
A ransomware attack locked tenants out of a commercial office building for three days. Four major tenants cited the incident when they didn't renew their leases. The financial hit? Over $2 million in losses and litigation. This happened to a real building, and stories like it are becoming common enough that savvy tenants now ask about OT security before signing leases.
These stories—and practical solutions—came from a recent NexusCon session where building owners, consultants, and technology providers gathered to talk about what's actually happening in the field. The news isn't all bad. Lendlease successfully secured 19 buildings covering 1.1 million square feet in under six months. Actimeta has developed frameworks for triaging thousands of vulnerabilities into manageable priorities. And multiple owners shared practical steps that work without requiring unlimited budgets or armies of cybersecurity experts.
This article covers both the horror stories and the playbook for fixing them.
It's 4 a.m. The first office worker arrives at the building entrance. The door won't unlock. By 6 a.m., there's a line stretching down the block.
The access control system has been ransomwared.
The property management company gets the emergency call around 6:30. By 9 a.m., the building owner is staring at an impossible choice: pay $7,200 in Bitcoin to criminals, or pay $65,000 to their vendor—plus burn countless staff hours—rebuilding the system from scratch.
This story comes from Joe Gaspardone, COO at Montgomery Technologies, who's spent 15 years turning tangled building networks into secure, organized systems. He's seen this scenario play out multiple times. The access control incident? Four major tenants left when their leases ended, and they specifically mentioned the hack as a reason they didn't renew.

Worse stories exist. An air-gapped BMS—supposedly unhackable because it had no internet connection—got infected when an engineer plugged in a thumb drive. No internet meant no alerts. The malware spread to every controller, burrowing into device firmware. Cost to fix: $200,000 to rip out, replace, and restore. Plus significant rent credits to tenants who suffered through days of comfort issues.
Elevators have been ransomwared. Multiple times.
Lobby directories have displayed pornography until someone physically disconnected them. Cost to remediate: $7,400.
Security cameras got quietly hacked and accessed for months. Two cases of identity theft followed. Eventually the system got ransomwared too: pay $19,700 in Bitcoin or $180,000 to the vendor.
Building systems aren't theoretical targets anymore. They're getting hit. And the old assumptions about being protected—air gaps, obscurity, 'we're too small to matter'—no longer hold.
Your HVAC contractor needs remote access to troubleshoot a problem at 11 p.m. Your elevator vendor needs to push a software update. Your tenant wants seamless badge access integrated with their corporate systems.
Every reasonable request opens a door.
The habits that keep buildings running—port forwarding to let vendors in, shared login credentials, default passwords nobody bothered changing—create exposure. Port forwarding is particularly dangerous. It punches a hole through your firewall, creating a direct pathway from the internet to your building systems.

Michael MacMahon, an OT security consultant at Newcomb & Boyd, has watched this pattern repeat: "There's too much trust in this industry. Everyone assumes someone else has it handled. Nobody does."
Here's a test: Who manages the cameras in your building? Who owns the Wi-Fi in your amenity spaces? Who's accountable when the BMS vendor's laptop brings in malware?
In most buildings, the answers are unclear. IT assumes facilities is handling it. Facilities assumes IT has it covered. Vendors assume the owner is managing security. Joe Aamidor, who consults with owners on building technology strategy, describes the result: "The awareness starts at the board, and they think it's covered—until they realize no one actually owns OT."
One building found out their amenity Wi-Fi was being used for illegal activity when the ISP flagged them. Then the FBI sent a letter: "As the owner of this IP address, you may be liable." The activity involved child trafficking. Nobody had set up even basic security on the network because nobody thought it was their job.
Convenience isn't free. It trades security for efficiency. The problem is that most building owners don't realize they're making that trade until something breaks.
"Our IT team handles that."
This might be the most dangerous sentence in commercial real estate.
Building systems—HVAC, elevators, access control, lighting—usually sit outside IT's visibility. They're managed by facilities staff or vendors. They run on separate networks. They use protocols IT staff don't understand. And IT security tools often can't even see them, let alone protect them.
Picture a typical building:
Each system has different remote access methods. Each vendor follows different security practices—or none. Each connection is a potential entry point.
Research from Claroty found that 78% of organizations have separate OT and IT security teams that don't coordinate well. The blind spots this creates are significant.
What gets lost in this fragmentation is accountability. Who's responsible when something goes wrong? Who should be tracking vulnerabilities? Who decides what level of risk is acceptable?
Those questions matter more than any security tool you can buy. Until you answer them, you're just adding more technology to an already confusing mess.
When Lendlease decided to address OT cybersecurity across their portfolio, they didn't start with a massive audit that would identify thousands of vulnerabilities. They started with the most exposed point: remote access.
Tom Balme, who leads building technology strategy for Lendlease's investment portfolio, explains the thinking: "An audit will tell you to secure your internet-facing systems first—so don't wait to be told. Start there."
Lendlease developed a phased approach aligned with the NIST Cybersecurity Framework:
Phase 1 (FY25): Protect — Implement secure remote access across the portfolio
Phase 2 (FY26): Identify — Conduct OT audits and deploy asset discovery and vulnerability assessment tools
Phase 3 (FY27): Detect, Respond, Recover — Add monitoring, incident response capabilities, and backup systems

