Who is Responsible for Security When IT and OT Overlap in Food & Beverage Manufacturing
In today’s modern food processing facilities, IT systems and operational technology (OT) are more connected than ever. From SCADA systems controlling production lines to HMIs monitoring critical processes, these systems are essential for plant operations. But when IT and OT responsibilities overlap, the question arises: who is responsible for security
Answering this question is not just an academic exercise. Misaligned responsibilities can lead to production downtime, food spoilage, safety hazards, and hundreds of thousands of dollars in losses per hour. This guide breaks down the problem, identifies key risks, and provides actionable steps for food manufacturers to secure both IT and OT systems effectively.
1. Understand the Difference Between IT and OT Security
Food manufacturers often struggle because IT and OT have different priorities and perspectives
IT Security Focus:
- Protects data including intellectual property, financials, employee and customer information
- Security measures include segmentation, access controls, strong password policies, frequent patching, and standardized procedures
OT Security Focus:
- Protects physical processes including PLCs, HMIs, SCADA, and other critical automation equipment
- Security measures prioritize availability and safety over confidentiality
- Constraints include flat networks, fragile PLCs, shared credentials, and limited memory, which can make traditional IT security measures risky for OT systems
Why This Matters: In food processing, IT may focus on cybersecurity compliance and data integrity while OT must ensure production continues safely. Misalignment can create gaps that jeopardize both production and safety
2. Identify the Risks of IT/OT Misalignment
When responsibilities are not clear, food plants face serious consequences:
- Downtime and lost revenue: A halted production line can cost hundreds of thousands per hour
- Spoiled inventory: Temperature-sensitive products like dairy or frozen foods are at immediate risk
- Safety hazards: Misconfigured systems or failed safety interlocks can put employees and equipment in danger
- Regulatory penalties: Improper handling during a system outage may violate FDA or HACCP standards
Understanding these stakes highlights why assigning clear responsibility is critical
3. Assign Responsibility Through Strategic Alignment
The first step is executive-level alignment
- Have CIO/CISO and COO share overlapping goals and accountability
- Make clear who is ultimately responsible for cybersecurity incidents and safety risks
- Establish shared objectives including uptime, product safety, regulatory compliance, and data integrity
This ensures IT and OT work together rather than in silos
4. Create a Joint IT/OT Security Task Force
A cross-functional task force bridges knowledge gaps and provides operational oversight
Include:
- IT staff with network and cybersecurity expertise
- Control engineers and system operators
- Management representation
- Physical security personnel
- Vendor or integrator consultants
Responsibilities:
- Identify the most critical ICS assets
- Assess risk and prioritize protections
- Develop cross-functional security policies and procedures
- Facilitate communication between IT and OT teams
Pilot projects can be a safe starting point, allowing the team to work together on smaller initiatives before scaling
5. Implement Practical Security Measures
Food manufacturers must balance security with production continuity
- Redundant and backed-up critical systems to prevent downtime
- On-site spare parts and firmware tracking for fast restoration of PLCs, sensors, and HMIs
- Controlled patching and updates: Test patches on isolated systems before deploying to production
- Network segmentation and secure zones to isolate critical OT assets without introducing latency
Training is equally important. Operators and IT staff need awareness of each other’s priorities and constraints
6. Coordinate During an Incident
When a security or system incident occurs:
- Assign clear roles for technical restoration, product safety, and compliance documentation
- Communicate effectively across IT and OT teams
- Document all actions for regulatory compliance
- Leverage remote monitoring tools and guide on-site staff for troubleshooting
Following these steps reduces downtime, protects food safety, and ensures the plant continues running smoothly
7. Prevent Future Conflicts
Long-term prevention requires:
- Regular alignment meetings between IT and OT leadership
- Ongoing training to develop interdisciplinary skills
- Lifecycle perspective: Consider ICS security as a continuous journey, not a one-time project
- Documentation and labeling of all devices, firmware, and network paths to simplify troubleshooting and risk assessment
By planning for convergence and establishing shared governance, manufacturers can reduce IT/OT conflict and strengthen plant resilience
8. Understand the Operational Impacts
Proper IT/OT collaboration is not just a technical necessity but an operational imperative
- Reduces the risk of production downtime and associated revenue loss
- Protects product quality and consumer safety
- Minimizes regulatory violations and potential fines
- Ensures that every employee knows their role during incidents, improving response time
Securing Food Manufacturing: Shared Responsibility for IT and OT
IT and OT overlap is unavoidable in modern food manufacturing. Responsibility for security should not be debated. It must be clearly assigned, jointly managed, and continuously reviewed. By establishing executive alignment, creating a joint task force, and implementing practical measures that respect both IT and OT priorities, food manufacturers can protect operations, safeguard products, and prevent costly downtime. Security in food plants is a shared journey. The sooner it begins, the safer and more efficient production will be.