Skip to main content
Mallory

Proposal for an OT Incident Impact Score Modeled on Natural-Disaster Severity Scales

critical-infrastructure-threatstandards-framework-update
Updated March 21, 2026 at 02:13 PM4 sources
Share:
Proposal for an OT Incident Impact Score Modeled on Natural-Disaster Severity Scales

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A new proposal to standardize how operational technology (OT) cyber incidents are communicated and compared is being promoted as an “OT Incident Impact Score”, using a numerical severity model inspired by natural-disaster scales (e.g., earthquakes, hurricanes, wildfires). Proponents say OT incidents are frequently misunderstood by non-specialists, leading to fear, uncertainty, doubt (FUD) and threat inflation, and argue that a consistent scoring approach could improve executive and cross-sector decision-making in critical infrastructure.

Munish Walther-Puri (TPO Group; IANS Research faculty) described the concept as analogous to the Richter scale but incorporating peer review and lessons from established disaster-impact measurement systems. OT security practitioner Dale Peterson warned that poor understanding of OT incident severity can drive misallocation of resources and distorted risk prioritization, underscoring the need for clearer, more comparable impact communication; however, the effort is described as facing an uphill climb to broad adoption across critical infrastructure sectors.

Timeline

  1. Mar 4, 2026

    Organizers set plan for public OT incident scoring

    Project organizers said they aim to publish initial public scores within 12 hours of an OT incident and revise them as more facts emerge. They also discussed possible future refinements such as weighted scoring and trusted "super-users" to improve consistency.

  2. Mar 4, 2026

    Proof-of-concept OT incident scoring site is launched

    A proof-of-concept site for the crowdsourced scoring initiative was launched, allowing OT security professionals to rate historic incidents across severity, reach, and duration, with outliers removed before averaging results. The ICS Advisory Project, founded by Dan Ricci, hosted the site initially.

  3. Mar 4, 2026

    OT Incident Impact Score concept is proposed

    Munish Walther-Puri proposed the concept of an "OT Incident Impact Score," a simple 1-10 framework for communicating the real-world severity of OT cyber incidents to non-technical audiences. Dale Peterson subsequently advanced the idea within the OT security community.

  4. Jan 1, 2024

    Volt Typhoon campaign cited as an OT near-miss example

    The 2024 Volt Typhoon activity was later referenced by OT security experts as an example of an OT-adjacent intrusion that caused major remediation costs despite limited immediate operational disruption. It was used to argue that any future OT incident scoring model should also account for "near misses."

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

March 4, 2026 at 12:00 AM
March 4, 2026 at 12:00 AM
March 4, 2026 at 12:00 AM
March 4, 2026 at 12:00 AM

Related Stories

New OT Security Frameworks Emphasize Incident Impact Scoring and Edge-Based Defense

New OT Security Frameworks Emphasize Incident Impact Scoring and Edge-Based Defense

ICS/OT security practitioners introduced a new framework for communicating the real-world severity of operational technology incidents: the **Operational Technology Incident (OTI) Impact Score**, a “Richter Scale”-inspired scoring system intended to quickly convey business and physical consequences of OT cyber events. The model, created by Digital Bond’s Dale Peterson and slated for release at the *S4x26* conference, is positioned as a way to reduce both overhyped and underreported OT incident narratives and to help executives, governments, insurers, and responders align resources (including ICS and physical response teams) to the actual impact. Separately, Palo Alto Networks Unit 42 described joint research with the **Siemens Cybersecurity Lab** and **Idaho National Laboratory** arguing that disruptive OT incidents are often not “OT-native” but instead begin with upstream **IT compromises** and progress over time toward industrial environments. The research advocates shifting detection and response “left” to the **network edge** between IT and OT, using earlier visibility and predictive threat behavior to turn dwell time into a defensive advantage; detailed findings were published in a companion whitepaper, *Intelligence-Driven Active Defense: Securing Operational Technology Environments*.

1 months ago
OT Security Pushes Beyond CVSS for Risk Assessment

OT Security Pushes Beyond CVSS for Risk Assessment

Operational technology security practitioners are increasingly arguing that **CVSS** is not an adequate way to measure risk in industrial environments, even after the release of **CVSS 4.0**. The reporting says OT defenders view traditional vulnerability severity scoring as poorly suited to environments where safety, uptime, physical process impact, and sector interdependencies matter more than the characteristics of an individual software flaw. Experts cited in the coverage say OT risk assessment needs to focus on **cascading consequences**, cross-sector dependencies, and consequence management rather than trying to refine a vulnerability-centric scoring model. The articles describe a broader shift in OT security thinking: instead of treating CVSS as a universal standard, organizations operating critical infrastructure are being urged to adopt methodologies that better reflect real-world operational impact and the administrative realities of industrial systems.

1 months ago
Industry Pushes NIST to Add More Actionable Detail in SP 800-82 OT Security Rewrite

Industry Pushes NIST to Add More Actionable Detail in SP 800-82 OT Security Rewrite

U.S. **operational technology (OT)** security specialists urged **NIST** to make its forthcoming update to *Special Publication 800-82* significantly more practical and granular, arguing that OT owners and operators need actionable guidance rather than high-level frameworks. The feedback was provided as NIST begins its **fourth revision** of SP 800-82 and solicits private-sector input, reflecting growing maturity and urgency in OT cybersecurity governance. Vendors and practitioners emphasized that OT environments require different approaches than conventional IT, particularly for **vulnerability management**, where standard IT practices may be ineffective or counterproductive in industrial settings. Commenters also called for more **sector-specific guidance** for emerging OT verticals such as **smart building management** and **distributed energy systems** (including **EV charging networks**), and broadly supported NIST’s proposal to move several SP 800-82 appendices online—covering OT security organizations, tools and threats, and catalogs of vulnerabilities and incidents—to keep reference material more current.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.