Control system cyber incidents and network breaches are “apples and oranges”

Network cybersecurity and control system organizations have fundamentally different objectives and criteria when it comes to identifying cyber incidents
Feb. 26, 2026
7 min read

This blog is a follow-up to my previous blog and comes from my work on the revision of our book, “Cybersecurity Policy Handbook”, Version 2, which contains a section on cyber incidents that included sample data from the 2025 Verizon Data Breach Report.

I was asked how the Verizon data compared to the control system cyber incidents in my database for the same period. It became an “apples to oranges” comparison: Even though theoretically they should be close as the definition of a cyber incident should be the same – a cyber incident is an incident involving electronic communication between systems, or between systems and people, that affects confidentiality, integrity, or availability. Electronic communication includes process sensor signals, control logic, firmware, and field device communications — not just Ethernet or IP networks. This is consistent with Professor Ross Anderson's formulation in Security Engineering, which frames security as building systems to remain dependable in the face of "malice, error, or mischance."

IT and OT network cybersecurity focus on malicious data breaches including ransomware, whereas control system cybersecurity focuses on impacts to physical processes, whether malicious or unintentional. If the incidents don’t look like network cyberattacks, there’s a tendency for network security personnel to not consider them as being cyber incidents. (This not only occurs with control system incidents but also occurred, for example, with the CrowdStrike update incident that was not malicious and was initially excluded it as a cyber incident, despite massive operational impact).

Consequently, IT and OT network cyber incident identification deviates from control system cyber incident identification because many control system cyber incidents aren’t compromises of Ethernet networks, and because many do not appear to be malicious.

Table 1 is a sample of the 2025 data from the Verizon report where "Incidents" include all reported cybersecurity events, while "Data Breaches" represent confirmed loss of data. The Table 1 categories are based on the North American Industry Classification System (NAICS) published by the U.S. Office of Management and Budget (OMB) for classifying business establishments by type of economic activity. 

Table 1 2025 Sample Data from Verizon Data Breach Report

Industry

Incidents

Data Breaches

Accommodation

211

48

Administrative

153

106

Agriculture

80

10

Construction

307

145

Education

1,075

106

Entertainment

493

37

Finance

3,336

162

Healthcare

1,710

105

Information

1,589

154

Management

113

52

Manufacturing

3,837

456

Mining

64

27

Other Services

683

86

Professional

2,549

547

Public Administration

1,422

124

Real Estate

339

62

Retail

837

166

Transportation

361

103

Utilities

358

26

Wholesale

330

256

Get your subscription to Control's tri-weekly newsletter.

Table 2 is a summary of the more than one million control system cyber incidents from my database that occurred in 2025. My categorization is based on types of organizations that use control systems (operational technologies) and only include incidents that impacted control systems and/or facility operation. Control system cyber incidents include field device communication issues, automation malfunctions, loss-of-view, and loss-of-control events, not just confirmed attacks. The results from the two tables are like comparing apples and oranges.

 Table 2 2025 Control System Cyber Incidents

Category

Operational Impact

Loss of Control

Loss of View

Equipment Damage

Environmental Damage

Injuries/Deaths

Aircraft

Yes

Yes

Yes

Yes

 

Yes

Electric T&D/SCADA

Yes

Yes

Yes

Yes

   

Facilities

Yes

Yes

Yes

Yes

Yes

 

Food/Beverage

Yes

Yes

Yes

     

Land Transportation

Yes

 

Yes

     

Manufacturing

Yes

Yes

Yes

     

Marine

Yes

Yes

Yes

Yes

Yes

 

Medical

Yes

Yes

Yes

   

Yes

Nuclear Plants

Yes

Yes

Yes

     

Oil/Gas

Yes

Yes

       

Railroads

Yes

Yes

Yes

Yes

   

Water/Wastewater

Yes

Yes

Yes

Yes

Yes

 

Summary

Network cybersecurity (IT and OT) and control system organizations have fundamentally different objectives and criteria when it comes to identifying cyber incidents. The Verizon Data Breach report is typical of reporting organizations that equate cyber incidents to data breaches and don’t address control system cyber incidents. The NAICS categories don’t reflect the categorization needed for identifying control system cyber incidents across multiple industries.

The only chance to bridge this gap is for both network security and engineering organizations to accept the same cyber incident definition, and for both network security and engineering organizations to receive appropriate control system cyber incident training. Otherwise, comparing numbers and impacts from network versus control system cyber incidents will continue to be an exercise in comparing apples to oranges.

About the Author

Joe Weiss

Cybersecurity Contributor

Joe Weiss P.E., CISM, is managing partner of Applied Control Solutions, LLC, in Cupertino, CA. Formerly of KEMA and EPRI, Joe is an international authority on cybersecurity. You can contact him at [email protected]

Sign up for our eNewsletters
Get the latest news and updates