For the last 30 years, and particularly during the last decade, OT environments increasingly face a new challenge of maintaining secured environments. Historically, security grew up in an age of “cat and mouse” where the hacker “villain” and security “hero” are in a constant game of one upsmanship. Invariably, there are organizations and individuals that get caught in the security pinch and become the next victims.