loader from loading.io

To CVE or Not to CVE?

OT After Hours

Release Date: 04/23/2025

The CIA Triad in OT & Automation show art The CIA Triad in OT & Automation

OT After Hours

In this episode, we grapple with a deceptively simple question: in an operational technology environment, which element of the CIA triad—confidentiality, integrity or availability—should reign supreme? Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Analyst), Tyler Bergman (Industrial Cybersecurity Engineer) and Zach Woltjer (ICS Security Specialist) as they debate real-world incidents, legacy system constraints and industry priorities that shape how we secure critical infrastructure. Key Takeaways Availability often takes...

info_outline
To CVE or Not to CVE? show art To CVE or Not to CVE?

OT After Hours

In this episode, we explore how often OT teams really need to refresh asset-inventory data and what MITRE’s near-miss funding lapse for the CVE program means for vulnerability management. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Specialist), Lance Lamont (Team Lead, Special Projects & Protocols), Andrew Wintermeyer (Senior ICS Architect), and Tyler Bergman (Principal Security Consultant) as they discuss scan cadences, change-detection value, and building redundancy into threat-intel pipelines. Key Takeaways Context...

info_outline
Active vs. Passive show art Active vs. Passive

OT After Hours

In this episode, we explore the complexities of asset management in operational technology (OT) security. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Tyler Bergman, Zachary Woltjer, Natalie Kalinowski, and Lance Lamont as they discuss the challenges of tracking and securing assets in industrial environments, the impact of legacy systems, and the best strategies for improving visibility and resilience. Key Takeaways Asset management is a foundational element of OT security, yet many organizations struggle with visibility. Manual, passive, and active asset...

info_outline
Asset Inventory show art Asset Inventory

OT After Hours

In this episode, we explore the challenges and best practices for identifying and inventorying assets in operational technology (OT) environments. Join host Ken Kully, Systems Support Lead at Verve Industrial, along with guests Lance Lamont, Andrew Wintermeyer, Tyler Bergman, and Rick Herzing, as they discuss how to establish trust, safely discover assets, and navigate network complexities without disrupting operations. Key Takeaways Establishing Trust & Engagement: Successful asset identification starts with building relationships with site personnel, including ICS engineers and facility...

info_outline
What's Next in OT? show art What's Next in OT?

OT After Hours

In this episode, we delve into the pressing challenges and exciting opportunities in OT cybersecurity as we look toward 2025. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski, Tyler Bergman, and Zach Woltjer as they share insights on industry trends, compliance requirements, and the evolving role of AI in securing operational environments. Key Takeaways Hybrid Workforces and Device Risks: Personal and work devices in operational environments pose security risks, requiring stronger BYOD policies. Regulatory Compliance: Evolving regulations, like...

info_outline
Cyber (Im)Maturity show art Cyber (Im)Maturity

OT After Hours

In this episode, we explore the evolving challenges of cybersecurity maturity in operational technology (OT) environments. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Lauren Blocker, Industrial Cybersecurity Consulting Partner at Rockwell Automation; Drew Wintermyer from Verve’s OT Research Lab; Zachary Woltjer from the Customer Success Team; Tyler Bergman, Operations Manager; and Rick Herzing from Verve Systems Support as they discuss the importance of assessing cyber maturity, bridging IT/OT security gaps, and implementing effective strategies for...

info_outline
The Auto Wreckers of OT show art The Auto Wreckers of OT

OT After Hours

In this episode, we dive into the challenges of managing legacy operational technology (OT) systems. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Tyler Bergman, Doug Artze, Dylan Stencil, and Andrew Wintermeyer, as they discuss the complexities of legacy systems, spare parts ("grey") markets, and the importance of security in maintaining older technologies. They explore real-world stories, the economics of keeping legacy systems running, and offer insights into potential solutions. Key Takeaways Legacy OT equipment can have extremely long lifespans, often much...

