Debunking the myths surrounding the implementation of proactive cyber controls in operational technology. Source