{"id":53064,"date":"2023-08-04T00:00:00","date_gmt":"2023-08-04T00:00:00","guid":{"rendered":"urn:uuid:0bcb784e-b732-447b-ca3b-fd0b55894b5d"},"modified":"2023-08-04T00:00:00","modified_gmt":"2023-08-04T00:00:00","slug":"break-it-ot-silos-by-expanding-soc-responsibilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/","title":{"rendered":"Break IT\/OT Silos by Expanding SOC Responsibilities"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-responsibilities:Large?qlt=80\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Learn how to break IT\/OT enterprise silos by expanding SOC responsibilities.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"ics ot,compliance &amp; risks,iot,reports,articles, news, reports\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2023-08-04\"> <meta property=\"article:tag\" content=\"compliance &amp; risks\"> <meta property=\"article:section\" content=\"reports\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/h\/soc-responsibilities.html\"> <title>Break IT\/OT Silos by Expanding SOC Responsibilities<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\">\n<link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendmicro\/clientlibs\/trendmicro-core-2\/clientlibs\/header-footer.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/h\/soc-responsibilities.html\"><br \/>\n<meta property=\"og:title\" content=\"Break IT\/OT Silos by Expanding SOC Responsibilities\"><br \/>\n<meta property=\"og:description\" content=\"Learn how to break IT\/OT enterprise silos by expanding SOC responsibilities.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/23\/soc-responsibilities.png\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Break IT\/OT Silos by Expanding SOC Responsibilities\"><br \/>\n<meta name=\"twitter:description\" content=\"Learn how to break IT\/OT enterprise silos by expanding SOC responsibilities.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/23\/soc-responsibilities.png\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"49.654960660142\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1017340735\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"8.2646153846154\">\n<div class=\"article-details\" role=\"heading\" readability=\"35.975384615385\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Compliance &amp; Risks<\/p>\n<p class=\"article-details__description\">The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks.<\/p>\n<p class=\"article-details__author-by\">By: Kazuhisa Tagaya <time class=\"article-details__date\">August 04, 2023<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-lg-8 col-lg-push-2\"> <\/p>\n<div class=\"richText\" readability=\"42.666666666667\">\n<div readability=\"32\">\n<p>On June 2023, the SANS Institute published a new report, <a href=\"https:\/\/resources.trendmicro.com\/SANS-ICS-OT-Visibility-Survey.html\"><span class=\"bs-modal\"><u>\u201cBreaking IT\/OT Silos With ICS\/OT Visibility\u201d<\/u><\/span><\/a> written by Jason Christopher, SANS analyst, with the cooperation of Trend Micro. This survey explores how respondents tackle ICS\/OT visibility challenges, the gaps across the IT-OT boundary, the roadblocks to expanding visibility, and the maturity comparisons from both domains. This survey had nearly 350 respondents responsible for IT and OT security across a wide variety of industrial sectors worldwide.<\/p>\n<p>This article discusses the challenges integrating security operations across IT and OT, referring to the report&#8217;s essence.<\/p>\n<p><span class=\"body-subhead-title\">Background: Enterprise SOC&#8217;s responsibility has been expanded to OT, but their capability is developing.<\/span><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Approximately 50% claim that their enterprise SOC includes some ICS\/OT visibility level.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Only 53% of their ICS\/OT environments provided data for detection.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Nearly 40% of respondents indicated that only IT staff would respond to the incident.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Of the survey respondents with no ICS\/OT visibility in their SOC, 67% indicated plans to expand their SOC to include these capabilities.<\/span><\/li>\n<\/ul>\n<p>These findings suggest the following situation. Enterprise SOCs have broader responsibilities and are partially observant in OT but unable to detect security events in the OT domain. IT security teams are forced to respond without OT visibility in the OT incident response. But as a positive trend, most organizations that do not yet have a SOC overseeing OT are also keen to expand their enterprise SOC.<\/p>\n<p><span class=\"body-subhead-title\">What capabilities do you think should be integrated across IT and OT organizational silos?<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/23\/h\/break-it-ot-silos\/figure-1.png\" alt=\"figure-01\"> <\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\" readability=\"36.5\">\n<div readability=\"18\">\n<p>Figure1: Capabilities should be integrated across IT and OT organization silos<\/p>\n<p>Cyber event detection topped the list at 63%. The following categories were asset inventory, identity access control, and event analytics. Beyond the organizational silos of IT and OT, event detection is the most important function to integrate, requiring holistic visibility.<\/p>\n<p><span class=\"body-subhead-title\">What are the top three challenges for expanding security operations across IT and ICS\/OT environments?<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/23\/h\/break-it-ot-silos\/figure-2.png\" alt=\"figure2\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"39\">\n<div readability=\"23\">\n<p>Figure2: The challenges for expanding security operations across IT and ICS\/OT<\/p>\n<p>The top was training for IT staff in OT Cybersecurity at 54%. IT and OT are technologies with completely different principles and require understanding the difference. When considering operations that integrate IT and OT, the frequency of attacks against IT is high, and it is also the entry point that leads to OT, so many organizations think training for IT staff tends to be more important than for OT staff.<\/p>\n<p>Cyber event detection is the most important issue for enterprise SOCs to conduct comprehensive security operations, including the OT domain. There are several monitoring stages, but more than simply collecting logs is needed, and massive alerts can overwhelm the SOC team. The ability to detect cyber events across IT and OT and analyze their context helps prioritize events for action.