“…We demonstrated the model's applicability to quantifying the cyber-risk score and articulated the cyber-risk score change in the presence of anomalous behaviour. Existing risk assessment models are driven by the IS community and IT systems [77][78][79][80], whereas methodologies such as the qualitative Hazard and Operability study (HAZOP) tend to focus on risks to personnel and equipment, not cybersecurity [81]. While individual maturity exists, a disconnect remains between Information Technology (IT) and Operational Technology (OT), particularly in ICS.…”