Why start with protection rather than identification? Because it delivers the fastest risk reduction. Securing remote access immediately closes the most common attack vector—without requiring a lengthy audit process or remediation of thousands of vulnerabilities.
The results speak for themselves:
Perhaps most importantly, the project eliminated legacy VPNs and port forwarding—the swiss cheese in most building networks—and gave Lendlease visibility and control over who accesses their OT environments.
Cory Clarke, CPO at Neeve (the platform Lendlease used), notes that the approach allowed rapid deployment: "Simple setup meant the team could start deploying within weeks. Self-service web-based remote access made it practical at scale."
One of the bigger challenges? Tenants. Of the 770+ users onboarded, 355 were tenants who needed access to systems they'd installed in their leased spaces. Getting tenant buy-in and managing their access required clear communication about why the changes mattered and how the new system would work.

Another challenge: port forwarding. Many vendors had grown accustomed to this convenient but dangerous practice. Balancing security requirements with vendor pushback on changing established workflows required patience and clear explanation of the risks.
But the biggest lesson? Starting small and showing results unlocked funding and board buy-in. By proving value quickly, Lendlease secured investment for the next phases of their program.
Tom Balme's advice for other owners: "Start with one building. Prove the value. Scale from there."
One of the most expensive mistakes building owners make is treating cybersecurity as an afterthought. The conversation between Osman Saleem, Principal Consultant at Actimeta, and Michael MacMahon during the NexusCon session highlighted a critical disconnect: construction teams and operations teams rarely talk to each other during the design phase.
"The hardest part is that construction and operations teams never talk—the facility group inherits the mess," MacMahon explained.
When cybersecurity isn't embedded in design standards and procurement specifications, the cost and complexity of retrofitting security controls later multiplies. Consider these common scenarios:
According to the U.S. Department of Energy, retrofitting cybersecurity controls can cost 5-10 times more than incorporating them during initial design and construction.
Building owners who get this right are embedding cybersecurity requirements into:
One example: requiring all vendors to use a centralized, zero-trust remote access platform rather than allowing each vendor to create their own VPN or port forwarding rule. This single design decision dramatically reduces attack surface while improving visibility and control.
The bottom line: retrofitting cybersecurity always costs more than designing for it from the start.
After implementing asset discovery tools, many building owners receive reports listing 15,000+ vulnerabilities across their portfolio. The reaction is usually panic followed by paralysis. Where do you even start?
Osman Saleem calls this problem "enumerating badness"—an endless game of whack-a-mole that rarely addresses the actual risk. The smarter approach is to reframe the problem entirely.
"You don't have to fix everything," Saleem explained at NexusCon. "Focus on what matters—now, next, never."
This triage model helps owners prioritize vulnerabilities based on actual risk rather than theoretical computer vulnerability scoring system scores:
Now: High-risk, exploitable vulnerabilities with known attack vectors
Next: Items that need scheduled remediation but don't pose immediate risk
Never: Low-consequence issues that won't affect operations
The key is coupling this prioritization with governance. Building owners need to:
Saleem also recommends linking vulnerability remediation to capital project timelines. If an HVAC system needs a major upgrade in two years, it may not make sense to invest heavily in patching its current control system. Instead, ensure the replacement system meets current security standards.
Both the NIST SP 800-82 framework and the IEC 62443 standard support this risk-based approach. NIST focuses on probability times impact for general risk assessment. IEC 62443 emphasizes consequence-based planning for mission-critical systems where failure could result in injury, environmental damage, or critical infrastructure disruption.
The goal isn't perfection—it's pragmatic risk management aligned with business objectives.
Despite coming from different corners of the industry—integrators, consultants, owners, and technology providers—the NexusCon presenters kept circling back to the same problems.
