drawn from years of hands-on experience across plants, refineries, utilities, and critical infrastructure environments.

IoMT is OT Cybers Fastest Growing Blind Spot :This paper examines why the rapid growth of connected medical devices has created one of healthcare’s most significant and often overlooked cyber-physical risks, operating at the intersection of IT, OT, and clinical engineering where governance gaps can directly impact patient safety. It outlines a practical leadership framework for integrating IoMT into OT cybersecurity strategies to improve visibility, strengthen resilience, and align cyber risk with clinical and operational outcomes.
​
​
​

OT/ICS Podcast
Ironscales "Cyber Security Heroes" Podcast episode 8  "Safeguard Operational Technology and Protect your Kingdom"
​

​









​
Click here to listen to Episode 8


Technical OT/ICS Reference documentation
A key challenge when addressing OT/ICS Assessments is cross referencing the NIST 800-82 OT standard to the more widely used NIST 800-53 IT standard. I created the attached spreadsheet to include;  a NIST 800-82 v NIST 800-53 cross reference, NIST 800-82 to NIST Cyber Security Framework (CSF) mapping as well as a NIST 800-82 based assessment questionnaire form for use in the field with clients.

  • NIST 800-82 OT Standard Cross reference (.xls)

​
​OT/ICS Cyber security publications done at Schneider Electric

Excerpt from a video marketing campaign focused on OT Cyber Security and the OT team.
  • Tom Jackson video - OT Cyber Security Life-cycle Methodology


OT/ICS Cyber security sales training materials. Focused on OT basics and OT/ICS cyber solutions for a global sales force
  • OT Cyber Security for Dummies
  • OT Cyber Security Sales Reference
  • OT Cyber Security Best Practices (operational sales approach)

Technical Sales Briefs on key OT cyber security market sectors
  • Water-Waste Water
  • Smart Grid
  • Smart Cities
  • Power
  • Power NERC-CIP
  • Oil&Gas
  • Oil&Gas Success
  • Mining​

OT/ICS Cyber Security Solution guides. Technical overviews of specific cyber solutions along with their application, market segment, and value.
  • OT Cyber Security Life Cycle Methodology
  • 7-Cornerstone Solutions for OT Cyber
  • Global OT cyber security compliance platform
  • OT Managed Services
  • OT/ICS Best Practices Guide and solutions
  • OT Best Practices summary​

Monthly OT cyber security newsletter distributed to sales team and key accounts. Focusing on key OT topical issue for that month. I published this series during my tenure at Schneider 2011-2015 - over 50 volumes.
​ 
Sample of a 4-part newsletter series on the OT Cyber Life-cycle Methodology Feb-May 2015
  • Vol 41 Feb 2015 part 1
  • Vol 42 Mar 2015 part 2
  • Vol 43 Apr 2015 part 3
  • Vol 44 May 2015 part 4

All monthly newsletter by years
  • 2011 Newsletters (.zip)
  • 2012 Newsletters (.zip)
  • 2013 Newsletters (.zip)
  • 2014 Newsletters (.zip)
  • 2015 Newsletters (.zip)



Proudly powered by Weebly