§ 00 · Independent OT/IACS Advisory · Texas LLC · Est. 2021

OT cyber risk, governed against safety, regulation, and operational reality.

NWTS Consulting advises chemical, energy full-stream, wholesale and retail fuel, offshore and maritime, and critical infrastructure operators on operational technology cybersecurity and governance — aligned across the three domains that actually matter to the asset: process and functional safety, regulatory exposure, and operational continuity. Led by a certified ISA/IEC 62443 Cybersecurity Expert and Assessor.

▸ Working frameworks
ISA/IEC 62443 IEC 61508 / 61511 ISA TR84.00.09 ISA-101 / 18.2 NIS2 / SEVESO III 30 CFR 250 MTSA IACS UR E26 / E27 IMO MSC.428(98) NIST CSF / 800-82
▸ § 00 · Index

What brings you here?

Most first-time conversations start with one specific upcoming decision. Choose the role that fits your situation for typical scenarios and starting points — or browse by topic to navigate the practice itself. Top navigation jumps between sections without returning to this index.

▸ By role & situation
▸ By topic
FIG R · 01 OFFSHORE / JACK-UP H DERRICK / DRAWWORKS HELIDECK / SAR QUARTERS 3-LEG JACK-UP · INDEPENDENT-LEG
§ R · 01
Role · Offshore

Drilling contractor or offshore operator.

You operate or contract offshore drilling rigs, production installations, or marine support assets. The cyber regulatory perimeter has moved decisively: IACS UR E26 and UR E27 apply to vessels contracted for construction from 1 July 2024; IMO Resolution MSC.428(98) is now an audit point under the ISM Code Document of Compliance; BSEE has signaled cyber expectations for OCS facilities under 30 CFR 250 and SEMS; MTSA cyber addenda apply where the asset touches U.S. waterfront. Cyber risk on rigs is now a contractual question, a class question, a flag-state question, and a regulatory question — sometimes all four on the same asset.

Offshore drilling platform at sea — subject of rig acceptance, pre-mobilization controls survey, and IACS UR E26 / IMO MSC.428(98) compliance work
▸ PLATE R · 01 Offshore platform · subject of rig acceptance & pre-mobilization survey
JPG · 1600 × 700
▸ ENTRY 01

Rig acceptance survey & pre-mobilization controls verification

Independent assessment of as-built or as-delivered controls against operator and contractor expectations — pre-contract or pre-mobilization, with written reporting that supports the acceptance decision.

▸ ENTRY 02

Newbuild & shipyard controls oversight

On-site oversight during the shipyard period — vendor management, integration assurance, commissioning hand-off, and verification that as-delivered controls match the contracted specification. IACS UR E26 / E27 readiness for newbuilds.

▸ ENTRY 03

BSEE 30 CFR 250 & SEMS cyber readiness

Cyber controls assessment for OCS operators — SEMS program integration, alignment with USCG cyber advisories, and preparedness for the cyber elements increasingly required for safety-critical OCS systems.

▸ ENTRY 04

IMO MSC.428(98) & ISM Code cyber integration

Cyber risk management embedded in the Safety Management System per IMO Resolution MSC.428(98) and MSC-FAL.1/Circ.3 guidance. Document of Compliance audit support; flag-state and class interface.

▸ ENTRY 05

Operator–contractor cyber bridging

Where the rig is contracted by an operator: aligning the cyber expectations of the operator's CSMS with the contractor's actual implementation. Drilling contract addenda, MSA cyber clauses, and contractor cyber maturity validation.

▸ ENTRY 06

Vessel & marine systems security architecture

For vessels and marine support assets: navigation, propulsion, ballast, cargo, and integrated platform management systems. IACS UR E27 onboard-systems alignment and class interface.

▸ Start a conversation Discuss this engagement →
FIG R · 02 PROCESS / DIST. SIS FIC DIST. COLUMN SHELL & TUBE STRIPPER PRODUCT SIS / SIL-2
§ R · 02
Role · Chemical / Process

Chemical or process plant operator.

You operate a chemical, petrochemical, refining, or process-manufacturing site. NIS2 has tightened obligations across EU operations and brings personal liability for management bodies. SEVESO III makes security-and-safety crossover explicit for major-accident hazard sites. OSHA PSM applies wherever cyber compromise can affect mechanical integrity. And pre-acquisition diligence on a target asset requires a fundamentally different lens than steady-state operations.

Chemical or refining plant — distillation columns, piping, DCS control room — subject of cyber-PHA, NIS2 pre-assessment, SEVESO III safety-cyber coupling, and CSMS development work
▸ PLATE R · 02 Process plant or DCS · subject of cyber-PHA, CSMS development & SEVESO III review
JPG · 1600 × 700
▸ ENTRY 01

NIS2 / UK NIS pre-assessment

Gap analysis against essential or important entity obligations (NIS2 Article 21), risk-management measure mapping, and incident-reporting readiness. UK NIS Regulations 2018 (as amended) for UK operations.