Port forwarding showed up in every presentation. It's the convenient shortcut that punches holes in your firewall so vendors can remotely access building systems. It's also the entry point for most attacks. Joe Gaspardone from Montgomery Technologies has seen it repeatedly: systems that got hacked all had port forwarding enabled. Tom Balme from Lendlease made eliminating port forwarding a primary goal of their security program. The message was unanimous: stop doing this.
Nobody owns the problem. IT thinks facilities has it. Facilities thinks IT has it. Vendors assume the owner is managing it. Michael MacMahon from Newcomb & Boyd put it bluntly: "There's too much trust in this industry. Everyone assumes someone else has it handled. Nobody does."
The "air gap" myth keeps getting people hurt. Multiple presenters shared stories of supposedly isolated systems getting infected. An engineer plugs in a thumb drive. A contractor brings in a laptop. Suddenly your "air-gapped" BMS is encrypting every controller in the building. The cost to recover? One example ran over $200,000.
Vulnerability lists are overwhelming and mostly useless. Osman Saleem from Actimeta sees building owners receive reports listing 15,000+ vulnerabilities and freeze. They don't know where to start, so they don't start at all. The solution isn't ignoring the problem—it's triaging ruthlessly based on actual risk rather than theoretical CVSS scores.
Construction and operations teams don't talk. MacMahon highlighted the disconnect: "The hardest part is that construction and operations teams never talk—the facility group inherits the mess." When cybersecurity isn't embedded in design standards from the beginning, fixing it later costs 5-10 times more.
But the presenters also showed what works:
Start with remote access. Lendlease didn't begin with a massive audit. They secured remote access first—closing the most common attack vector immediately. The results came fast: 19 assets in six months, with immediate risk reduction and visible ROI that unlocked budget for the next phases.
Triage vulnerabilities into "now, next, never." Saleem's framework gives owners a practical way to prioritize thousands of findings without panic or paralysis.
Embed security in design standards. The owners who require network segmentation, secure remote access, and clear vendor security protocols from day one avoid the expensive retrofitting cycle.
Test your response plans. Multiple presenters emphasized tabletop exercises—not just having an incident response plan, but actually practicing it with the people who'd need to execute it.
The common thread? Stop assuming someone else has it covered. Start with one high-impact change. Prove the value. Scale from there.

For years, building owners could ignore OT cybersecurity because tenants didn't ask about it, insurance companies didn't require it, and regulations didn't mandate it. That's changing fast.
Tom Balme from Lendlease shared a watershed moment: "We got our first lease requirement asking what we'd done for OT cyber before they'd sign."
This isn't isolated. Sophisticated tenants—particularly financial services firms, healthcare organizations, and technology companies—are beginning to include cybersecurity provisions in lease negotiations. They want to know:
According to CBRE research, 41% of corporate tenants now consider cybersecurity practices when evaluating office space, up from 18% in 2022.
Joe Gaspardone notes the ripple effect: "When tenants start asking for it, the rest of the market follows."
Beyond tenant pressure, other forces are accelerating adoption:
Insurance Requirements: Cyber insurance carriers are tightening requirements, with some explicitly asking about OT security controls before providing coverage or competitive rates.
ESG Expectations: Environmental, Social, and Governance (ESG) frameworks increasingly include cybersecurity and data protection as material risk factors.
Regulatory Momentum: While building-specific OT regulations remain limited, frameworks like IEC 62443 and NIST SP 800-82 are establishing baseline expectations for critical infrastructure.
Reputational Risk: News of a building cyberattack spreads quickly, damaging not only the immediate asset but the owner's brand across their portfolio.
The competitive dynamic is clear: proactive building owners who can demonstrate robust OT cybersecurity practices gain an advantage in lease negotiations, insurance renewals, and capital raising. Those who can't are starting to pay a premium—in both literal costs and lost opportunities.
The horror stories are real. The risks are material. But the path forward doesn't require an army of cybersecurity experts or unlimited budget. It requires systematic thinking and disciplined execution.
Here's the practical checklist for building owners:

1. Know what's connected
2. Control who accesses it
3. Document roles and risk thresholds
4. Update contracts with cyber clauses
5. Design security into new builds
6. Test response plans annually
The goal isn't to eliminate all risk—that's impossible with legacy systems and mixed-vintage equipment. The goal is to know where your walls are, who holds the keys, and ensure you never assume someone else locked the door.
Building owners face a choice, but it's not the one they think. The choice isn't whether to address OT cybersecurity—the market is making that decision for you. The choice is whether to act strategically or reactively.
Strategic action means:
Reactive action means:
The building owners who move first—like Lendlease—aren't just protecting their assets. They're positioning them for a market where cybersecurity is becoming a leasing differentiator, an ESG requirement, and a competitive advantage.
Want to learn more about securing your building portfolio? Join the conversation in the Nexus Pro community, where building owners and operators share practical strategies for OT cybersecurity.
About This Article: This article is based on the "Under Siege: Cyber Security Horror & Success Stories" session at NexusCon 2024, featuring presentations from Joe Gaspardone (Montgomery Technologies), Michael MacMahon (Newcomb & Boyd), Joe Aamidor (Aamidor Consulting), Tom Balme (Lendlease), Cory Clarke (Neeve), and Osman Saleem (Actimeta).
A ransomware attack locked tenants out of a commercial office building for three days. Four major tenants cited the incident when they didn't renew their leases. The financial hit? Over $2 million in losses and litigation. This happened to a real building, and stories like it are becoming common enough that savvy tenants now ask about OT security before signing leases.
These stories—and practical solutions—came from a recent NexusCon session where building owners, consultants, and technology providers gathered to talk about what's actually happening in the field. The news isn't all bad. Lendlease successfully secured 19 buildings covering 1.1 million square feet in under six months. Actimeta has developed frameworks for triaging thousands of vulnerabilities into manageable priorities. And multiple owners shared practical steps that work without requiring unlimited budgets or armies of cybersecurity experts.
This article covers both the horror stories and the playbook for fixing them.
It's 4 a.m. The first office worker arrives at the building entrance. The door won't unlock. By 6 a.m., there's a line stretching down the block.
The access control system has been ransomwared.
The property management company gets the emergency call around 6:30. By 9 a.m., the building owner is staring at an impossible choice: pay $7,200 in Bitcoin to criminals, or pay $65,000 to their vendor—plus burn countless staff hours—rebuilding the system from scratch.
This story comes from Joe Gaspardone, COO at Montgomery Technologies, who's spent 15 years turning tangled building networks into secure, organized systems. He's seen this scenario play out multiple times. The access control incident? Four major tenants left when their leases ended, and they specifically mentioned the hack as a reason they didn't renew.

Worse stories exist. An air-gapped BMS—supposedly unhackable because it had no internet connection—got infected when an engineer plugged in a thumb drive. No internet meant no alerts. The malware spread to every controller, burrowing into device firmware. Cost to fix: $200,000 to rip out, replace, and restore. Plus significant rent credits to tenants who suffered through days of comfort issues.
Elevators have been ransomwared. Multiple times.
Lobby directories have displayed pornography until someone physically disconnected them. Cost to remediate: $7,400.
Security cameras got quietly hacked and accessed for months. Two cases of identity theft followed. Eventually the system got ransomwared too: pay $19,700 in Bitcoin or $180,000 to the vendor.
Building systems aren't theoretical targets anymore. They're getting hit. And the old assumptions about being protected—air gaps, obscurity, 'we're too small to matter'—no longer hold.
Your HVAC contractor needs remote access to troubleshoot a problem at 11 p.m. Your elevator vendor needs to push a software update. Your tenant wants seamless badge access integrated with their corporate systems.
Every reasonable request opens a door.
The habits that keep buildings running—port forwarding to let vendors in, shared login credentials, default passwords nobody bothered changing—create exposure. Port forwarding is particularly dangerous. It punches a hole through your firewall, creating a direct pathway from the internet to your building systems.