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/23\/h\/break-it-ot-silos\/figure-3.jpg\" alt=\"figure3\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.008305647841\">\n<div readability=\"18.671096345515\">\n<p>Figure3: Detection and analysis process: refer to Incident Handling Guide (<a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/61\/r2\/final\" target=\"_blank\" rel=\"noopener\">NIST SP800-61r2<\/a>)<\/p>\n<p>Cyber event detection can be roughly divided into four steps. The first step is the ability to observe own assets and networks. In the OT domain, there are ways to implement endpoint security on the asset and monitor the nearby network. The second step is to filter observable events to know adverse events to your organization regarding protection. It is necessary to define normal conditions and detect anomalies. The third step is to identify those events that can potentially cause significant consequences to your business. This requires evaluating the importance of the business processes that rely on the asset and the CIA of information. The final step is determining whether the event should be dealt with immediately. This is a matter of decision-making. It needs to evaluate the cost-value balance of response and recovery.<\/p>\n<p>Trend Micro&#8217;s cybersecurity platform across IT and OT streamlines this detection and analysis process.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Dedicated OT endpoints and network sensors detect anomalous behavior as events.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Cyber-attacks intrude IT attack surface as an entry point, move internal network and reach OT. Combining information from IT-side sensors with data from OT&#8217;s based on threat models to visualize attack context.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Because it becomes easier to identify the cause, route, and scope of impact, management would understand the impact on the business and the resources required for response and recovery.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">These help decision-making in incident response. Concise and quick decisions maximize the efficiency of security resources and minimize damage to your business.<\/span><\/li>\n<\/ul>\n<p>Learn more about our <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/solutions\/iot\/ics-ot.html\">ICS\/OT security solutions<\/a>.<\/p>\n<p>Reference:<br \/><a href=\"https:\/\/resources.trendmicro.com\/SANS-ICS-OT-Visibility-Survey.html\"><span class=\"bs-modal\">Breaking IT\/OT Silos with ICS\/OT Visibility &#8211; 2023 SANS ICS\/OT visibility survey<\/span><\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/h\/soc-responsibilities.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest study said that enterprise SOCs are expanding their responsibilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9538,9842,9514,9516],"class_list":["post-53064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-compliancerisks","tag-trend-micro-research-ics-ot","tag-trend-micro-research-iot","tag-trend-micro-research-reports"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Break IT\/OT Silos by Expanding SOC Responsibilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Break IT\/OT Silos by Expanding SOC Responsibilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-04T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-responsibilities:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Break IT\\\/OT Silos by Expanding SOC Responsibilities\",\"datePublished\":\"2023-08-04T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/break-it-ot-silos-by-expanding-soc-responsibilities.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Compliance&amp;Risks\",\"Trend Micro Research : ICS OT\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Reports\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/\",\"name\":\"Break IT\\\/OT Silos by Expanding SOC Responsibilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/break-it-ot-silos-by-expanding-soc-responsibilities.png\",\"datePublished\":\"2023-08-04T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/break-it-ot-silos-by-expanding-soc-responsibilities.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/break-it-ot-silos-by-expanding-soc-responsibilities.png\",\"width\":857,\"height\":734},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/break-it-ot-silos-by-expanding-soc-responsibilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Break IT\\\/OT Silos by Expanding SOC Responsibilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Break IT\/OT Silos by Expanding SOC Responsibilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/","og_locale":"en_US","og_type":"article","og_title":"Break IT\/OT Silos by Expanding SOC Responsibilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-04T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-responsibilities:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Break IT\/OT Silos by Expanding SOC Responsibilities","datePublished":"2023-08-04T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/"},"wordCount":796,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/break-it-ot-silos-by-expanding-soc-responsibilities.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Compliance&amp;Risks","Trend Micro Research : ICS OT","Trend Micro Research : IoT","Trend Micro Research : Reports"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/","url":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/","name":"Break IT\/OT Silos by Expanding SOC Responsibilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/break-it-ot-silos-by-expanding-soc-responsibilities.png","datePublished":"2023-08-04T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/break-it-ot-silos-by-expanding-soc-responsibilities.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/break-it-ot-silos-by-expanding-soc-responsibilities.png","width":857,"height":734},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/break-it-ot-silos-by-expanding-soc-responsibilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Break IT\/OT Silos by Expanding SOC Responsibilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53064"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53065"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}