▸ ENTRY 02

SEVESO III safety-cyber coupling review

Where cyber compromise can drive major-accident hazard scenarios: integration of cyber controls into the safety case and the inspection regime. Bridging the cybersecurity and process-safety domains explicitly required by IEC 61511 and TR84.00.09.

▸ ENTRY 03

Cyber-PHA & SL-T determination

Consequence-driven cyber hazard analysis run alongside the existing PHA, producing target security levels engineering and operations both accept. SIS interaction reviewed in line with IEC 61508 / 61511 and ISA TR84.00.09.

▸ ENTRY 04

62443-2-1 CSMS development or refresh

End-to-end Cybersecurity Management System aligned with corporate ISMS, the site safety management system, and the corporate risk function. Multi-site rollout where the practice spans more than one facility.

▸ ENTRY 05

Pre-acquisition site cyber diligence

Target site assessment for chemical or process plant acquisitions: estate inventory, hidden liabilities, regulatory exposure, integration risk pricing. Pre-LOI and pre-close phases.

▸ ENTRY 06

OSHA PSM cyber exposure analysis

29 CFR 1910.119 implications wherever cyber affects mechanical integrity, MOC, or incident investigation. Cyber-affected safety controls mapped to PSM elements that the regulator will inspect.

▸ Start a conversation Discuss this engagement →
FIG R · 03 UW / LOSS CURVE PROBABILITY DENSITY → CONSEQUENCE SEVERITY → OPERATIONAL REGULATORY SAFETY MODE CYBER-PHYSICAL TAIL · BI / CBI
§ R · 03
Role · Underwriting

Insurance underwriter or reinsurer.

You're underwriting or renewing cyber and property coverage for an industrial asset — a chemical plant, an offshore rig, a fuel terminal, a process facility. Standard IT-control scoring doesn't tell you what loss-scenario you're actually pricing. You need defensible, asset-specific risk assessment that ties cyber to the operational, safety, and regulatory consequence categories the policy actually covers.

▸ ENTRY 01

ISA 62443-aligned risk assessment for new rig coverage

Risk assessment formatted for new-rig binding or renewal: 62443-3-2 zone-and-conduit risk picture, mapped explicitly to BI, CBI, safety, and regulatory consequence categories rather than generic control scores.

▸ ENTRY 02

Plant-asset cyber loss-scenario library

OT-specific loss scenarios for chemical, refining, process, and energy assets — grounded in real operational consequence categories, not generic IT loss patterns.

▸ ENTRY 03

Triad-aligned consequence categorization

Cyber risk explicitly mapped to safety, regulatory, and operational consequence categories — the categorization the underwriter, the broker, and the reinsurer can all audit against the policy.

▸ ENTRY 04

BI / CBI scenario modeling for industrial perils

Business-interruption and contingent-business-interruption scenarios driven by OT compromise rather than IT loss — explicitly differentiating cyber-physical perils from data-only events.

▸ ENTRY 05

Pre-binding cyber diligence

Independent OT cyber diligence before policy issuance — particularly on offshore rigs, terminal assets, refining facilities, and chemical sites where the loss scenario can include process-safety consequence.

▸ ENTRY 06

Renewal-cycle reassessment

Annual or renewal-cycle reassessment of insured assets: control evidence, residual risk delta, regulatory delta (NIS2, IACS UR E26, 30 CFR 250 evolutions). What's changed since last bind.

▸ Start a conversation Discuss this engagement →
FIG R · 04 M&A / TARGET ACQUIRER ESTATE TARGET ESTATE INTEGRATION → HIDDEN LIABILITY · LEGACY DCS · UNDOCUMENTED ACCESS · ITAR
§ R · 04
Role · Transactions

M&A counsel, PE sponsor, corporate development.

You're evaluating a target asset, business unit, or platform — chemical, energy, downstream fuel, offshore, marine, or process manufacturing. OT cybersecurity carries hidden liabilities that don't surface in a standard quality-of-earnings analysis: legacy DCS estates, undocumented remote access, regulatory exposure that conditions exit. The deal calendar and the audience that has to sign — sponsor, lender, counsel — drive the deliverable format.

▸ ENTRY 01

Pre-LOI OT technology diligence

First-pass diligence based on VDR materials and limited management access — sized for the early-stage decision to proceed or pass. Identifies the deal-breakers before significant diligence cost is committed.

▸ ENTRY 02

VDR review & target site walk-down

Full diligence including site walk-downs once exclusivity is in place — control architecture, segmentation, vendor inventory, regulatory posture, residual risk quantification.

