{"id":129419,"date":"2025-04-11T16:55:20","date_gmt":"2025-04-11T21:55:20","guid":{"rendered":"https:\/\/www.controleng.com\/?p=129419"},"modified":"2025-04-23T19:47:09","modified_gmt":"2025-04-24T00:47:09","slug":"iiot-and-ot-security-bridging-the-gap-in-industrial-environments","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/","title":{"rendered":"IIoT and OT Security: Bridging the Gap in Industrial Environments"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">IIOT and OT cybersecurity insights<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>While organizations commonly secure traditional IoT devices, they frequently neglect vital operational technology (OT) assets like PLCs, HMIs, AGVs, and control systems.<\/li>\n\n\n\n<li>Many companies deploy advanced intrusion detection tools, but OT teams often struggle to effectively use them due to a lack of cross-functional understanding.<\/li>\n\n\n\n<li>Organizations must go beyond traditional cyber tools and treat industrial cybersecurity like preventive maintenance \u2014 proactively monitoring for operational anomalies.<\/li>\n<\/ul>\n\n\n\n<p>While many organizations invest heavily in protecting traditional IoT devices, they often overlook crucial industrial assets that could pose significant risks to their operations.<\/p>\n\n\n\n<p>The widespread adoption of OT intrusion detection systems in manufacturing facilities has enabled organizations to build asset inventories and identify potential vulnerabilities through machine learning and AI. However, a concerning gap remains in how these technologies are being implemented. The gap typically evolves who is the actual owner and is responsible for OT devices. OT devices are almost never under IT\u2019s direct control and responsibility. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Finding IIoT and OT cybersecurity gaps<\/h2>\n\n\n\n<p>Most organizations focus their security efforts on common network-connected devices like cameras, thermostats, and printers, while overlooking critical industrial equipment. The monitoring of PLC\u2019s, HMI, Engineering programming workstations, the control network, drives, motor control centers, automated guided vehicles (AGVs), robots, and pumps often falls by the wayside, creating significant blind spots in industrial security.<\/p>\n\n\n\n<p>A dangerous misconception persists that industrial control systems are isolated from external threats. As industrial cybersecurity expert Dino Busalachi points out, even standalone machine centers maintain various forms of connectivity, whether through remote access systems or on-site technician interventions. This reality creates vulnerabilities that many organizations are ill-equipped to monitor or address.<\/p>\n\n\n\n<p>The implications of these security gaps extend far beyond traditional cybersecurity concerns. Ignoring industrial IoT assets isn&#8217;t just a blind spot \u2013 it&#8217;s a potential catastrophe waiting to happen, with risks ranging from millions in downtime costs to potential physical harm to individuals.<\/p>\n\n\n\n<p>Security in industrial environments requires a broader perspective that encompasses both cybersecurity, process integrity and safety. While traditional security tools focus on detecting malware signatures and cyber threats, they also play a crucial role in developing asset listing associated risk (vulnerabilities), inventory, monitoring and maintaining operational efficiency.<\/p>\n\n\n\n<p>The parallel between digital security monitoring and preventive maintenance is obvious \u2013 just as organizations use sensors to detect thermal, harmonic, or vibration anomalies, they need similar systems to identify disruptive digital behaviors and activities that could impact their assets.<\/p>\n\n\n\n<p>One of the primary challenges in implementing comprehensive industrial security lies in the disconnect between IT and OT teams. Many organizations have invested in sophisticated OT cybersecurity intrusion detection tools and solutions, but their operational technology teams often struggle with to derive value from these investments. This gap stems from a lack of understanding plant operations &amp; processes to determine the platform capabilities and their potential impact on daily operations.<\/p>\n\n\n\n<p>The path to better industrial security requires organizations to find the right partners \u2013 experts who understand both the network infrastructure and the automation environment, while maintaining proficiency in the latest security tools and technologies. This expertise becomes particularly crucial as manufacturing environments grow increasingly connected and complex.<\/p>\n\n\n\n<p>Looking ahead, organizations have two main paths to strengthen their industrial security posture. IT departments can proactively build relationships with equipment suppliers, plant builders, and control system designers to better understand the operational environment. Alternatively, OT teams can take the lead in developing security expertise and implementing appropriate tools and processes.