Understanding your OT environment: the first step to stronger cyber security