▸ ENTRY 03

Hidden-liability identification

The legacy controls, the undocumented remote access, the ITAR exposure, the cyber-affected safety controls that condition deal terms or require disclosure. The line items that shift the price or kill the deal.

▸ ENTRY 04

Integration-risk pricing

Quantification of post-close cyber and controls integration cost — the figure that should appear in the sponsor's underwriting model, not surface as a surprise in the first 100 days.

▸ ENTRY 05

Site-portfolio acquisition diligence

Multi-site transactions: wholesale fuel rack networks, retail forecourt portfolios, multi-plant chemical platforms, offshore rig fleets. Sampling strategy, tiered diligence depth, portfolio-level liability picture.

▸ ENTRY 06

Post-close 100-day cyber plan

Integration support post-close: prioritized remediation, governance integration, board reporting cadence. The plan the sponsor or new owner needs to execute against the diligence findings.

▸ Start a conversation Discuss this engagement →
FIG R · 05 GOV / KRI FLOW BOARD / AUDIT COMMITTEE CISO / EXECUTIVE ENGINEERING OPERATIONS COMPLIANCE KRI · RISK APPETITE QUARTERLY MONTHLY CONTINUOUS NIS2 ART. 20 GOVERNANCE REPORTING CADENCE: BOARD ↑ EXECUTIVE ↑ OPERATIONAL TIERS
§ R · 05
Role · Governance

Board or audit committee.

You need quarterly OT risk reporting that the board can act on. Not vanity dashboards. Not generic framework score-cards that reset every audit cycle. The reporting must tie cyber to the safety, production, and regulatory exposure the board already owns — and it must produce defensible answers to the questions directors are increasingly being asked, including under NIS2 Article 20 governance obligations.

▸ ENTRY 01

KRI design & risk-appetite framing

Key Risk Indicators sized to the board's stated risk appetite, mapped to safety, production-continuity, and regulatory consequence rather than to control-coverage percentages.

▸ ENTRY 02

Quarterly board reporting cadence

Reporting layer the board reads, not the binder it ignores. Calibrated to engineering depth where the audit committee can absorb it, with clean escalation paths when material change occurs between cycles.

▸ ENTRY 03

Independent third-party assessment

For when the board needs an external voice — pre-CISO mandate baseline, controversy resolution, or an annual independent posture review against the operator's own self-assessment.

▸ ENTRY 04

NIS2 governance compliance support

For EU board members and management bodies: documenting discharge of NIS2 Article 20 governance obligations — oversight, training, and personal-liability framework. Increasingly material in EU operations.

▸ ENTRY 05

M&A board diligence support

Board-facing deliverables for transaction approval: cyber diligence summary, integration-risk price, conditions to close, post-close remediation timeline. Calibrated to the deal-approval audience.

▸ ENTRY 06

Pre-CISO mandate baseline

Independent assessment before a new CISO mandate begins — what the incoming executive is inheriting vs. what the org tells itself. Quarterly checkpoint thereafter, against the original baseline.

▸ Start a conversation Discuss this engagement →
FIG R · 06 EXEC / PURDUE ZONES L4 / 5 ENTERPRISE · BUSINESS NETWORK L3.5 IDMZ · OT-IT BOUNDARY · SR / 62443-3-3 L3 SITE OPERATIONS · HISTORIANS · ENGINEERING L2 SUPERVISORY · DCS / SCADA / HMI L1 / 0 CONTROL · PLC · BPCS · SIS · FIELD INSTRUMENTS SIS → POLICY / IT → CHOKE POINT → OT BACKBONE → ZONES → SAFETY-CRITICAL ZONE & CONDUIT MODEL · ISA/IEC 62443-3-2 / 3-3 · PURDUE-ALIGNED
§ R · 06
Role · Executive

Incoming or established CISO.

You're starting a new mandate, or you're in one and you need a defensible independent baseline. The first 90 days will determine whether the next 24 months are productive or remedial. You need an honest, independent picture of what you've inherited — what's actually true vs. what the org tells itself — and a quarterly checkpoint thereafter that lets you measure progress against reality, not against shifted goalposts.

▸ ENTRY 01

Pre-role baseline assessment

Independent OT cyber posture assessment before or at the start of the mandate. What the actual estate is, what the actual control reality is, what the actual regulatory exposure is. Privileged to the executive, scoped for honest answers.

▸ ENTRY 02

100-day plan validation

Independent review of the 100-day plan once drafted — does it address the actual issues, or the ones the organization is comfortable hearing about. A reality check before the plan goes to the board.

▸ ENTRY 03

Quarterly checkpoint cadence

Independent quarterly checkpoint thereafter — progress measured against the original baseline, not against shifted goalposts or reframed metrics.

▸ ENTRY 04

Independent OT estate review

Annual or on-demand independent estate review — what's running, what's exposed, what's drifting from spec, what's been added without the program knowing.

