loader from loading.io

What's Next in OT?

OT After Hours

Release Date: 12/18/2024

The CIA Triad in OT & Automation show art The CIA Triad in OT & Automation

OT After Hours

In this episode, we grapple with a deceptively simple question: in an operational technology environment, which element of the CIA triad—confidentiality, integrity or availability—should reign supreme? Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Analyst), Tyler Bergman (Industrial Cybersecurity Engineer) and Zach Woltjer (ICS Security Specialist) as they debate real-world incidents, legacy system constraints and industry priorities that shape how we secure critical infrastructure. Key Takeaways Availability often takes...

info_outline
To CVE or Not to CVE? show art To CVE or Not to CVE?

OT After Hours

In this episode, we explore how often OT teams really need to refresh asset-inventory data and what MITRE’s near-miss funding lapse for the CVE program means for vulnerability management. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Specialist), Lance Lamont (Team Lead, Special Projects & Protocols), Andrew Wintermeyer (Senior ICS Architect), and Tyler Bergman (Principal Security Consultant) as they discuss scan cadences, change-detection value, and building redundancy into threat-intel pipelines. Key Takeaways Context...

info_outline
Active vs. Passive show art Active vs. Passive

OT After Hours

In this episode, we explore the complexities of asset management in operational technology (OT) security. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Tyler Bergman, Zachary Woltjer, Natalie Kalinowski, and Lance Lamont as they discuss the challenges of tracking and securing assets in industrial environments, the impact of legacy systems, and the best strategies for improving visibility and resilience. Key Takeaways Asset management is a foundational element of OT security, yet many organizations struggle with visibility. Manual, passive, and active asset...

info_outline
Asset Inventory show art Asset Inventory

OT After Hours

In this episode, we explore the challenges and best practices for identifying and inventorying assets in operational technology (OT) environments. Join host Ken Kully, Systems Support Lead at Verve Industrial, along with guests Lance Lamont, Andrew Wintermeyer, Tyler Bergman, and Rick Herzing, as they discuss how to establish trust, safely discover assets, and navigate network complexities without disrupting operations. Key Takeaways Establishing Trust & Engagement: Successful asset identification starts with building relationships with site personnel, including ICS engineers and facility...

info_outline
What's Next in OT? show art What's Next in OT?

OT After Hours

In this episode, we delve into the pressing challenges and exciting opportunities in OT cybersecurity as we look toward 2025. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski, Tyler Bergman, and Zach Woltjer as they share insights on industry trends, compliance requirements, and the evolving role of AI in securing operational environments. Key Takeaways Hybrid Workforces and Device Risks: Personal and work devices in operational environments pose security risks, requiring stronger BYOD policies. Regulatory Compliance: Evolving regulations, like...

info_outline
Cyber (Im)Maturity show art Cyber (Im)Maturity

OT After Hours

In this episode, we explore the evolving challenges of cybersecurity maturity in operational technology (OT) environments. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Lauren Blocker, Industrial Cybersecurity Consulting Partner at Rockwell Automation; Drew Wintermyer from Verve’s OT Research Lab; Zachary Woltjer from the Customer Success Team; Tyler Bergman, Operations Manager; and Rick Herzing from Verve Systems Support as they discuss the importance of assessing cyber maturity, bridging IT/OT security gaps, and implementing effective strategies for...

info_outline
The Auto Wreckers of OT show art The Auto Wreckers of OT

OT After Hours

In this episode, we dive into the challenges of managing legacy operational technology (OT) systems. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Tyler Bergman, Doug Artze, Dylan Stencil, and Andrew Wintermeyer, as they discuss the complexities of legacy systems, spare parts ("grey") markets, and the importance of security in maintaining older technologies. They explore real-world stories, the economics of keeping legacy systems running, and offer insights into potential solutions. Key Takeaways Legacy OT equipment can have extremely long lifespans, often much...

