The first step in securing OT networks is gaining full visibility into all assets, then segmenting them based on workflows ...