▸ ENTRY 05

Board reporting cadence design

Setting up the reporting cadence the board will actually read and act on — KRI library, escalation paths, and risk-appetite calibration. Calibrated to the audit committee's existing risk vocabulary.

▸ ENTRY 06

Strategic direction setting

Strategic positioning of the OT cyber program against safety, regulatory, and operational reality — what the program should look like in 24 months and how to get there from where it is today.

▸ Start a conversation Discuss this engagement →
§ 01
The Approach

Three domains. One coordinated risk picture.

Most OT cybersecurity work is delivered in isolation — assessed against a single framework, scored, and handed back. NWTS Consulting works the way industrial assets actually run. Every engagement evaluates cyber risk simultaneously against process and functional safety, regulatory exposure, and operational continuity. The output is one defensible risk picture that engineering, compliance, operations, and the board can each use without reconciling three different reports.

▸ I · DOMAIN ONE
Safety
Process safety, functional safety, and the cyber-safety coupling that IEC 62443-3-2 actually requires.
▸ II · DOMAIN TWO
Regulatory
Multi-jurisdictional compliance, sequenced so the operator pays for each control once.
▸ III · DOMAIN THREE
Operational
Production continuity, asset rhythms, and the engineering reality of running plants and platforms.

Cyber risk is assessed against the operator's existing process hazard analysis, LOPA, and SIS design — not in parallel to them. Where the asset is offshore or marine, the work integrates with SEMS, the ISM Code, and class-society expectations. Findings route into the same safety case the regulator already reads.

  • IEC 61508 / 61511 / ISA 84 functional safety
  • ISA TR84.00.09 cyber-functional safety
  • Cyber-PHA aligned to existing PHA & LOPA
  • SIS & BPCS interaction review
  • BSEE SEMS & ISM Code integration
  • IMO MSC.428(98) & IACS UR E26 / E27

Multi-framework gap analysis with sequencing logic — identifying overlapping obligations across NIS2, SEVESO III, OSHA PSM, MTSA, 30 CFR 250, TISAX, and TSA Security Directives so that one control set, properly evidenced, satisfies multiple regulators rather than being re-engineered for each.

  • NIS2 / UK NIS / SEVESO III
  • OSHA PSM (29 CFR 1910.119)
  • MTSA · 33 CFR 105–106
  • BSEE 30 CFR 250 · USCG advisories
  • TISAX · ITAR · TSA SDs

Roadmaps that respect plant turnaround windows, drilling and voyage cycles, vendor patch cadences, and engineering MOC. Recommendations are sequenced for the asset's actual operating rhythm — not a generic remediation calendar that engineering will quietly ignore.

  • Turnaround & outage-aware sequencing
  • Drilling & voyage-cycle planning
  • OT–IT operating model & RACI
  • Vendor & supply-chain cadence
  • Production continuity / BI modeling
§ 02
Practice Areas

Six domains where OT and governance intersect.

Every engagement starts in one of these six domains and frequently spans several. The work is technical when it must be and executive when it should be — the through-line is defensible decisions, documented to the standard the auditor will reach for and tied to the consequences the operator actually owns.

01 / 06

OT Cyber Risk

Quantitative and qualitative risk assessment grounded in ISA/IEC 62443-3-2, NIST SP 800-30, and SP 800-82 Rev. 3, mapped to plant safety consequence and tied to the operator's existing process hazard analysis. Results route into the same risk register the COO already reads.

  • Zone & conduit risk assessment
  • Consequence modeling (HAZOP-aligned)
  • SL-T determination
  • Cyber-PHA integration
02 / 06

Governance & CSMS

Cybersecurity Management Systems built to ISA/IEC 62443-2-1 and NIST CSF 2.0, scoped to operate alongside the corporate ISMS, the site's safety management system, and the corporate risk function. Not a binder — a working operating system for OT security.

  • CSMS development & rollout
  • Policy / standard / procedure stack
  • RACI & OT–IT operating model
  • Maturity baselining & uplift roadmap
03 / 06

Compliance & Tactical Compliance

Translating regulatory text into engineering decisions. NIS2 essential-entity obligations, SEVESO III safety-and-security crossover, 30 CFR 250 for offshore, MTSA for waterfront and marine, TISAX for OEM supply, ITAR for technical data, OSHA PSM where cyber affects mechanical integrity.

  • Multi-jurisdictional gap analysis
  • Tactical remediation sequencing
  • Evidence architecture for audit
  • Regulator & notified-body interface
04 / 06

OT Security Architecture

Reference architectures for level-0 to level-3.5 segmentation, secure remote access, data diode and DMZ patterns, IDMZ design, behind-the-meter generation and DER assets, and integration with safety instrumented systems. Vendor-neutral, defensible, and built to survive the next plant turnaround.

