CISO • OT PRIORITIES

    Critical OT Assets

    A prioritized list of OT assets (PLC, HMI, RTU, controllers) with risk score, last enforcement action, and protection status.

    What it shows

    This table is your “crown jewels” queue. It bridges OT realities (maintenance windows, safety) with security actions (quarantine, traffic filtering, access deny).

    How it’s calculated

    • Risk score per asset based on vulnerability + behavior anomalies + zone criticality.
    • Last enforcement action logs what control was applied (policy enforced, quarantined, session terminated).
    • Status indicates current protection state and required attention.

    What to do next

    1. 1
      Review top 10 assets weekly
      with OT leadership and schedule safe remediation.
    2. 2
      Confirm enforcement is safe
      : prefer traffic filtering and session restrictions before hard blocks.
    3. 3
      Investigate “At Risk”
      assets immediately and verify physical/process safety impacts.
    4. 4
      Export the list
      for plant managers and auditors as proof of active risk management.

    KPIs to watch

    At-risk assets
    count
    Avg risk score
    value
    Time since last scan
    minutes

    Why this matters to a CISO

    AI only works if it’s trustworthy
    If models drift or confidence drops, you’re flying blind. This keeps the AI layer honest.
    Drift is normal in OT
    New firmware, new shifts, new processes—all cause drift. You need to detect it early before it erodes detection quality.
    Confidence drives automation
    You can’t let AI auto-contain based on shaky confidence. This metric ensures automation stays aligned with risk appetite.
    Feedback loops improve accuracy
    Every analyst decision sharpens the models. This closes the loop between human intelligence and machine learning.
    Reference UI Screenshot
    Critical OT Assets screenshot