<\/p>\n\n\n\n<p>Success in industrial cybersecurity ultimately requires a balanced approach that combines comprehensive security tools with deep operational expertise. As manufacturing environments continue to evolve, bridging the gap between IT and OT becomes not just beneficial but essential for maintaining both security and operational integrity. Organizations must recognize that protecting industrial assets is just as crucial as securing traditional IT infrastructure and take appropriate steps to address both aspects of their security strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5 steps to streNgthen OT security <\/h2>\n\n\n\n<p>To help organizations better secure their industrial environments, here are five essential steps to strengthen IIoT and OT security:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Conduct a Comprehensive Asset Inventory<\/h3>\n\n\n\n<p>Begin by documenting all connected devices, not just traditional IT assets. This inventory should include industrial equipment like drives, motor control centers, AGVs, robots, and PLCs. Pay special attention to identifying equipment that may have remote access capabilities or require vendor support. These present additional security considerations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Bridge the IT\/OT Knowledge Gap<\/h3>\n\n\n\n<p>Create cross-functional teams that include both IT security experts and OT specialists. Regular collaboration sessions can help both teams understand each other&#8217;s priorities and challenges. Consider implementing training programs that help IT teams understand industrial processes and OT teams grasp cybersecurity principles. Bring in a seasoned expert or partner to assist with facilitation of these discussions. The client\u2019s OT Ecosystem of suppliers need to be included in the strategy of OT Cybersecurity<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Implement Proactive Monitoring Systems<\/h3>\n\n\n\n<p>Deploy monitoring solutions that can detect both cybersecurity threats and operational anomalies. These systems should track not only traditional security metrics but also process integrity indicators. Just as organizations monitor equipment for mechanical issues, they should implement similar vigilance for digital behaviors and network activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Establish Vendor Management Protocols<\/h3>\n\n\n\n<p>Develop strict protocols for vendor access and remote support. This includes documenting all third-party connections, implementing secure remote access solutions, and maintaining an audit trail of all external interactions with industrial systems. Regular reviews of vendor access rights and security practices should be conducted.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Build Security into New Projects<\/h3>\n\n\n\n<p>For new facilities or equipment installations, incorporate cybersecurity requirements into the initial design phase. Work with system integrators and equipment suppliers who understand both operational requirements and security best practices. Ensure that security considerations are part of the architectural engineering and construction process from the beginning.<\/p>\n\n\n\n<p>Success in industrial cybersecurity ultimately requires a balanced approach that combines comprehensive security tools with deep operational expertise. As manufacturing environments continue to evolve, bridging the gap between IT and OT becomes not just beneficial but essential for maintaining both security and operational integrity.<\/p>\n\n\n\n<p>Organizations must recognize that protecting industrial assets is just as crucial as securing traditional IT infrastructure and take appropriate steps to address both aspects of their security strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IIOT and OT cybersecurity insights While many organizations invest heavily in protecting traditional IoT devices, they often overlook crucial industrial assets that could pose significant risks to their operations. The widespread adoption of OT intrusion detection systems in manufacturing facilities has enabled organizations to build asset inventories and identify potential vulnerabilities through machine learning and [&hellip;]<\/p>\n","protected":false},"author":1207,"featured_media":123872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[109053,109301,104134,109314],"tags":[],"tracking-metrics":[],"display-location":[109353],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IIoT and OT Security: Bridging the Gap in Industrial Environments - Control Engineering<\/title>\n<meta name=\"description\" content=\"Ignoring IIoT and OT assets isn&#039;t just a blind spot \u2013 it&#039;s a potential cybersecurity catastrophe waiting to happen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IIoT and OT Security: Bridging the Gap in Industrial Environments - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"Ignoring IIoT and OT assets isn&#039;t just a blind spot \u2013 it&#039;s a potential cybersecurity catastrophe waiting to happen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-11T21:55:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T00:47:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"645\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dino Busalachi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dino Busalachi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\"},\"author\":{\"name\":\"Dino Busalachi\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff\"},\"headline\":\"IIoT