  • Purdue / 62443 zone design
  • Secure remote access (vendor & staff)
  • SIS / BPCS interaction review
  • Behind-the-meter & DER architectures
05 / 06

Board, Diligence & Underwriting

Pre-acquisition technology diligence, post-deal integration risk, underwriter-grade cyber risk assessments, and CISO benchmarking before or during a new mandate. Reporting calibrated to the audience — engineering depth for engineers, decision clarity for boards, loss-scenario rigor for underwriters.

  • M&A OT cyber diligence
  • Underwriting risk assessment
  • Board reporting & KRI design
  • Incoming-CISO baseline & 100-day plan
06 / 06

Sector Specialty Work

Deep-sector engagements where the asset class itself shapes the methodology. Offshore drilling and production, marine and shipyard, wholesale fuel rack and terminal automation, and retail fuel and forecourt OT. Each carries its own regulator, its own controls vocabulary, and its own operating cadence.

  • Offshore rig & installation diligence
  • Shipyard controls oversight
  • Fuel terminal & rack automation
  • Retail fuel & forecourt OT
§ 03
Capabilities

Specific work, specifically scoped.

A non-exhaustive index of the deliverables most often requested. Each is sized to the asset, the regulator, and the decision the client is trying to defend. Every capability is delivered against the safety / regulatory / operational triad described above.

C-01
CSMS Development
End-to-end Cybersecurity Management System aligned to ISA/IEC 62443-2-1 and NIST CSF 2.0, integrated with corporate ISMS where present, and adapted to site-level operating reality.
62443-2-1CSF 2.0ISO 27001NIS2 Art. 21
C-02
Cyber-PHA & SL-T Determination
Consequence-driven cyber hazard analysis run alongside or against the existing PHA, producing target security levels that engineering and operations both accept. SIS interaction reviewed in line with IEC 61511 and ISA TR84.00.09.
62443-3-2HAZOP integrationLOPA-awareIEC 61511TR84.00.09
C-03
Zone & Conduit Architecture Review
Reference architecture against the operator's actual network, with prioritized findings, segmentation roadmap, and a turnaround-aware implementation plan.
Purdue modelIDMZ62443-3-3 SR mappingNIST 800-82r3
C-04
M&A OT Technology Diligence
Pre-LOI through post-close: estate inventory, hidden-liability identification (legacy DCS, undocumented remote access, regulatory exposure), integration risk pricing.
VDR reviewSite walk-downQoE adjustment
C-05
Underwriting & Insurance Risk Assessment
Cyber risk assessment formatted for insurance underwriters and reinsurers, with loss-scenario modeling for industrial perils, OT-specific control evidence, and explicit linkage of cyber risk to safety, regulatory, and operational consequence categories.
BI / CBI scenariosOT controls evidenceTriad-aligned
C-06
Board Reporting & KRI Design
A reporting layer the board will actually read — tying OT risk indicators to safety, production continuity, and regulatory exposure rather than vanity dashboards.
Risk appetite framingKRI libraryQuarterly cadence
C-07
CISO Benchmarking & 100-Day Support
Independent baseline before a CISO mandate begins and quarterly checkpoint thereafter. What's actually true vs. what the org tells itself.
Pre-role baseline100-day planQuarterly check-in
C-08
Behind-the-Meter Grid Security
Security architecture for behind-the-meter generation, microgrid, BESS, and DER assets where the operator is now both consumer and producer.
IEEE 1547NERC CIP-awareMicrogrid & DER
C-09
Audit & Assessment Support
Pre-audit dry-runs, evidence package construction, and on-site support during regulator or notified-body engagement.
NIS2TISAXMTSASEVESO III30 CFR 250
C-10
Independent Third-Party Assessment
Independent ISA/IEC 62443 assessment delivered by a certified assessor — for the operator who needs a defensible second opinion, or the regulator who needs an independent voice.
62443-2-162443-2-462443-3-3
C-11
Offshore Rig Selection & Installation Diligence
Systems and controls security diligence for offshore drilling rigs and production installations — pre-contract rig selection assessment, written reporting against operator and contractor expectations, and post-mobilization controls verification.
Rig selection reportDrilling controlsBSEE SEMS30 CFR 250
C-12
Shipyard Security & Controls Oversight
Security and controls oversight during newbuild, conversion, and major refit periods — vendor management, integration assurance, commissioning hand-off, and verification that as-delivered controls match the contracted specification.
Newbuild oversightRefit & conversionClass societyCommissioning
C-13
MTSA & 30 CFR 250 Cyber Compliance
Cyber controls assessment and compliance support for MTSA-regulated waterfront facilities and BSEE-regulated offshore installations, including alignment with USCG cyber advisories and recent regulatory addenda.
MTSA · 33 CFR 10533 CFR 10630 CFR 250USCG cyber
C-14
Fuel Terminal & Rack Automation Diligence
Cybersecurity assessment and architecture review for wholesale fuel terminals and loading racks — terminal automation systems, custody-transfer integrity, BOL data flows, and the tax-data accuracy that flows from controls integrity. The terminal automation system is the system of record for IFTA, federal excise, and state motor fuel tax obligations; cyber integrity and tax integrity are the same problem.
Terminal automationCustody transferBOL integrityIFTA / motor fuel taxLoading rack controls
C-15
Retail Fuel & Forecourt OT
OT and controls assessment for retail c-store and forecourt environments — ATG (automatic tank gauging), dispenser networks, POS-to-forecourt integration, environmental compliance instrumentation (Stage II vapor, leak detection), and the EMV/PCI overlay where the OT and payment estates intersect.
ATGDispenser networksPOS integrationEMV / PCIStage II vapor
C-16
Site Acquisition & Greenfield Cyber Diligence
Cyber and controls diligence for site-portfolio acquisitions and greenfield builds — terminal acquisitions, retail-network rollups, brownfield re-instrumentation, and new-site automation specifications. Inherited liability surfaced before close; control architecture set at design time, not retrofitted.
Portfolio acquisitionGreenfield designBrownfield re-instrumentationPre-close diligence
§ 04
Standards & Regulations

