{"id":131447,"date":"2025-07-10T13:04:29","date_gmt":"2025-07-10T18:04:29","guid":{"rendered":"https:\/\/www.controleng.com\/?p=131447"},"modified":"2025-07-10T13:04:29","modified_gmt":"2025-07-10T18:04:29","slug":"zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/","title":{"rendered":"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Zero-trust insights<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Traditional zero-trust models fail in OT environments because they conflict with manufacturing priorities like uptime and availability.<\/li>\n\n\n\n<li>Operational environments require an OT-specific approach to zero trust, including bottom-up segmentation, asset visibility and rapid-change workflows.<\/li>\n\n\n\n<li>Successful implementation depends on cross-functional collaboration between IT, OT and operations teams, with shared responsibility, funding and field-level understanding.<\/li>\n<\/ul>\n\n\n\n<p>Applying zero-trust architectures and frameworks to operational technology (OT) environments creates significant challenges for manufacturing and critical infrastructure.<\/p>\n\n\n\n<p>Forcing IT-developed zero-trust frameworks into industrial environments often leads to operational disruptions and security failures. Manufacturing operations are focused on production. When implementation causes downtime, OT teams inevitably find workarounds that create even greater vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The zero-trust collision in manufacturing<\/h2>\n\n\n\n<p>The zero-trust principle of \u201ctrust, but verify&#8221; fundamentally conflicts with OT environments that prioritize availability and production continuity above everything else.<\/p>\n\n\n\n<p>When zero-trust implementation disrupts remote access during equipment failures, many manufacturers can face hundreds of thousands, if not millions, of dollars a day in downtime costs. This is one reason IT-OT convergence often becomes an IT-OT collision.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why traditional zero-trust approaches fail in OT<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Top-down vs. bottom-up implementation<\/h3>\n\n\n\n<p>IT environments are well defined with consistent applications and clear traffic segmentation. OT systems are a &#8220;melting pot&#8221; of diverse technologies, protocols and legacy equipment. Zero trust in industrial environments requires a bottom-up approach focused on understanding what&#8217;s actually in each &#8220;bucket&#8221; of systems rather than imposing uniform rules from above.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Super flat network realities<\/h3>\n\n\n\n<p>Many manufacturing facilities operate with &#8220;super flat&#8221; networks, where critical production equipment shares network space with business systems. Implementing zero-trust segmentation in these environments can be compared to putting a 16-year-old behind the wheel of a Formula One race car \u2014 technically possible but dangerously impractical without substantial preparation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Identity management conflicts<\/h3>\n\n\n\n<p>Zero trust demands robust identity verification, but industrial systems often use shared credentials or lack authentication capabilities entirely. Plant floor operators wanting to avoid authentication delays will find ways around these controls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Five recommendations for zero trust in manufacturing<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Implement an asset-first approach<\/h3>\n\n\n\n<p>Before pursuing zero-trust initiatives, deploy OT-specific tools that provide continuous visibility into the 20\/25-to-1 ratio of OT assets compared to IT assets on your plant floor. These tools should track both inventory and process integrity changes to deliver operational value plus security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Adopt the &#8220;bucket approach&#8221; to segmentation<\/h3>\n\n\n\n<p>Instead of comprehensive segmentation, identify targeted &#8220;buckets&#8221; of critical systems. Move assets incrementally from unsecured buckets to secured ones without disrupting operations. This evolutionary approach accommodates the reality that, \u201cIt took decades to get here, and it&#8217;s going to take some time to get out of it.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Establish OT-specific change management<\/h3>\n\n\n\n<p>Standard IT change processes that require a week to get somebody onboarded for remote access are incompatible with production needs. Create OT-specific change processes that maintain security while accommodating manufacturing&#8217;s rapid response requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Build field experience among security teams<\/h3>\n\n\n\n<p>Security teams must experience production operations firsthand. If you&#8217;re an IT security professional and either don\u2019t know your OT counterparts or don\u2019t visit the manufacturing plants on a regular basis, you\u2019re at a disadvantage. The IT and OT team members responsible for security should be on the same page. It will be difficult to develop an all-encompassing, detailed cybersecurity scope for your manufacturing environments without this collaboration.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Create cross-functional funding models<\/h3>\n\n\n\n<p>Zero-trust initiatives must be funded from both IT and OT budgets, with input from plant managers, engineering teams and operations management executives. Without this shared investment, progress and commitment toward securing the industrial plant environment will be slow going or not going at all. By cross-referencing the value of not only cybersecurity, but operational resiliency benefits from minimizing unexpected and unplanned downtime, funding can become easier and the financial benefits self-evident.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero trust as a journey, not a destination<\/h2>\n\n\n\n<p>Zero trust remains a valuable strategy and target to keep moving toward, but manufacturing leaders must recognize it as an evolutionary journey requiring OT-specific approaches. Organizations that successfully implement zero-trust principles in industrial environments understand that security cannot come at the expense of operational resilience. By balancing zero-trust principles with operational realities, organizations can incrementally improve security while maintaining the production capacity that drives business success.<\/p>\n\n\n\n<p><strong>AUTHOR<\/strong><\/p>\n\n\n\n<p>Dino Busalachi, Director, BW Design Group, Busalachi has more than three decades of global experience across information technology (IT), engineering and industrial control systems (ICS) with multiple globally recognized brands including Rockwell Automation, Anheuser Busch, American Standard, General Motors and more.<\/p>\n\n\n\n<p><strong>LEARNING OBJECTIVES<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understand why traditional IT-based zero-trust frameworks often fail when applied directly to operational technology (OT) environments.