Security leaders must protect specialized equipment in operational technology (OT) environments from growing cyberthreats while maintaining continuity of operations and high safety standards. This requires tailoring traditional IT security processes and solutions to meet the unique requirements of OT environments. This data-driven report examines the current state of OT security and provides guidance on how security leaders can respond.