Frameworks the practice operates within.

A working catalogue, not an aspirational one. Each framework below is one we routinely apply, map across, or interpret for clients — and where multiple jurisdictions collide, sequence so the operator isn't paying twice for the same control.

▸ § 04.A

Industrial Cybersecurity & Functional Safety

The technical core. Where cyber risk and process-safety integrity meet. The four standards in this group are routinely cross-applied in chemical, energy, and offshore engagements — and the cyber-functional-safety bridge is the discipline most operators still under-invest in.

▸ STD-01
ISA/IEC 62443
The reference standard for IACS security. Applied across the -2-1, -2-4, -3-2, -3-3, and -4-x parts as scope dictates.
▸ STD-02
IEC 61508
Functional safety of E/E/PE safety-related systems — the parent functional-safety standard. Applied where SIL determination, hardware fault tolerance, and systematic capability are in scope.
▸ STD-03
IEC 61511 / ISA 84
Functional safety for the process industries (sector-specific application of IEC 61508). The cyber-safety coupling that IEC 62443-3-2 explicitly references.
▸ STD-04
ISA TR84.00.09
Cybersecurity related to the functional safety lifecycle — the explicit bridge between ISA 84 / IEC 61511 functional safety and ISA/IEC 62443 cyber. The reference document for cyber-PHA work in process operations.
▸ § 04.B

Human Factors & Operator-Facing Standards

The standards that codify the discipline most chemical and process operators have not yet absorbed at scale. See § 05 Forward Practice for the diagnostic.

▸ STD-05
ISA-101 HMI
Human-machine interface design for process automation. Operator situational awareness, graphic hierarchy, and alarm presentation.
▸ STD-06
ISA-18.2 Alarm Mgmt.
Management of alarm systems for the process industries. Rationalization, prioritization, and the cognitive ergonomics of alarm flood.
▸ STD-07
ISO 11064
Ergonomic design of control centres. Control room layout, workstation design, and operator-facing system integration.
▸ § 04.C

Process Safety & Site Regulation

The site-level safety regulation regimes where cyber compromise can drive consequence into safety-relevant scope. Increasingly material under SEVESO inspection and OSHA enforcement.

▸ REG-01
SEVESO III
Directive 2012/18/EU. Major-accident hazard sites where cyber compromise can drive safety-relevant consequence. EU competent-authority inspection regime.
▸ REG-02
OSHA PSM
29 CFR 1910.119. Where mechanical integrity, MOC, and incident investigation intersect with cyber-affected safety controls.
▸ § 04.D

Offshore, Marine & Maritime

The live regulatory and class perimeter for offshore drilling, production, and marine assets. IACS UR E26 / E27 became mandatory for vessels contracted for construction from 1 July 2024; IMO MSC.428(98) is now embedded in the ISM Code as a Document of Compliance audit point.