<\/li>\n\n\n\n<li>Identify key challenges in implementing zero trust in manufacturing, including network architecture, identity management and organizational misalignment.<\/li>\n\n\n\n<li>Learn five practical, OT-specific strategies for successfully adapting zero-trust principles without compromising uptime or operational continuity.<\/li>\n<\/ul>\n\n\n\n<p><strong>CONSIDER THIS<\/strong><\/p>\n\n\n\n<p>How can we tailor our cybersecurity strategy to align with the unique operational realities of our plant floor, so that we enhance security without jeopardizing uptime or production efficiency?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How manufacturers can rethink and reshape cybersecurity strategies to protect production operations\u2014without compromising uptime or disrupting the plant floor.<\/p>\n","protected":false},"author":1207,"featured_media":128777,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104076,109314],"tags":[109340,109809,109801,110292,109356,110401,109879,110400],"tracking-metrics":[],"display-location":[109353],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead - Control Engineering<\/title>\n<meta name=\"description\" content=\"How manufacturers can rethink and reshape cybersecurity strategies to protect production operations with zero trust in OT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"How manufacturers can rethink and reshape cybersecurity strategies to protect production operations with zero trust in OT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-10T18:04:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"645\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Dino Busalachi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dino Busalachi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\"},\"author\":{\"name\":\"Dino Busalachi\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff\"},\"headline\":\"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead\",\"datePublished\":\"2025-07-10T18:04:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\"},\"wordCount\":830,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp\",\"keywords\":[\"control engineering\",\"cybersecurity\",\"iiot\",\"IT\/OT\",\"manufacturing\",\"remote acess\",\"security\",\"zero trust\"],\"articleSection\":[\"Cybersecurity\",\"Industrial Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\",\"url\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\",\"name\":\"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp\",\"datePublished\":\"2025-07-10T18:04:29+00:00\",\"description\":\"How manufacturers can rethink and reshape cybersecurity strategies to protect production operations with zero trust in OT.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp\",\"width\":645,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff\",\"name\":\"Dino Busalachi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g\",\"caption\":\"Dino Busalachi\"},\"description\":\"Dino Busalachi has more than three decades of global experience across information technology (IT), engineering and industrial control systems (ICS) with multiple globally recognized brands including Rockwell Automation, Anheuser Busch, American Standard, General Motors and more. Dino has deep knowledge and understanding of the inner workings of ICS, OT, IoT and technology solutions across almost every major vertical.\",\"url\":\"https:\/\/www.controleng.com\/author\/dino-busalachi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead - Control Engineering","description":"How manufacturers can rethink and reshape cybersecurity strategies to protect production operations with zero trust in OT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/","og_locale":"en_US","og_type":"article","og_title":"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead - Control Engineering","og_description":"How manufacturers can rethink and reshape cybersecurity strategies to protect production operations with zero trust in OT.","og_url":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-07-10T18:04:29+00:00","og_image":[{"width":645,"height":350,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp","type":"image\/webp"}],"author":"Dino Busalachi","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Dino Busalachi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/"},"author":{"name":"Dino Busalachi","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff"},"headline":"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead","datePublished":"2025-07-10T18:04:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/"},"wordCount":830,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp","keywords":["control engineering","cybersecurity","iiot","IT\/OT","manufacturing","remote acess","security","zero trust"],"articleSection":["Cybersecurity","Industrial Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/","url":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/","name":"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp","datePublished":"2025-07-10T18:04:29+00:00","description":"How manufacturers can rethink and reshape cybersecurity strategies to protect production operations with zero trust in OT.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/01\/pexels-brett-sayles-5408008-scaled-1.webp","width":645,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/zero-trust-in-ot-why-traditional-approaches-fail-and-what-manufacturers-must-do-instead\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"Zero trust in OT: Why traditional approaches fail and what manufacturers must do instead"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/26ba42f1f778bb26bce924e7dab671ff","name":"Dino Busalachi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b11b67f64f9f150d4d73369958dc5f2cb2ff36ce670f9b16b01966ff30d61789?s=96&d=mm&r=g","caption":"Dino Busalachi"},"description":"Dino Busalachi has more than three decades of global experience across information technology (IT), engineering and industrial control systems (ICS) with multiple globally recognized brands including Rockwell Automation, Anheuser Busch, American Standard, General Motors and more. Dino has deep knowledge and understanding of the inner workings of ICS, OT, IoT and technology solutions across almost every major vertical.","url":"https:\/\/www.controleng.com\/author\/dino-busalachi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/131447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/1207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=131447"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/131447\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/128777"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=131447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=131447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=131447"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=131447"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=131447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}