
23 April 2024
Today, we have the pleasure of interviewing Alexandre Ayoubi, the Global Product Manager for the Industrial security product line, about the top challenges OT leaders face in achieving NIS2 compliance.
A.A.: The biggest challenge OT leaders face with NIS2 compliance is securing legacy OT environments without disrupting operations. Unlike IT systems, many OT infrastructures were never designed with cybersecurity in mind. They’re often running on outdated technology with little visibility, making it incredibly difficult to identify vulnerabilities or detect intrusions.
On top of that, the growing convergence of IT and OT networks is expanding the attack surface. The more these systems are connected to cloud and enterprise networks, the more exposed they become. But here’s the tricky part—traditional IT security approaches don’t always work for OT. You can’t just deploy a patch or run a security update whenever you want, because any downtime can mean production delays, supply chain disruptions, or even safety risks.
And then there’s the regulatory aspect. NIS2 brings stricter requirements around risk management, reporting, and governance, and many OT teams don’t have the cybersecurity expertise to navigate these complexities easily. So, the real challenge is finding a way to implement strong security measures while ensuring business continuity. It’s about striking that perfect balance between compliance, operational resilience, and security—without bringing everything to a grinding halt.
A.A.: Integration is a significant challenge. Many OT systems were not designed with cybersecurity in mind, so retrofitting them to meet NIS2 requirements can be complex and costly. It often requires a thorough assessment of current systems and a strategic plan to address vulnerabilities without disrupting operations.
OT environments are highly specialized and interconnected, making it difficult to implement security measures without causing unintended consequences. Applying a security patch or updating software can lead to system downtime, which can disrupt production processes and cause financial losses.
Additionally, OT systems typically have a long lifecycle and often run on outdated technology that lacks modern security features. This makes integrating new security measures challenging without a complete infrastructure overhaul. Continuous monitoring and threat detection require advanced tools and robust incident response plans.
Finally, close collaboration between IT and OT teams is crucial. These teams often have different priorities and expertise, leading to communication gaps. OT leaders must foster a culture of collaboration and ensure both teams are aligned on cybersecurity importance and steps needed for NIS2 compliance.
In summary, integrating security measures into existing OT systems requires careful planning, investment in new technologies, continuous monitoring, and close collaboration between IT and OT teams. By addressing these challenges, OT leaders can enhance system security and achieve NIS2 compliance without compromising operational efficiency.
A.A.: OT leaders manage the balance between operational efficiency and compliance by taking a risk-based approach to security, prioritizing resilience over rigid controls, and adopting tailored cybersecurity measures that align with industrial processes.
Since OT environments are sensitive to downtime, leaders focus on segmentation—isolating IT and OT networks to limit exposure without disrupting operations. They implement continuous monitoring and threat detection tools that provide real-time visibility, allowing them to address risks proactively without shutting down critical systems.
Another key strategy is progressive security implementation - instead of deploying sweeping changes that could interfere with production, they phase in security controls gradually. This means introducing multi-layered defense mechanisms, such as Zero Trust principles and network access controls, so as to minimize impact on day-to-day operations.
Compliance with NIS2 also requires a strong governance framework. OT leaders work closely with regulatory and security teams to ensure that cybersecurity policies align with both industry standards and operational realities. They invest in training programs to upskill personnel, ensuring that teams can recognize threats and respond effectively without relying solely on external expertise.
Ultimately, the key is to embed security into operational processes, rather than treating it as a separate, compliance-driven burden. By making cybersecurity a core part of industrial resilience, OT leaders can protect their infrastructure while maintaining its efficiency and reliability.
A.A.: Employee training is crucial. OT leaders must ensure that all staff are aware of the security protocols and understand their role in maintaining compliance according to a playbook or a pre-established governance. This includes regular training sessions and updates on the latest threats and best practices. A well-informed team is essential for effective cybersecurity.
A.A.: The key is to approach NIS2 compliance strategically rather than reactively. Instead of scrambling to meet regulatory deadlines, use this as an opportunity to build a more resilient and secure OT environment.
First, my advice would be to start with a comprehensive risk assessment. You need full visibility into your OT infrastructure—know what assets you have, where your vulnerabilities lie, and how your systems connect to IT and cloud environments. This baseline understanding will guide your compliance roadmap and help address the most critical security gaps.
Second, embrace segmentation and monitoring. One of the biggest risks in OT security is unrestricted connectivity. A strong network segmentation and real-time monitoring will help reduce exposure and detect threats early without disrupting operations.
Third, collaborate across teams. Compliance isn’t just an OT issue—it involves IT, security, risk management, and executive leadership. Build cross-functional teams to ensure security measures align with operational needs and business goals.
Fourth, adopt a phased approach. You don’t need to overhaul your entire infrastructure overnight. Focus on quick wins, such as strengthening access controls, improving incident response capabilities, and ensuring secure remote access. Then, gradually implement more advanced security measures as you mature.
Finally, treat compliance as an enabler, not a checkbox. NIS2 isn’t just about avoiding fines—it’s about enhancing resilience against cyber threats. Use this as an opportunity to modernize security practices and embed cybersecurity into your organization’s culture. The more proactive you are, the less disruptive compliance will be in the long run.
To learn more securing your OT environments for NIS2, download our brochure.
Author: Alexandre Ayoubi
Global Product Manager at Orange Cyberdefense