The Cyber Threat Landscape Facing OT Operators Has Changed
The U.S. House Committee on Homeland Security’s Cyber Threat Snapshot (Oct 2025) provides one of the clearest signals yet that critical infrastructure operators are entering a new era of persistent, high-impact cyber threats.
The report identifies sharp increases in:
For operators in energy, water, manufacturing, telecom, and transportation, the implication is clear:
Traditional OT security approaches cannot keep pace with the scale, speed, and business impact of today’s threat actors.
OT networks face a perfect storm of conditions described directly in the report:
The report confirms what many CISOs and OT security leaders already feel:
Threat volume is increasing, threat sophistication is increasing, and the margin for error is shrinking.
This is precisely why quantifying OT cyber risk — not just identifying vulnerabilities — is now essential.
Historically, OT risk has been communicated using qualitative labels:
But these labels do not help boards, CFOs, or regulators understand:
Cyber Risk Quantification (CRQ) solves this gap by converting OT cyber threats into business-aligned, financial metrics such as:
This allows executives to not only understand their exposure — but to justify the right investments with evidence.
DeNexus’ DeRISK platform provides a data-driven approach to industrial cyber risk quantification and vulnerability management.
Below is how DeRISK directly maps to the threats highlighted in the Homeland Security Committee report.
Threat Identified: Nation-state and opportunistic criminal networks are targeting manufacturing, energy, transportation, and other industrial sectors. 70% of cyber attacks involved critical infrastructure.
DeRISK Response:
Threat Identified: Long-term access inside critical infrastructure networks by PRC, Russian, Iranian actors.
DeRISK Response:
Threat Identified: Ransomware affecting utilities, municipalities, and industrial operations.
DeRISK Response:
Threat Identified: 1 in 6 breaches driven by AI-enabled techniques.
DeRISK Response:
Step 1 — Define Scope of OT Assets and Security Controls
Upload list of cyber assets including ICS/SCADA, PLCs, network infrastructure, etc. Provide maturity of cybersecurity program to identify strengths and weaknesses.
Step 2 — Identify Vulnerabilities & Exposure
Upload CVE telemetry from vulnerability management systems; also network zones and firewall access lists
Step 3 — Calculate Likelihood (Threat Frequency Modeling)
Incorporates cybersecurity controls (aka., effectiveness of safeguards), vulnerabilities, along with global attack trends from external sources to estimate the number of attacks and their probability in the current cybersecurity design
Step 4 — Calculate Impact in Real Business Terms
Input financial attributes about the company and facility, which is used to estimate the potential for downtime, extortion, equipment damage, and more.
Step 5 — Compute Expected Loss & VaR
In a single attack scenario, one access vector, one path through the environment, and its potential impact is simulated. This is repeated millions of iterations to evaluate all access vectors, all loss types, to produce financially quantified, board-ready risk numbers including low-probability high-impact events.
Step 6 — Prioritize Controls Based on ROI
Simulate different projects and risk mitigation scenarios. Identify which delivers the best return on investment. Shows where investment reduces the most risk.
Step 7 — Align Cyber Risk with Enterprise Risk
Communicate cyber risk in financial metrics that CFOs, boards, and insurers understand and can align with other risks to the enterprise.
The Homeland Security report confirms that:
Quantifying OT cyber risk is no longer optional — it is the new standard for security governance, insurance, and regulatory accountability.
Take the Next Step: See Your OT Risk in Financial Terms
Discover how DeNexus can help you quantify and prioritize cyber risk across your OT environment.