The core consensus heading into 2026 is stark and industry-wide: the biggest barrier between IT and OT teams is cultural, not technical. The technology to enable IT/OT convergence largely already exists — what lags behind is the organizational mindset, shared vocabulary, and mutual trust needed to make it work.
The Root of the Culture Gap
IT and OT professionals are trained to prioritize fundamentally different things. Cyber teams speak the language of risk, data, and integrity, while OT operators think in terms of safety, reliability, and uninterrupted uptime. According to Itay Glick, VP of Products at OPSWAT, "Bridging that divide starts with shared goals and co-location — security staff spending time on the plant floor to better understand operational constraints, or OT leaders participating in cyber exercises". Meanwhile, Honeywell's Jason Lee notes that in industrial environments, "the worst thing that can happen" isn't a data breach — it can be loss of life, environmental damage, or massive facility shutdowns.
By the Numbers: How Wide Is the Gap?
Current data paints a sobering picture of the culture gap's persistence:
Only 14% of organizations report feeling fully prepared for emerging OT cyber threats
46% of facilities report that legacy compatibility prevents implementation of advanced security controls
Manufacturers face average downtime costs of $88,000 per hour, making non-disruptive security approaches a business necessity
58% of facilities are subject to mandatory OT/ICS regulations, yet 26% have been found in violation during audits
IoT-connected devices reached 18.5 billion in 2024 and continue rising, exponentially expanding the attack surface
The Cybersecurity Fault Line
As IT and OT systems grow tightly interconnected, NCC Group warns defenders are facing a "perfect storm" of legacy infrastructure, converged networks, and evolving attacker tradecraft. A critical and underappreciated problem is shared identity — accounts, authentication paths, and service credentials that span both environments create readily exploitable pathways. As NCC Group bluntly states: "Environments are flatter than we'd like. An IT incident can move into OT almost by default, as shared services make lateral movement easier than it should be".
Next-Gen OT SOC: Restructuring Teams, Not Just Tools
One of the most significant cultural shifts emerging in 2026 is the transformation of Security Operations Centers (SOCs). Industrial Cyber reports that top organizations are moving away from siloed IT and OT security teams toward a single, converged cyber team with integrated skills. In practice, this means:
OT engineers are being embedded into SOC operations through bespoke delivery team models, giving 24/7 analysts direct access to OT context during incidents
IT and OT personnel now share tools and incident workflows, improving response speed and consistency
AI-supported triage and OT-aware detection are being deployed to address the chronic shortage of OT security expertise
GSMA at MWC26: "It's a Cultural Shift, Not a Technical One"
At Mobile World Congress 2026 (MWC26) in March, this theme took center stage. The overwhelming consensus among industry leaders was that the technology required for IT/OT convergence largely already exists — the bottleneck is cultural transformation. Wind River, ServiceNow, and Capgemini jointly discussed how they have partnered to exploit efficiency and revenue opportunities through convergence while navigating the human challenges of data sovereignty, compliance, and cross-team alignment.
Geopolitics Amplifies the Stakes
The culture gap has a geopolitical dimension in 2026. Nation-state actors — particularly those linked to the Ukraine and Middle East conflicts — are actively targeting critical OT infrastructure, according to Google's 2026 threat forecast and Nozomi predictions. Samuel Linares of Accenture notes that "organizations are moving beyond basic protection toward the ability to detect, respond, and recover from advanced, state-linked attacks". This geopolitical pressure is forcing organizations to scrutinize third-party vendor access, firmware update integrity, and supply chain dependencies through an entirely new lens.
Bridging the Gap: What Actually Works
Industry experts converge on several practical strategies to narrow the culture divide:
Co-location: Security staff should spend time on the plant floor; OT operators should participate in cyber exercises
Shared tooling: Using a single CMDB, asset inventory, and monitoring platform — rather than parallel systems — reduces duplication and builds operational trust
Joint risk assessments and tabletop exercises: These build cross-team trust more effectively than compliance audits
Translating risk into business language: Expressing OT cyber risk in financial terms (e.g., Value at Risk / VaR) resonates better with executive boards than technical jargon
Standards as a floor, not a ceiling: Frameworks like IEC 62443, NIST CSF, and NERC CIP set the minimum; genuine collaboration raises organizations above mere compliance
Upcoming Events
The cultural dimensions of IT/OT convergence continue to drive major industry gatherings. A webinar hosted by Novipro on April 21, 2026, titled "Does IT/OT Convergence Create New Risks for Your Operations?" is scheduled to address precisely these human and operational challenges. The DISTRIBUTECH 2026 panel also recently focused on workforce evolution, new skill sets, and change-management strategies needed to support digital operations across energy grids.
The overarching message of March 2026 is clear: IT/OT convergence is no longer a future aspiration — it is happening now. But its success depends less on deploying the right firewall and more on building a shared culture of resilience where engineers, operators, and security professionals speak a common language.
About the Author
Nay Linn Aung is a Senior Automation & Robotics Engineer (M.S. Computer Science — Data Science & AI) specializing in the convergence of OT and IT.