Cyber threats to operational technology (OT) are rising. Emergent malicious tools are designed to exploit OT vulnerabilities at scale. Chief information security officers (CISO) must protect these systems while also maintaining safety and continuous operations. But many organizations lack an integrated process for responding to cyber threats against OT and IT. Now, CISOs can overcome this challenge by integrating OT into an IT security operations center (SOC).