▸ REG-03
BSEE 30 CFR 250
Outer Continental Shelf operations. SEMS program scope and the cyber controls increasingly required for safety-critical OCS systems.
▸ REG-04
MTSA
33 CFR 105–106. Maritime Transportation Security Act — waterfront facilities and OCS facilities, with the recent cyber addenda and USCG cyber advisories.
▸ REG-05
IACS UR E26
Cyber Resilience of Ships. Mandatory for vessels contracted for construction from 1 July 2024. Class-society driven; applies at newbuild and triggers shipyard oversight obligations.
▸ REG-06
IACS UR E27
Cyber Resilience of On-board Systems and Equipment. Companion to UR E26 — the supplier-side cyber requirements for control, navigation, propulsion, and integrated systems.
▸ REG-07
IMO MSC.428(98)
Maritime Cyber Risk Management. Embedded in the ISM Code from 1 January 2021 as a Document of Compliance audit point. Applies to all SOLAS vessels via the Safety Management System.
▸ REG-08
MSC-FAL.1/Circ.3
IMO Guidelines on Maritime Cyber Risk Management. The interpretive guidance underpinning MSC.428(98) implementation in the SMS.
▸ § 04.E

Cyber & Critical Infrastructure Regulation

The horizontal regulatory regimes governing cyber risk management, incident reporting, and product-side security obligations. Multi-jurisdictional sequencing matters here — the same control set, properly evidenced, can satisfy more than one regulator.

▸ REG-09
NIS2 Directive
EU Directive 2022/2555. Essential and important entity obligations, risk-management measures (Art. 21), management-body oversight (Art. 20), and incident reporting.
▸ REG-10
UK NIS Regulations
UK NIS Regulations 2018 (as amended). Applied for UK OES and OES-equivalent operator engagements.
▸ REG-11
EU CRA
Cyber Resilience Act — product-side obligations for OT vendors; advisory for operator vendor-management.
▸ REG-12
TSA Security Directives
TSA Pipeline and Rail Security Directives. Designated owner / operator obligations and incident-reporting timelines.
▸ STD-08
TISAX
VDA ISA-based assessment for the automotive supply chain. Information-security label preparation and prototype-handling.
▸ REG-13
ITAR
22 CFR 120–130. Export-controlled technical data handling within OT and engineering environments.
▸ § 04.F

Risk Methodology & Supporting Standards

The methodology stack and management-system standards used as translation layers, evidence frameworks, and ISMS interfaces. Rarely the primary driver, regularly the supporting reference.

▸ STD-09
NIST CSF 2.0 / 800-82r3
CSF 2.0 as translation layer for U.S. clients; SP 800-82 Rev. 3 for ICS-specific guidance.
▸ STD-10
NIST 800-30 / 800-53
Risk assessment methodology and federal control catalogue, applied where enterprise controls or U.S. federal scope is in play.
▸ STD-11
ISO/IEC 27001 / 27002
Where corporate ISMS already exists, the OT CSMS is built to interoperate — not duplicate.
▸ STD-12
NERC CIP
For behind-the-meter and DER work where bulk-electric-system interaction or aggregator status is in scope.
§ 05
Forward Practice

Where the practice is headed.

Compliance is the floor, not the ceiling. NWTS Consulting maintains an active forward practice in two areas where the next decade of industrial cyber will be decided: human factors in operating control systems — drawing on the aviation and academic lineage that defined the discipline, and which the chemical and process industries have so far largely left on the table — and the trajectory of Industry 5.0. These work areas inform every other engagement.

OT cybersecurity has spent two decades catching up to the digital edge of the plant. The next decade is about catching up to its human edge.
Aircraft cockpit / flight deck — the operating environment in which Crew Resource Management was developed. The discipline migrated from aviation into refinery operations and oil & gas through Helmreich, Schwartz, and Dingee.
▸ PLATE F Aviation flight deck · origin of CRM · the lineage that crossed into process operations
JPG · 1600 × 700
▸ Now · Today's frontier

Human factors in industrial systems.

Most OT incidents touch a human decision somewhere — an alarm flood that obscured the warning, an HMI that confused the response, a remote-access procedure bypassed because it was operationally awkward. The discipline that takes this seriously was not invented in industrial cyber. It came out of aviation — military and commercial — through the academic work that turned post-accident analysis into a body of practice. The chemical and process industries have not absorbed it at scale, despite owning the very standards (ISA-101, ISA-18.2) that codify parts of it. The standards sit on the shelf; the discipline that animates them has stayed thin on the ground.

The practice draws on this heritage and applies it to OT cybersecurity: designing systems and procedures around predictable human error rather than expecting the operator to be the infinitely robust last line of defense. Cyber risk gets more durable when the human-facing surface is engineered to ISA-101, ISA-18.2, and ISO 11064 — and softer when it isn't.

  • CRM heritage applied to control rooms
  • System 1 / System 2 cognition in operations
  • Checklist optimization & programming for human error
  • Alarm management & rationalization (ISA-18.2)
  • HMI design & graphic standards (ISA-101)
  • Control room ergonomics (ISO 11064)
  • Mode confusion & automation surprise
▸ Intellectual lineage Drawing explicitly from Dr. Robert Helmreich (foundational Crew Resource Management and the Line Operations Safety Audit), Douglas Schwartz at Flight Safety International (CRM cross-pollinated from the cockpit into refinery operations), and Andrew Dingee, airline training captain and author of Delivering the Right Stuff (CRM, System 1 / System 2 cognition, checklist optimization, and "programming for human error" applied to oil and gas).
▸ Next · Where it's heading

The course toward Industry 5.0.