info_outline
A Calculated Risk show art A Calculated Risk

OT After Hours

In this episode, we explore the concept of Calculated Risk Rating (CRR) and its importance in OT cybersecurity. Join host , Systems Support Lead at Verve Industrial, and his guests – Zachary Woltjer, Cyber Data Analyst at Verve, and Lance Lamont – as they discuss how to prioritize and address vulnerabilities in industrial environments. Key Takeaways Calculated Risk Rating helps tailor cybersecurity solutions to specific industrial environments CRR considers both the impact and likelihood of vulnerabilities being exploited The approach helps organizations prioritize their limited resources...

info_outline
The Case for Active OT Security show art The Case for Active OT Security

OT After Hours

In this episode, we explore the challenges and benefits of active detection in OT security environments. Join host , Systems Support Lead at Verve Industrial, and his guests Rick Kaun and Sally Mellinger as they discuss the limitations of passive detection and the importance of comprehensive asset inventory in industrial cybersecurity. Key Takeaways Passive detection, while useful, has significant limitations in providing a comprehensive view of OT environments Active detection, including the use of agents, can provide more detailed and actionable information about assets Many operators have...

info_outline
The Crowdstrike Incident: Lessons for OT Cybersecurity show art The Crowdstrike Incident: Lessons for OT Cybersecurity

OT After Hours

In this episode, we explore the implications of the recent Crowdstrike incident for OT cybersecurity. Join host , Systems Support Lead at Verve Industrial, and his guests Tyler Bergman and Ryan Zahn as they discuss the impact of IT security tools on OT environments, the importance of staged rollouts, and the delicate balance between automated updates and manual controls. Key Takeaways: The Crowdstrike incident highlights the risks of using IT-focused security tools in OT environments Staged rollouts and thorough testing are crucial for minimizing risks in critical infrastructure OT...

info_outline
 
More Episodes

In this episode, we delve into the pressing challenges and exciting opportunities in OT cybersecurity as we look toward 2025. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski, Tyler Bergman, and Zach Woltjer as they share insights on industry trends, compliance requirements, and the evolving role of AI in securing operational environments.

Key Takeaways

  • Hybrid Workforces and Device Risks: Personal and work devices in operational environments pose security risks, requiring stronger BYOD policies.
  • Regulatory Compliance: Evolving regulations, like NIST and NIS2, drive cybersecurity adoption but lag in addressing sectors like water infrastructure.
  • AI in Cybersecurity: AI enhances detection, patching, and gap analysis, but foundational security issues must be addressed first.
  • Dynamic Detection: AI and machine learning are replacing outdated static rules for real-time anomaly detection.
  • Zero Trust Architecture: The shift to identity- and access-based security is accelerating, especially in hybrid workforce scenarios.
  • Legacy Device Security: Secure proxies and similar tools help protect aging OT devices, but challenges with latency persist.
  • Monitoring Approaches: Continuous monitoring offers immediate insights but increases network load, while scheduled checks provide stability but risk delays.
  • Third-Party Risks: Organizations are diversifying security tools and assessing vendor practices to reduce supply chain vulnerabilities.

Timestamps

0:00 – Introduction
02:15 – Guest introductions
06:10 – The water industry as a critical infrastructure concern
12:36 – Predictions for OT cybersecurity trends in 2025
20:17 – AI in OT cybersecurity: workforce gaps and anomaly detection
30:12 – The shift from static rules to advanced detection techniques
33:01 – Zero trust architecture: buzzword or paradigm shift?
47:39 – Continuous vs. scheduled monitoring in OT environments
55:03 – Protecting legacy devices in operational technology
1:08:08 – Final thoughts: hybrid work risks, compliance, and AI in 2025

Guest Information

Natalie Kalinowski: Cyber Technology Consultant at Rockwell Automation and Verve, with a background as a network engineer working in diverse operational environments, from food and beverage to natural gas.

Tyler Bergman: Cyber Operations Manager at Verve, bringing over 20 years of experience in utility and energy industries with a focus on IT/OT integration.

Zach Woltjer: Cyber Data Analyst at Verve with a passion for simplifying complex cybersecurity challenges for industrial clients.

Subscribe

Follow and Subscribe

Get in Touch

LinkedIn | YouTube | Twitter/X | Contact Verve