arrow_backIndustrial Software Insider

Midwest OT Cybersecurity Summit Shifts Focus to Governance, Standards, and Workforce

The 2026 Midwest OT Cybersecurity Summit signals an industry shift from isolated security fixes toward unified IT/OT governance, standards alignment, and workforce upskilling.

BREAKING
Midwest OT Cybersecurity Summit Shifts Focus to Governance, Standards, and Workforce

The 2026 Midwest OT Cybersecurity Summit, held April 24 at Marquette University in Milwaukee, Wisconsin, brought together operational technology (OT) security practitioners, manufacturing leaders, and industrial IT professionals to address a fundamental shift in how organizations approach cyber risk - moving from isolated, point-in-time security fixes toward coordinated governance structures, cross-sector standards alignment, and sustained workforce development.

The summit, organized by Marquette University's student security group "Golden Eagle" and hosted on the university's AMU campus, ran from 11:00 AM to 5:30 PM Central Time and featured technical talks, hands-on demonstrations, and structured networking - reflecting a broader regional push to institutionalize OT security conversations outside major coastal industry conferences.

Background

The event arrives against a deteriorating threat backdrop for industrial environments. Manufacturing has been the most targeted sector for cyberattacks for four consecutive years, absorbing 26% of all global incidents and experiencing a 61% surge in ransomware attacks during 2025, according to data from KELA and Bitsight. Attacks are no longer confined to enterprise IT networks: IT/OT convergence has expanded the attack surface by connecting previously air-gapped industrial control systems to enterprise networks, cloud platforms, and third-party integrations, according to cybersecurity firm analysis published in early 2026.

Governance and organizational structure - not technology alone - have emerged as the primary failure points. According to PwC, IT and OT systems continue to converge, sharing networks, data flows, and infrastructure, yet many organizations still treat OT as a domain separate from or subordinate to IT, leading to uneven security safeguards and insufficient investment. Industry analysis from OTNexus published in January 2026 characterized 2025 as the year when OT cybersecurity governance shifted from a bureaucratic burden to "the connective tissue linking assets, risks, and policies," enabling CISOs to translate technical controls into board-level confidence.

Details

Panel discussions at the summit reflected three priority themes that attendees indicated are driving their 2026 planning cycles.

Standards alignment and shared metrics. Practitioners pointed to framework fragmentation as a persistent operational barrier. U.S. agencies including CISA, TSA, NERC, EPA, SEC, and FDA have each issued governance directives, but industry analysts note these frameworks carry a 65-70% overlap and remain largely IT-centric, even those with an explicit OT focus, leaving engineering and operations teams to fill residual gaps, according to analysis published by Industrial Cyber. Attendees discussed ISA/IEC 62443 and NIST Special Publication 800-82 Revision 3 as the primary OT-specific technical references for control system security, alongside CISA's Cyber Performance Goals for OT network segmentation and zero-trust enforcement.

Incident response readiness. Summit sessions on incident response (IR) planning emphasized the cost of fragmented response structures. Dual IT/OT cyberattacks now average US$4.56 million per incident, according to industry reporting from Industrial Cyber in early 2026. Attendees advocated for sector-specific playbooks validated through cross-enterprise tabletop exercises - a format the ISMG Cybersecurity Summit: North America Midwest had also featured in its prior edition, using U.S. Secret Service-led tabletop scenarios to test communication under pressure.

Workforce upskilling. The 2026 SANS Institute | GIAC Cybersecurity Workforce Research Report, based on 947 global respondents, found that 27% of organizations have experienced breaches directly attributable to workforce skills gaps. In OT environments specifically, 52% of OT incidents still originated from human error in 2024-2025, yet investment in workforce training doubled year-over-year, according to TXOne Networks' OT/ICS Cybersecurity Report. Milwaukee-area attendees cited the need to develop regional talent pipelines through university partnerships and credentialing programs aligned to the NICE Cybersecurity Workforce Framework.

Funding structures also drew significant discussion. Rather than maintaining separate IT and OT security budgets - a model that frequently produces visibility gaps and duplicated tooling - practitioners advocated for consolidated risk registers that quantify OT cyber exposure in financial terms. This approach enables joint budget negotiations across business units and secures executive sponsorship tied directly to operational downtime risk.

Outlook

The summit's organizers indicated plans to expand the event's reach in coming years, using the Marquette University platform to establish the Midwest as a standing venue for cross-industry OT security dialogue spanning manufacturing, energy, and logistics. Regulatory pressure on OT hiring and staffing is intensifying, with 95% of cybersecurity organizations reporting some level of regulatory influence on workforce decisions in 2026 - up sharply from 40% in 2025, according to the SANS Institute. Organizations seeking to translate summit insights into measurable risk reduction face an immediate window to establish cross-functional governance structures before anticipated regulatory tightening narrows that discretion further.