Industry 4.0 was a layer of networked automation and the data fabric above it. Industry 5.0 is the corrective: human-centric, resilience-oriented, and sustainable by design. For OT cybersecurity that means human-machine teaming with auditable authority boundaries, cobot integration that doesn't compromise SIS functions, AI-assisted operations under defensible human oversight, and resilience that survives the operational year rather than just the audit window. The advisory work happens now, before the regulator catches up.

  • Human-machine teaming & authority limits
  • Cobot integration & SIS coupling
  • AI-assisted operations under human oversight
  • Resilient & adaptive operations
  • Sustainable automation by design
  • EU Industry 5.0 framework alignment
§ 06
Engagement Models

Three ways to work together.

Every engagement is bespoke, but most map to one of three commercial structures. Tell us the decision you're trying to make and we'll tell you which model fits.

▸ Model A · Project
Defined-Scope Project

Fixed-scope, fixed-fee work with a defined deliverable. Best for assessments, architecture reviews, CSMS builds, rig selection reports, terminal automation reviews, and audit-readiness sprints.

  • 2–16 week timelines
  • Discrete deliverable set
  • Site & remote work
▸ Model B · Retainer
Fractional / Advisory Retainer

Ongoing senior advisory presence — for the operator who needs the perspective without the headcount. Includes board reporting, KRI cadence, on-call regulatory interpretation, and shipyard or turnaround period oversight.

  • Monthly retainer
  • Defined hour envelope
  • Quarterly board cadence
▸ Model C · Diligence
Transaction & Underwriting

Time-boxed diligence work for M&A counsel, PE sponsors, underwriters, and reinsurers — including site-portfolio and terminal acquisitions. Reporting calibrated to the deal calendar and the audience that has to sign.

  • NDA-first, fast-start
  • VDR & site walk-down
  • Counsel-routed deliverables
§ 07
About the Practice

Built by a practitioner, run for the operator.

NWTS Consulting is the technical consulting division of Northwest Technical Services LLC, a Texas limited liability company headquartered in Magnolia, Texas. The practice was established in 2021 and reorganized as an LLC to deliver focused, vendor-neutral OT/IACS cybersecurity, governance, and risk advisory to asset owners and operators in regulated industries.

The practice is built around a simple premise: OT cyber risk is fundamentally an engineering problem with a governance wrapper, and it cannot be managed apart from the safety and regulatory regimes the asset already lives within. Every engagement aligns cyber to safety, regulatory, and operational consequence simultaneously — producing a coordinated risk picture that engineering, compliance, and operations all defend together.

Direct hands-on experience with OT/IACS environments spans chemical manufacturing; energy full-stream including downstream wholesale fuel rack and terminal operations and retail forecourt OT; offshore drilling and production; marine and shipyard; process and discrete manufacturing; and site acquisition, architecture, automation, and compliance work across new-site and portfolio-acquisition contexts.

The forward practice in human factors and Industry 5.0 is deliberate, and pointed. The chemical and process industries have engaged with the human factors discipline far less than they should have — and OT cybersecurity that ignores the operator and the trajectory of human-centric automation will age badly.

Engagements are scoped to the asset, the regulator, and the decision being made. Where the work calls for capabilities or credentials beyond those carried in the practice, NWTS Consulting assembles teams from a curated network of senior independent practitioners — each engagement disclosing the named specialists involved, with the client approving every individual before commencement. The practitioner the client scopes with is the practitioner who delivers; subcontracting, where it occurs, is declared up-front.

▸ On disclosure

Statement of Qualifications, individual practitioner credentials, professional references, and insurance documentation are furnished to qualified prospects under NDA. A consulting practice that advises on cyber risk and social engineering should not itself be a soft target — the absence of detailed practitioner profiles published online is a deliberate operational control, not an oversight.

§ 08
Engage

Start with the decision you're trying to make.

Most useful first conversations are 30 minutes, under NDA, and focused on a specific upcoming decision: an audit, an acquisition, a rig selection, a shipyard period, a terminal due diligence, a board cycle, a regulator inquiry, a new role. Send a one-paragraph note — we'll respond within one business day.

▸ Direct contact@nwtserv.com

For new engagements, diligence inquiries, and counsel-routed introductions. Encrypted email available on request — PGP key on file. Statement of Qualifications and Certificate of Insurance furnished on request.

▸ Office Magnolia, Texas

Northwest Technical Services LLC · NWTS Consulting division. Texas-headquartered, U.S.-based. Engagements delivered globally; site work scheduled around plant turnaround, drilling, terminal, and shipyard timelines.

▸ NWTSERV.COM · NWTS CONSULTING · EST. 2021