loader from loading.io

The CIA Triad in OT & Automation

OT After Hours

Release Date: 05/21/2025

The CIA Triad in OT & Automation show art The CIA Triad in OT & Automation

OT After Hours

In this episode, we grapple with a deceptively simple question: in an operational technology environment, which element of the CIA triad—confidentiality, integrity or availability—should reign supreme? Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Analyst), Tyler Bergman (Industrial Cybersecurity Engineer) and Zach Woltjer (ICS Security Specialist) as they debate real-world incidents, legacy system constraints and industry priorities that shape how we secure critical infrastructure. Key Takeaways Availability often takes...

info_outline
To CVE or Not to CVE? show art To CVE or Not to CVE?

OT After Hours

In this episode, we explore how often OT teams really need to refresh asset-inventory data and what MITRE’s near-miss funding lapse for the CVE program means for vulnerability management. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Specialist), Lance Lamont (Team Lead, Special Projects & Protocols), Andrew Wintermeyer (Senior ICS Architect), and Tyler Bergman (Principal Security Consultant) as they discuss scan cadences, change-detection value, and building redundancy into threat-intel pipelines. Key Takeaways Context...

info_outline
Active vs. Passive show art Active vs. Passive

OT After Hours

In this episode, we explore the complexities of asset management in operational technology (OT) security. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Tyler Bergman, Zachary Woltjer, Natalie Kalinowski, and Lance Lamont as they discuss the challenges of tracking and securing assets in industrial environments, the impact of legacy systems, and the best strategies for improving visibility and resilience. Key Takeaways Asset management is a foundational element of OT security, yet many organizations struggle with visibility. Manual, passive, and active asset...

info_outline
Asset Inventory show art Asset Inventory

OT After Hours

In this episode, we explore the challenges and best practices for identifying and inventorying assets in operational technology (OT) environments. Join host Ken Kully, Systems Support Lead at Verve Industrial, along with guests Lance Lamont, Andrew Wintermeyer, Tyler Bergman, and Rick Herzing, as they discuss how to establish trust, safely discover assets, and navigate network complexities without disrupting operations. Key Takeaways Establishing Trust & Engagement: Successful asset identification starts with building relationships with site personnel, including ICS engineers and facility...

info_outline
What's Next in OT? show art What's Next in OT?

OT After Hours

In this episode, we delve into the pressing challenges and exciting opportunities in OT cybersecurity as we look toward 2025. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski, Tyler Bergman, and Zach Woltjer as they share insights on industry trends, compliance requirements, and the evolving role of AI in securing operational environments. Key Takeaways Hybrid Workforces and Device Risks: Personal and work devices in operational environments pose security risks, requiring stronger BYOD policies. Regulatory Compliance: Evolving regulations, like...

info_outline
Cyber (Im)Maturity show art Cyber (Im)Maturity

OT After Hours

In this episode, we explore the evolving challenges of cybersecurity maturity in operational technology (OT) environments. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Lauren Blocker, Industrial Cybersecurity Consulting Partner at Rockwell Automation; Drew Wintermyer from Verve’s OT Research Lab; Zachary Woltjer from the Customer Success Team; Tyler Bergman, Operations Manager; and Rick Herzing from Verve Systems Support as they discuss the importance of assessing cyber maturity, bridging IT/OT security gaps, and implementing effective strategies for...

info_outline
The Auto Wreckers of OT show art The Auto Wreckers of OT

OT After Hours

In this episode, we dive into the challenges of managing legacy operational technology (OT) systems. Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Tyler Bergman, Doug Artze, Dylan Stencil, and Andrew Wintermeyer, as they discuss the complexities of legacy systems, spare parts ("grey") markets, and the importance of security in maintaining older technologies. They explore real-world stories, the economics of keeping legacy systems running, and offer insights into potential solutions. Key Takeaways Legacy OT equipment can have extremely long lifespans, often much...