Michael MacMahon, an OT security consultant at Newcomb & Boyd, has watched this pattern repeat: "There's too much trust in this industry. Everyone assumes someone else has it handled. Nobody does."
Here's a test: Who manages the cameras in your building? Who owns the Wi-Fi in your amenity spaces? Who's accountable when the BMS vendor's laptop brings in malware?
In most buildings, the answers are unclear. IT assumes facilities is handling it. Facilities assumes IT has it covered. Vendors assume the owner is managing security. Joe Aamidor, who consults with owners on building technology strategy, describes the result: "The awareness starts at the board, and they think it's covered—until they realize no one actually owns OT."
One building found out their amenity Wi-Fi was being used for illegal activity when the ISP flagged them. Then the FBI sent a letter: "As the owner of this IP address, you may be liable." The activity involved child trafficking. Nobody had set up even basic security on the network because nobody thought it was their job.
Convenience isn't free. It trades security for efficiency. The problem is that most building owners don't realize they're making that trade until something breaks.
"Our IT team handles that."
This might be the most dangerous sentence in commercial real estate.
Building systems—HVAC, elevators, access control, lighting—usually sit outside IT's visibility. They're managed by facilities staff or vendors. They run on separate networks. They use protocols IT staff don't understand. And IT security tools often can't even see them, let alone protect them.
Picture a typical building:
Each system has different remote access methods. Each vendor follows different security practices—or none. Each connection is a potential entry point.
Research from Claroty found that 78% of organizations have separate OT and IT security teams that don't coordinate well. The blind spots this creates are significant.
What gets lost in this fragmentation is accountability. Who's responsible when something goes wrong? Who should be tracking vulnerabilities? Who decides what level of risk is acceptable?
Those questions matter more than any security tool you can buy. Until you answer them, you're just adding more technology to an already confusing mess.
When Lendlease decided to address OT cybersecurity across their portfolio, they didn't start with a massive audit that would identify thousands of vulnerabilities. They started with the most exposed point: remote access.
Tom Balme, who leads building technology strategy for Lendlease's investment portfolio, explains the thinking: "An audit will tell you to secure your internet-facing systems first—so don't wait to be told. Start there."
Lendlease developed a phased approach aligned with the NIST Cybersecurity Framework:
Phase 1 (FY25): Protect — Implement secure remote access across the portfolio
Phase 2 (FY26): Identify — Conduct OT audits and deploy asset discovery and vulnerability assessment tools
Phase 3 (FY27): Detect, Respond, Recover — Add monitoring, incident response capabilities, and backup systems

Why start with protection rather than identification? Because it delivers the fastest risk reduction. Securing remote access immediately closes the most common attack vector—without requiring a lengthy audit process or remediation of thousands of vulnerabilities.
The results speak for themselves:
Perhaps most importantly, the project eliminated legacy VPNs and port forwarding—the swiss cheese in most building networks—and gave Lendlease visibility and control over who accesses their OT environments.
Cory Clarke, CPO at Neeve (the platform Lendlease used), notes that the approach allowed rapid deployment: "Simple setup meant the team could start deploying within weeks. Self-service web-based remote access made it practical at scale."
One of the bigger challenges? Tenants. Of the 770+ users onboarded, 355 were tenants who needed access to systems they'd installed in their leased spaces. Getting tenant buy-in and managing their access required clear communication about why the changes mattered and how the new system would work.