and OT Security: Bridging the Gap in Industrial Environments\",\"datePublished\":\"2025-04-11T21:55:20+00:00\",\"dateModified\":\"2025-04-24T00:47:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\"},\"wordCount\":1029,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg\",\"articleSection\":[\"ICSP\",\"IIoT &amp; Cloud\",\"IIoT, Industrie 4.0\",\"Industrial Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\",\"url\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\",\"name\":\"IIoT and OT Security: Bridging the Gap in Industrial Environments - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg\",\"datePublished\":\"2025-04-11T21:55:20+00:00\",\"dateModified\":\"2025-04-24T00:47:09+00:00\",\"description\":\"Ignoring IIoT and OT assets isn't just a blind spot \u2013 it's a potential cybersecurity catastrophe waiting to happen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg\",\"width\":645,\"height\":350,\"caption\":\"Courtesy: CFE Media\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IIoT and OT Security: Bridging the Gap in Industrial Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff\",\"name\":\"Dino Busalachi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g\",\"caption\":\"Dino Busalachi\"},\"description\":\"Dino Busalachi has more than three decades of global experience across information technology (IT), engineering and industrial control systems (ICS) with multiple globally recognized brands including Rockwell Automation, Anheuser Busch, American Standard, General Motors and more. Dino has deep knowledge and understanding of the inner workings of ICS, OT, IoT and technology solutions across almost every major vertical.\",\"url\":\"https:\/\/www.controleng.com\/author\/dino-busalachi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IIoT and OT Security: Bridging the Gap in Industrial Environments - Control Engineering","description":"Ignoring IIoT and OT assets isn't just a blind spot \u2013 it's a potential cybersecurity catastrophe waiting to happen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/","og_locale":"en_US","og_type":"article","og_title":"IIoT and OT Security: Bridging the Gap in Industrial Environments - Control Engineering","og_description":"Ignoring IIoT and OT assets isn't just a blind spot \u2013 it's a potential cybersecurity catastrophe waiting to happen.","og_url":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-04-11T21:55:20+00:00","article_modified_time":"2025-04-24T00:47:09+00:00","og_image":[{"width":645,"height":350,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg","type":"image\/jpeg"}],"author":"Dino Busalachi","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Dino Busalachi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/"},"author":{"name":"Dino Busalachi","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff"},"headline":"IIoT and OT Security: Bridging the Gap in Industrial Environments","datePublished":"2025-04-11T21:55:20+00:00","dateModified":"2025-04-24T00:47:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/"},"wordCount":1029,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg","articleSection":["ICSP","IIoT &amp; Cloud","IIoT, Industrie 4.0","Industrial Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/","url":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/","name":"IIoT and OT Security: Bridging the Gap in Industrial Environments - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg","datePublished":"2025-04-11T21:55:20+00:00","dateModified":"2025-04-24T00:47:09+00:00","description":"Ignoring IIoT and OT assets isn't just a blind spot \u2013 it's a potential cybersecurity catastrophe waiting to happen.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/2110ICSP_WEB_IMG_CFE-locksCyber_Slider-1.jpg","width":645,"height":350,"caption":"Courtesy: CFE Media"},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/iiot-and-ot-security-bridging-the-gap-in-industrial-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"IIoT and OT Security: Bridging the Gap in Industrial Environments"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff","name":"Dino Busalachi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g","caption":"Dino Busalachi"},"description":"Dino Busalachi has more than three decades of global experience across information technology (IT), engineering and industrial control systems (ICS) with multiple globally recognized brands including Rockwell Automation, Anheuser Busch, American Standard, General Motors and more. Dino has deep knowledge and understanding of the inner workings of ICS, OT, IoT and technology solutions across almost every major vertical.","url":"https:\/\/www.controleng.com\/author\/dino-busalachi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/1207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=129419"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129419\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/123872"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=129419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=129419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=129419"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=129419"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=129419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}