info_outline
A Calculated Risk show art A Calculated Risk

OT After Hours

In this episode, we explore the concept of Calculated Risk Rating (CRR) and its importance in OT cybersecurity. Join host , Systems Support Lead at Verve Industrial, and his guests – Zachary Woltjer, Cyber Data Analyst at Verve, and Lance Lamont – as they discuss how to prioritize and address vulnerabilities in industrial environments. Key Takeaways Calculated Risk Rating helps tailor cybersecurity solutions to specific industrial environments CRR considers both the impact and likelihood of vulnerabilities being exploited The approach helps organizations prioritize their limited resources...

info_outline
The Case for Active OT Security show art The Case for Active OT Security

OT After Hours

In this episode, we explore the challenges and benefits of active detection in OT security environments. Join host , Systems Support Lead at Verve Industrial, and his guests Rick Kaun and Sally Mellinger as they discuss the limitations of passive detection and the importance of comprehensive asset inventory in industrial cybersecurity. Key Takeaways Passive detection, while useful, has significant limitations in providing a comprehensive view of OT environments Active detection, including the use of agents, can provide more detailed and actionable information about assets Many operators have...

info_outline
The Crowdstrike Incident: Lessons for OT Cybersecurity show art The Crowdstrike Incident: Lessons for OT Cybersecurity

OT After Hours

In this episode, we explore the implications of the recent Crowdstrike incident for OT cybersecurity. Join host , Systems Support Lead at Verve Industrial, and his guests Tyler Bergman and Ryan Zahn as they discuss the impact of IT security tools on OT environments, the importance of staged rollouts, and the delicate balance between automated updates and manual controls. Key Takeaways: The Crowdstrike incident highlights the risks of using IT-focused security tools in OT environments Staged rollouts and thorough testing are crucial for minimizing risks in critical infrastructure OT...

info_outline
 
More Episodes

In this episode, we explore how often OT teams really need to refresh asset-inventory data and what MITRE’s near-miss funding lapse for the CVE program means for vulnerability management.

Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Specialist), Lance Lamont (Team Lead, Special Projects & Protocols), Andrew Wintermeyer (Senior ICS Architect), and Tyler Bergman (Principal Security Consultant) as they discuss scan cadences, change-detection value, and building redundancy into threat-intel pipelines.

Key Takeaways

  • Context drives cadence. Fan speed may need minute-level polling, firmware often does not.
  • Redundancy is resilience. Blend NVD, CISA, MITRE, and vendor advisories to survive feed outages.
  • CVE is a language, not the cure. Losing it wouldn’t add vulnerabilities, but it would cripple prioritization.
  • Change detection turns inventory data into real-time alerts for unauthorized config tweaks.

Timestamps

00:00 – Introduction and sound check

03:30 – Why “asset-data freshness” landed on today’s agenda

04:10 – MITRE CVE funding scare: what happened and why it matters

10:50 – OT vs. IT views on vulnerability backlog and enrichment

18:00 – Mapping scan frequency to business need

24:40 – Change management and configuration-drift detection

33:00 – Diversifying data sources beyond NVD

38:50 – The proposed “CVE Foundation” for long-term stability

42:40 – Building redundancy into threat-intel pipelines

44:50 – Listener poll results: hard-rock “Legacy Code” wins

46:15 – Sign-off and credits

Listener Q&A

We're happy to announce that the hard rock version of Legacy Code on the Conveyor Belt was far-and-away the fan favorite! Download it now!

Guest Information

  • Natalie Kalinowski: OT Security Specialist at Verve Industrial; leads proof-of-value engagements and vulnerability mapping.
  • Lance Lamont: VP, Solutions Engineering at Verve Industrial; directs driver development and asset-inventory strategy.
  • Andrew Wintermeyer: Senior ICS Architect at Verve Industrial; designs secure network architecture for critical infrastructure.
  • Tyler Bergman: Principal Security Consultant at Verve Industrial; focuses on risk prioritization and framework alignment.

Subscribe

Follow and Subscribe

Get in Touch

LinkedIn | YouTube | Twitter/X | Contact Verve I Listener Q&A