Another challenge: port forwarding. Many vendors had grown accustomed to this convenient but dangerous practice. Balancing security requirements with vendor pushback on changing established workflows required patience and clear explanation of the risks.
But the biggest lesson? Starting small and showing results unlocked funding and board buy-in. By proving value quickly, Lendlease secured investment for the next phases of their program.
Tom Balme's advice for other owners: "Start with one building. Prove the value. Scale from there."
One of the most expensive mistakes building owners make is treating cybersecurity as an afterthought. The conversation between Osman Saleem, Principal Consultant at Actimeta, and Michael MacMahon during the NexusCon session highlighted a critical disconnect: construction teams and operations teams rarely talk to each other during the design phase.
"The hardest part is that construction and operations teams never talk—the facility group inherits the mess," MacMahon explained.
When cybersecurity isn't embedded in design standards and procurement specifications, the cost and complexity of retrofitting security controls later multiplies. Consider these common scenarios:
According to the U.S. Department of Energy, retrofitting cybersecurity controls can cost 5-10 times more than incorporating them during initial design and construction.
Building owners who get this right are embedding cybersecurity requirements into:
One example: requiring all vendors to use a centralized, zero-trust remote access platform rather than allowing each vendor to create their own VPN or port forwarding rule. This single design decision dramatically reduces attack surface while improving visibility and control.
The bottom line: retrofitting cybersecurity always costs more than designing for it from the start.
After implementing asset discovery tools, many building owners receive reports listing 15,000+ vulnerabilities across their portfolio. The reaction is usually panic followed by paralysis. Where do you even start?
Osman Saleem calls this problem "enumerating badness"—an endless game of whack-a-mole that rarely addresses the actual risk. The smarter approach is to reframe the problem entirely.
"You don't have to fix everything," Saleem explained at NexusCon. "Focus on what matters—now, next, never."
This triage model helps owners prioritize vulnerabilities based on actual risk rather than theoretical computer vulnerability scoring system scores:
Now: High-risk, exploitable vulnerabilities with known attack vectors
Next: Items that need scheduled remediation but don't pose immediate risk
Never: Low-consequence issues that won't affect operations
The key is coupling this prioritization with governance. Building owners need to:
Saleem also recommends linking vulnerability remediation to capital project timelines. If an HVAC system needs a major upgrade in two years, it may not make sense to invest heavily in patching its current control system. Instead, ensure the replacement system meets current security standards.
Both the NIST SP 800-82 framework and the IEC 62443 standard support this risk-based approach. NIST focuses on probability times impact for general risk assessment. IEC 62443 emphasizes consequence-based planning for mission-critical systems where failure could result in injury, environmental damage, or critical infrastructure disruption.
The goal isn't perfection—it's pragmatic risk management aligned with business objectives.
Despite coming from different corners of the industry—integrators, consultants, owners, and technology providers—the NexusCon presenters kept circling back to the same problems.
Port forwarding showed up in every presentation. It's the convenient shortcut that punches holes in your firewall so vendors can remotely access building systems. It's also the entry point for most attacks. Joe Gaspardone from Montgomery Technologies has seen it repeatedly: systems that got hacked all had port forwarding enabled. Tom Balme from Lendlease made eliminating port forwarding a primary goal of their security program. The message was unanimous: stop doing this.
Nobody owns the problem. IT thinks facilities has it. Facilities thinks IT has it. Vendors assume the owner is managing it. Michael MacMahon from Newcomb & Boyd put it bluntly: "There's too much trust in this industry. Everyone assumes someone else has it handled. Nobody does."
The "air gap" myth keeps getting people hurt. Multiple presenters shared stories of supposedly isolated systems getting infected. An engineer plugs in a thumb drive. A contractor brings in a laptop. Suddenly your "air-gapped" BMS is encrypting every controller in the building. The cost to recover? One example ran over $200,000.
Vulnerability lists are overwhelming and mostly useless. Osman Saleem from Actimeta sees building owners receive reports listing 15,000+ vulnerabilities and freeze. They don't know where to start, so they don't start at all. The solution isn't ignoring the problem—it's triaging ruthlessly based on actual risk rather than theoretical CVSS scores.
Construction and operations teams don't talk. MacMahon highlighted the disconnect: "The hardest part is that construction and operations teams never talk—the facility group inherits the mess." When cybersecurity isn't embedded in design standards from the beginning, fixing it later costs 5-10 times more.
But the presenters also showed what works:
Start with remote access. Lendlease didn't begin with a massive audit. They secured remote access first—closing the most common attack vector immediately. The results came fast: 19 assets in six months, with immediate risk reduction and visible ROI that unlocked budget for the next phases.
Triage vulnerabilities into "now, next, never." Saleem's framework gives owners a practical way to prioritize thousands of findings without panic or paralysis.
Embed security in design standards. The owners who require network segmentation, secure remote access, and clear vendor security protocols from day one avoid the expensive retrofitting cycle.
Test your response plans. Multiple presenters emphasized tabletop exercises—not just having an incident response plan, but actually practicing it with the people who'd need to execute it.
The common thread? Stop assuming someone else has it covered. Start with one high-impact change. Prove the value. Scale from there.

