top of page

GuidePoint Security joins Operational Technology Cybersecurity Coalition

  • rkirkwood3
  • 6 days ago
  • 3 min read

The OT Cyber Coalition welcomes GuidePoint Security as the 14th member to join the diverse group of cybersecurity vendors dedicated to improving the cybersecurity of OT environments.  


OTCC: Tell us a little about what your GuidePoint Security offers critical infrastructure owners and operators who want to secure their operations.  


GuidePoint Security: GuidePoint Security offers comprehensive solutions tailored to the unique needs of industrial environments. Our OT security services help owners and operators gain full visibility into their operational technology (OT) assets, assess and mitigate cyber risks, implement defensible architectures, and respond effectively to threats. We specialize in bridging the IT/OT gap with vendor-neutral strategies, regulatory alignment, and industry best practices to ensure the resilience, safety, and uptime of critical operations. 


OTCC: Why did your company decide to join a coalition with their competitors? Why is this so important?


GuidePoint Security: Securing critical infrastructure is a mission that transcends market share or commercial rivalry. The threats targeting our nation’s critical infrastructure are growing in scale, sophistication, and national impact. No single vendor or system integrator has all the answers. By collaborating within the OT Cyber Coalition, we can share threat intelligence, advocate for effective and practical policy, drive interoperability standards, and present a unified front to regulators, asset owners, and adversaries alike.


Collaboration is crucial because critical infrastructure depends on secure and reliable OT systems. A failure in one sector can have cascading effects across many others. The OT Cyber Coalition fosters a vendor-neutral, open, and coordinated approach that strengthens the entire ecosystem, enabling public-private partnerships, accelerating innovation, and ultimately protecting national security and public safety. Working together, even among competitors, is not just good strategy—it’s essential.


OTCC: What do you think is the top cybersecurity threat facing critical infrastructure owners and operators today?


GuidePoint Security: One of the top cybersecurity threats facing critical infrastructure today isn’t a specific type of attack—it’s the lack of communication and collaboration between IT and OT teams. As industrial environments become more connected, the boundaries between IT and OT have blurred, but the organizational and cultural divide often remains. IT teams prioritize data confidentiality and enterprise security, while OT teams prioritize safety, uptime, and physical process integrity. When these groups operate in silos, it creates dangerous blind spots—leaving gaps in visibility, inconsistent security controls, and delayed responses to threats that can move between both environments.


Our adversaries are exploiting this disconnect, often using IT systems as entry points to reach OT networks, where detection and response are often less mature. Without unified policies, shared visibility, and coordinated incident response plans, critical infrastructure operators are at greater risk of operational disruption and even physical harm. Bridging the IT/OT gap is no longer optional; it’s essential to securing the future of our nation’s most vital systems.


OTCC: What is the most critical step the federal government can take with critical infrastructure owners and operators to better secure their OT systems? What is the most critical step federal agencies who have operational technology can take to make those systems more secure?


GuidePoint Security: The federal government should take steps to work with sector-specific agencies (e.g., DOE, EPA, TSA) to translate the CISA Cybersecurity Performance Goals (CPGs) into industry-specific roadmaps that prioritize controls based on operational risk and feasibility. Providing practical how-to resources, templates, and control mappings aligned to real-world OT environments helps ensure adoption is realistic; not burdensome.


The government can then provide accountability by tying the industry-specific roadmaps to participation in critical programs (e.g., infrastructure grants, federal contracts, regulatory reviews). The sector-specific agencies could require reporting of implementation status or outcomes as part of grant applications or sector-specific performance reviews.



 
 
 
bottom of page