Monday, March 2, 2026

Every year, discussions on IT/OT convergence emerge like it's a new idea, even though it's not. And the companies that keep treating it that way end up making the same expensive mistakes again and again.
We've been in this space for over 15 years. We've seen it all. The hype cycles, failed integration attempts, org charts planned for execution just for the sake of it. We've also seen convergence done right. Yet even after all this time, nobody actually talks about the hardest part of the process. So let's talk about it.
The Part Everyone Skips
Ask anyone who's been through an IT/OT convergence initiative what the hardest part was, and very few will say "the architecture." Most will describe some version of the same story: two teams with fundamentally different priorities, different definitions of risk, and different relationships with downtime, suddenly expected to operate as one.
IT and OT aren't just different technology stacks. They are different professional cultures built on different operational realities. An IT team's tolerance for a system restart is not the same as an OT team's. A patch cycle that's routine in a data center can be a serious conversation on a production floor. A security update that feels standard in a hospital's administrative system requires a completely different calculus when it's closer to clinical operations. None of that gets resolved by better middleware.
"Convergence" Might Be The Wrong Word Entirely
There's something worth examining in the language itself. "Convergence" implies that IT and OT are moving toward becoming one thing. In practice, that framing causes real damage because it turns every decision into a question of which side wins.
What actually works looks less like convergence and more like a structured partnership. Two teams with clearly defined ownership, explicit handoff points, and a genuine understanding of each other's constraints. Not a merger, but a defined interface held together by someone whose actual job is to sit at that seam with real authority to make calls when priorities conflict.
The Technical Reality Underneath
Framing it as purely a “people problem,” however, would be its own kind of oversimplification. The technical challenges are real.
OT environments were built for longevity and reliability, often running PLCs, SCADA infrastructure, and industrial protocols like Modbus and OPC-UA that were never designed to interact with modern IT infrastructure. Bridging that gap requires protocol translation, network segmentation, and a security architecture that accounts for environments where you simply cannot patch or restart a system on demand.
The Purdue Model, long the standard for structuring industrial network layers, is increasingly being challenged as organizations push for more real-time data access from the floor. Edge computing has changed what's possible. Companies can now process and act on operational data closer to the source without routing everything through a central system. Cloud-connected operational environments are no longer theoretical. But each of these advances also expands the attack surface in an environment that was historically protected by isolation.
This is where the people problem and the technology problem meet, and where many initiatives get it wrong. Security decisions in OT environments require input from people who understandboth the IT threat landscape and the operational reality they're protecting. An IT security team that doesn't understand why a particular SCADA system can't be patched on a standard cycle will likely make the wrong call. An OT team that doesn't understand network exposure will resist the right one. The architecture has to be designed around that reality, not despite it.
What The Solution Actually Looks Like
After fifteen years in this space, we’ve seen one pattern that is consistent enough to be instructive – and it always starts before technology. Before a single network diagram is drawn, IT and OT need to be in the same room answering the same questions: what are we solving, who owns what, and what does failure look like for each side. From there, the goal isn't to merge the two teams but to define the interface between them precisely, with someone sitting at that intersection who has real authority when priorities conflict.
Security has to be integrated into the design from day one. Segmentation, access controls, monitoring. The Colonial Pipeline and Norsk Hydro breaches are both stories about what happens when security becomes a checklist in environments where the stakes are operational continuity.
On the technology side, the right choices are the ones that respect OT constraints rather than work around them. Edge architectures that allow local processing without full cloud dependency. Unidirectional gateways that let data flow from OT to IT without creating a reverse attack path. Protocol translation layers that bridge legacy systems without requiring wholesale replacement of equipment that still has years of operational life left. The technology to do all of this exists. The question is always whether it's being selected and implemented by people who genuinely understand the environment it's going into.
Finding Common Ground
Convergence is genuinely hard. Anyone telling you otherwise is either oversimplifying or selling something.
The companies that get this right are the ones that never treated it as two separate problems to begin with. They didn't have an IT track and an OT track running in parallel, occasionally syncing up in a steering committee. They had one problem, one shared definition of success, and one integrated approach to solving it, organizationally and technically, at the same time. The common goal is securing and strengthening the entire organization, and the only path to that is finding common ground between these two worlds.
Fifteen years in, that's the clearest thing we can say. And it's the lens we bring to every engagement, and in our experience, it always starts the same way. Not with architecture or tooling, but with a discovery built around the right questions, what are the business goals, where do both sides agree, and what does success actually look like for the whole organization. That shared foundation is what everything else gets built on.
If you're ready to start that conversation, Let's Talk.