info_outline
A Calculated Risk show art A Calculated Risk

OT After Hours

In this episode, we explore the concept of Calculated Risk Rating (CRR) and its importance in OT cybersecurity. Join host , Systems Support Lead at Verve Industrial, and his guests – Zachary Woltjer, Cyber Data Analyst at Verve, and Lance Lamont – as they discuss how to prioritize and address vulnerabilities in industrial environments. Key Takeaways Calculated Risk Rating helps tailor cybersecurity solutions to specific industrial environments CRR considers both the impact and likelihood of vulnerabilities being exploited The approach helps organizations prioritize their limited resources...

info_outline
The Case for Active OT Security show art The Case for Active OT Security

OT After Hours

In this episode, we explore the challenges and benefits of active detection in OT security environments. Join host , Systems Support Lead at Verve Industrial, and his guests Rick Kaun and Sally Mellinger as they discuss the limitations of passive detection and the importance of comprehensive asset inventory in industrial cybersecurity. Key Takeaways Passive detection, while useful, has significant limitations in providing a comprehensive view of OT environments Active detection, including the use of agents, can provide more detailed and actionable information about assets Many operators have...

info_outline
The Crowdstrike Incident: Lessons for OT Cybersecurity show art The Crowdstrike Incident: Lessons for OT Cybersecurity

OT After Hours

In this episode, we explore the implications of the recent Crowdstrike incident for OT cybersecurity. Join host , Systems Support Lead at Verve Industrial, and his guests Tyler Bergman and Ryan Zahn as they discuss the impact of IT security tools on OT environments, the importance of staged rollouts, and the delicate balance between automated updates and manual controls. Key Takeaways: The Crowdstrike incident highlights the risks of using IT-focused security tools in OT environments Staged rollouts and thorough testing are crucial for minimizing risks in critical infrastructure OT...

info_outline
 
More Episodes

In this episode, we grapple with a deceptively simple question: in an operational technology environment, which element of the CIA triad—confidentiality, integrity or availability—should reign supreme? Join host Ken Kully, Systems Support Lead at Verve Industrial, and his guests Natalie Kalinowski (OT Security Analyst), Tyler Bergman (Industrial Cybersecurity Engineer) and Zach Woltjer (ICS Security Specialist) as they debate real-world incidents, legacy system constraints and industry priorities that shape how we secure critical infrastructure.

Key Takeaways

  • Availability often takes center stage in OT—downtime can cost millions and trigger regulatory shutdowns.
  • Integrity attacks (like Stuxnet-style tampering) are scarier than outright outages: misleading data can hide dangerous conditions.
  • Confidentiality matters too—information gathering paves the way for future, highly targeted attacks.
  • In practice, availability and integrity are inseparable: validating data flow can bolster both pillars simultaneously.
  • A holistic, risk-based “crown jewels” assessment helps organizations focus on the devices and data that matter most.

Timestamps

00:00 – Introduction and sound check

00:43 – Welcome to Season Two of OT After Hours

01:06 – Guest introductions: Natalie, Tyler & Zach

04:00 – Defining confidentiality, integrity and availability

07:57 – Tyler on why availability skyrockets in OT environments

11:53 – Natalie on integrity attacks and the legacy of Stuxnet

25:05 – Ken and team explore integrity-based attack scenarios and encryption trade-offs

39:47 – Natalie on confidentiality’s long-term impact (Ukraine grid outages, HAVoC)

43:04 – Roundtable closing thoughts: tying availability & integrity together

47:12 – Outro and how to submit your questions

Guest Information

  • Natalie Kalinowski: OT Security Analyst at Verve Industrial, specializes in vulnerability management and threat research.
  • Tyler Bergman: Industrial Cybersecurity Engineer at Verve Industrial, expert in SCADA availability and risk mitigation.
  • Zach Woltjer: ICS Security Specialist at Verve Industrial, focuses on OT-IT convergence and strategic assessments.

Subscribe

Follow and Subscribe

Get in Touch

LinkedIn | YouTube | Twitter/X | Contact Verve I Listener Q&A