{"id":11515,"date":"2025-11-13T15:39:26","date_gmt":"2025-11-13T20:39:26","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11515"},"modified":"2025-11-13T15:40:10","modified_gmt":"2025-11-13T20:40:10","slug":"siga-ciso-visibility-during-an-ot-attack-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/","title":{"rendered":"The Process-Oriented View: CISO Visibility During an OT Attack"},"content":{"rendered":"\n<p>When a cyber incident occurs in an operational technology (OT) environment, understanding what is actually happening can become difficult. Control systems may continue to display normal readings even if attackers have begun manipulating logic or feedback within Programmable Logic Controllers (PLCs) or Human-Machine Interfaces (HMIs). Operators see stable values while underlying conditions start to diverge from what is shown on screen.<\/p>\n\n\n\n<p>If process data at the controller level is falsified, every connected monitoring and cybersecurity tool reflects the same false picture. At that point, the Chief Information Security Officer (CISO) and operations team lose reliable visibility into the physical process that underpins production and safety.<\/p>\n\n\n\n<p>The choices that follow each carry risk:<\/p>\n\n\n\n<ul>\n<li>Shutting down operations may prevent escalation but could also cause costly downtime if the intrusion is contained to the network.<\/li>\n\n\n\n<li>Continuing to operate may expose critical assets to damage if the manipulation extends to the process layer.<\/li>\n<\/ul>\n\n\n\n<p>A recent cyber event at Norway\u2019s <a href=\"https:\/\/www.reuters.com\/technology\/norway-spy-chief-blames-russian-hackers-dam-sabotage-april-2025-08-13\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SIGA OT Attack Blog 2025 - Risevatnet\">Risevatnet dam<\/a> illustrates this limitation.<br>During the incident, operators lost visibility into parts of the control system, yet intrusion detection and monitoring tools reported no anomalies. The breach was discovered only when on-site personnel noticed irregular behavior in equipment operations.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Embedded.jpg\" alt=\"\" class=\"wp-image-11517\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Embedded.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Embedded-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>This outcome speaks to a broader issue in OT cybersecurity. Network-based detection tools can confirm whether communication channels are functioning, but they cannot independently verify whether the process data itself is genuine.&nbsp; If attackers manipulate information within PLCs or HMIs, every connected dashboard, alarm and analytic layer reflects the same falsified values. In effect, the system becomes blind at the moment visibility is most needed.<\/p>\n\n\n\n<p>The Risevatnet case shows how quickly a cybersecurity failure can become an operational one. When control room data appears normal, incident response slows and decisions depend on incomplete or misleading information. Without a way to validate what is happening at the physical process level, teams must rely on manual observation or external cues, a reactive approach that offers no real protection in complex or distributed environments.<\/p>\n\n\n\n<p><strong>SIGA\u2019s SigaML\u00b2<\/strong>, available through <strong>Carahsoft<\/strong>, addresses this visibility gap by providing an independent, out-of-band view of the industrial process. The system collects unfiltered electrical signals directly from field I\/Os (data that cannot be spoofed or altered) and applies multi-level analytics across Purdue Levels 0\u20134 to detect anomalies and false-data injections in real time.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"288\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGA-ML2.png\" alt=\"\" class=\"wp-image-11519\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGA-ML2.png 624w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGA-ML2-300x138.png 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGA-ML2-500x231.png 500w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure><\/div>\n\n\n<p>Its components work together to create an evidence-based view of the process:<\/p>\n\n\n\n<ol start=\"1\">\n<li><strong>SigaGuard<\/strong> sensors capture raw electrical data directly from equipment.<\/li>\n\n\n\n<li><strong>SigaGuardX<\/strong> software correlates Level 0-4 information to identify inconsistencies and possible manipulations.<\/li>\n\n\n\n<li><strong>S-PAS<\/strong> simulation tools allow cybersecurity and operations teams to rehearse attack scenarios and refine incident response playbooks.<\/li>\n<\/ol>\n\n\n\n<p>These capabilities give CISOs and plant operators verifiable insight during an active incident, helping determine whether an event is operational or cyber in nature and guiding containment or recovery actions.<\/p>\n\n\n\n<p>Regulatory frameworks including Network and Information Security Directive 2 (<strong>NIS2<\/strong>), Cyber Incident Reporting for Critical Infrastructure Act<strong> (CIRCIA<\/strong>) and the latest National Institute of Standards and Technology (<strong>NIST<\/strong>) guidance highlight the importance of process-level monitoring and validation.<br><br><\/p>\n\n\n\n<p>As oversight expands, CISOs and plant operators are expected to provide <strong>verifiable evidence<\/strong> of what occurred during an event, more than network logs or alarms.<br>Meeting that requirement depends on having data sources that remain trustworthy even when control networks are compromised.