Best practice 2: Focus cybersecurity risk management on the concept–pre‑FEED window
Industrial projects follow a predictable lifecycle and the window where cyber risk can be most effectively reduced is narrow. By the end of pre‑FEED, teams have typically locked in:
Because OT systems are long‑lived and tightly coupled to physical processes, these choices are difficult, and sometimes impossible, to reverse once assets are operational.
Best‑in‑class organizations:
Best practice 3: Avoid relying on IT controls to compensate for design decisions
In OT environments, cybersecurity is inseparable from engineering design. Modern control systems often include:
Embedded operating systems
Remote management interfaces
APIs and default enterprise or cloud connectivity
These features expand attack surfaces regardless of intent. When cybersecurity is addressed late, teams rely on compensating IT controls to manage exposure created upstream. Retrofitting segmentation or tightening access post‑commissioning often requires outages, revalidation and complex coordination, increasing both cost and cyber risk.
Best practice organizations:
Best practice 4: Establish clear ownership for early cybersecurity requirements
Early integration often fails because accountability is fragmented. Survey respondents reported responsibility spread across:
Only 4% report shared responsibility, while 10% report no clear owner at all. Without clear ownership, cybersecurity requirements are inconsistently applied or omitted entirely from basis‑of‑design documents, procurement criteria and acceptance testing plans.
Best‑practice organizations:
Assign explicit ownership for cybersecurity during capital planning
Embed requirements into contracts, specifications and acceptance criteria
Best practice 5: Take the cybersecurity business case to the capital committee
Nearly half of respondents (49%) have never compared the cost of early cybersecurity integration with the cost of retrofitting later. When this tradeoff is not quantified, organizations tend to optimize for initial project cost, unintentionally accepting higher lifecycle exposure.
The survey shows what drives adoption:
That business case is not about tools. It is about lifecycle outcomes: fewer emergency engineering cycles, smoother commissioning, reduced downtime exposure and lower long‑term operational risk.
Bottom line for cyber risk management
In industrial environments, cyber risk is not something organizations patch in after the fact. It is designed in or designed out through capital decisions made early in the project lifecycle.
Black & Veatch’s industrial cybersecurity team helps organizations integrate cybersecurity early into project planning, engineering governance and capital execution, where those risk shaping decisions are made. By aligning cybersecurity with architecture, delivery constraints and long-term operational realities, we help asset owners develop systems that are more resilient, operable and defensible over their full lifecycle, reducing downstream risk, rework and disruption before assets ever go live.
The Secure by Design in Industrial Projects guide translates these best practices into execution frameworks, checklists and survey‑backed insights for capital project teams.
Download the guide to support early cybersecurity integration in your next project.