For years, building owners could ignore OT cybersecurity because tenants didn't ask about it, insurance companies didn't require it, and regulations didn't mandate it. That's changing fast.
Tom Balme from Lendlease shared a watershed moment: "We got our first lease requirement asking what we'd done for OT cyber before they'd sign."
This isn't isolated. Sophisticated tenants—particularly financial services firms, healthcare organizations, and technology companies—are beginning to include cybersecurity provisions in lease negotiations. They want to know:
According to CBRE research, 41% of corporate tenants now consider cybersecurity practices when evaluating office space, up from 18% in 2022.
Joe Gaspardone notes the ripple effect: "When tenants start asking for it, the rest of the market follows."
Beyond tenant pressure, other forces are accelerating adoption:
Insurance Requirements: Cyber insurance carriers are tightening requirements, with some explicitly asking about OT security controls before providing coverage or competitive rates.
ESG Expectations: Environmental, Social, and Governance (ESG) frameworks increasingly include cybersecurity and data protection as material risk factors.
Regulatory Momentum: While building-specific OT regulations remain limited, frameworks like IEC 62443 and NIST SP 800-82 are establishing baseline expectations for critical infrastructure.
Reputational Risk: News of a building cyberattack spreads quickly, damaging not only the immediate asset but the owner's brand across their portfolio.
The competitive dynamic is clear: proactive building owners who can demonstrate robust OT cybersecurity practices gain an advantage in lease negotiations, insurance renewals, and capital raising. Those who can't are starting to pay a premium—in both literal costs and lost opportunities.
The horror stories are real. The risks are material. But the path forward doesn't require an army of cybersecurity experts or unlimited budget. It requires systematic thinking and disciplined execution.
Here's the practical checklist for building owners:

1. Know what's connected
2. Control who accesses it
3. Document roles and risk thresholds
4. Update contracts with cyber clauses
5. Design security into new builds
6. Test response plans annually
The goal isn't to eliminate all risk—that's impossible with legacy systems and mixed-vintage equipment. The goal is to know where your walls are, who holds the keys, and ensure you never assume someone else locked the door.
Building owners face a choice, but it's not the one they think. The choice isn't whether to address OT cybersecurity—the market is making that decision for you. The choice is whether to act strategically or reactively.
Strategic action means:
Reactive action means:
The building owners who move first—like Lendlease—aren't just protecting their assets. They're positioning them for a market where cybersecurity is becoming a leasing differentiator, an ESG requirement, and a competitive advantage.
Want to learn more about securing your building portfolio? Join the conversation in the Nexus Pro community, where building owners and operators share practical strategies for OT cybersecurity.
About This Article: This article is based on the "Under Siege: Cyber Security Horror & Success Stories" session at NexusCon 2024, featuring presentations from Joe Gaspardone (Montgomery Technologies), Michael MacMahon (Newcomb & Boyd), Joe Aamidor (Aamidor Consulting), Tom Balme (Lendlease), Cory Clarke (Neeve), and Osman Saleem (Actimeta).

Head over to Nexus Connect and see what’s new in the community. Don’t forget to check out the latest member-only events.
Go to Nexus ConnectJoin Nexus Pro and get full access including invite-only member gatherings, access to the community chatroom Nexus Connect, networking opportunities, and deep dive essays.
Sign Up
This is a great piece!
I agree.