
During the panel Cybersecurity in critical infrastructures: Modern strategies to protect OT/ICS environments , specialists highlighted the importance of implementing specific strategies for the protection of Operational Technology (OT) environments .
At the event, held as part of the 2nd Scitum Telmex Executive Forum 2026 , they pointed out that, unlike Information Technology (IT) systems, a production incident not only compromises information, but can also cause operational stoppages, sanctions and direct risks to the safety of people, in addition to the need to protect production lines without affecting profitability .
Availability remains a priority in industrial systems. Víctor Anda, director for Latin America at TXOne Networks , explained that protection in this sector focuses on operation.
“It’s not about adapting something that already exists and modifying it for OT. It’s something that has to be born with OT in mind. We can’t isolate a production machine; we have to protect it without compromising its operation,” he stressed.
For his part, Alessandro Galvao do Vale, IoT/OT Security CoE Leader at Scitum, explained that the impact of an attack on critical infrastructure can reach macroeconomic levels , with cases where production stoppages have affected the Gross Domestic Product (GDP) of entire countries. He also indicated that, to integrate security into the value chain , it is vital to translate technical vulnerabilities into business terms.
“When I talk about risks, it’s the common image for everyone: security, finance, operations and general management,” he stated.
David Nieto, Trellix ‘s regional leader , said the gap between available technology and its adoption stems from a fear of disrupting long-standing processes. The proposal is to begin by providing visibility through an architecture and asset map without direct intervention .
Juan Carlos Báez Martínez, head of the Scientific Directorate of the National Guard , proposed institutionalizing capacity-building programs that scale from the individual to the sector level . The goal is to build resilience in the face of a tolerated peace in cyberspace.
“In the midst of a tolerated peace that exists in the cyber environment, it is not about being reactive, but about having sufficient systematic resilience,” he emphasized.
Experts highlighted several solutions for protecting production lines without impacting profitability, such as micro-segmentation and virtual patching technologies , which offer an advanced layer of protection for critical assets, preventing restarts that could halt plant operations for days. In addition, adaptive artificial intelligence (AI) is used, which can counter autonomous attacks and detect vulnerabilities in legacy systems that remain essential for production continuity.
On the other hand, digital twins have become key tools for simulating attacks and testing controls in virtual environments before implementing them on the actual production line, reducing risks and improving incident preparedness. Finally, controlled reactions allow for countering sabotage attempts while maintaining production, simultaneously conducting forensic analysis to strengthen future defenses.
Inaction represents the greatest threat, the experts agreed, and investing in cybersecurity not only reduces exposure but also becomes a competitive advantage . “If I invest, I am less exposed than my competitors who don’t,” summarized Alessandro Galvao do Vale.
Comment and follow us on LinkedIn: @miroslavacallejas / @GrupoT21