<\/p>\n\n\n\n<p><strong>SigaML\u00b2<\/strong> provides that capability, giving security and operations teams a direct, unaltered view of the physical process when clarity matters most.<\/p>\n\n\n\n<p><strong><em>Explore how SIGA\u2019s cyber-physical security solutions empower CISOs with greater visibility during OT attacks. Visit Carahsoft\u2019s <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/siga\/solutions\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SIGA OT Attack Blog 2025 - Bottom CTA\"><strong><em>SIGA solutions page<\/em><\/strong><\/a><strong><em> to discover how your agency can enhance its infrastructure resilience.<\/em><\/strong><\/p>\n\n\n\n<p><em>Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including <a href=\"https:\/\/www.carahsoft.com\/siga\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SIGA OT Attack Blog 2025 - SIGA Solve Page\">SIGA<\/a>, we deliver\u202f<\/em><a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SIGA OT Attack Blog 2025 - Carahsoft Solve\"><em>solutions<\/em><\/a><em>\u202ffor Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the&nbsp;<\/em><a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SIGA OT Attack Blog 2025 - Carahsoft Blog\"><em>Carahsoft Blog<\/em><\/a><em>&nbsp;to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n\n\n<p><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/siga-ciso-visibility-during-an-ot-attack-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>When a cyber incident occurs in an operational technology (OT) environment, understanding what is actually happening can become difficult. Control systems may continue to display normal readings even if attackers have begun manipulating logic or feedback within Programmable Logic Controllers &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":11518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1493],"tags":[545,152,1135,1657],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SIGA: CISO Visibility During an OT Attack | Carahsoft<\/title>\n<meta name=\"description\" content=\"Cyber incidents in OT can hide real threats. Learn why falsified controller data blinds operators and CISOs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIGA: CISO Visibility During an OT Attack | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Cyber incidents in OT can hide real threats. Learn why falsified controller data blinds operators and CISOs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T20:39:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-13T20:40:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"The Process-Oriented View: CISO Visibility During an OT Attack\",\"datePublished\":\"2025-11-13T20:39:26+00:00\",\"dateModified\":\"2025-11-13T20:40:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\"},\"wordCount\":709,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg\",\"keywords\":[\"Cybersecurity\",\"NIST\",\"Operational Technology\",\"SIGA\"],\"articleSection\":[\"Cybersecurity\",\"Partners\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\",\"name\":\"SIGA: CISO Visibility During an OT Attack | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg\",\"datePublished\":\"2025-11-13T20:39:26+00:00\",\"dateModified\":\"2025-11-13T20:40:10+00:00\",\"description\":\"Cyber incidents in OT can hide real threats. Learn why falsified controller data blinds operators and CISOs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Process-Oriented View: CISO Visibility During an OT Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIGA: CISO Visibility During an OT Attack | Carahsoft","description":"Cyber incidents in OT can hide real threats. Learn why falsified controller data blinds operators and CISOs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"SIGA: CISO Visibility During an OT Attack | Carahsoft","og_description":"Cyber incidents in OT can hide real threats. Learn why falsified controller data blinds operators and CISOs.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-11-13T20:39:26+00:00","article_modified_time":"2025-11-13T20:40:10+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"The Process-Oriented View: CISO Visibility During an OT Attack","datePublished":"2025-11-13T20:39:26+00:00","dateModified":"2025-11-13T20:40:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/"},"wordCount":709,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg","keywords":["Cybersecurity","NIST","Operational Technology","SIGA"],"articleSection":["Cybersecurity","Partners"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/","name":"SIGA: CISO Visibility During an OT Attack | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg","datePublished":"2025-11-13T20:39:26+00:00","dateModified":"2025-11-13T20:40:10+00:00","description":"Cyber incidents in OT can hide real threats. Learn why falsified controller data blinds operators and CISOs.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/SIGO-CISO-Blog_Blog-Preview.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/siga-ciso-visibility-during-an-ot-attack-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"The Process-Oriented View: CISO Visibility During an OT Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11515"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11515"}],"version-history":[{"count":2,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11515\/revisions"}],"predecessor-version":[{"id":11521,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11515\/revisions\/11521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11518"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}