Organizations across all industries are embracing new digital tools and services to accelerate and grow their businesses. The rapid adoption of these technologies has caused internet-connected information technology (IT) networks to increasingly intersect with previously isolated (and often difficult to update with patches) operations technology (OT) networks. This overlap also means that the ever-expanding IT attack surface now exposes OT systems to threats previously avoided within these environments. The result is that traditional security approaches are insufficient to protect connected OT environments.