Photo by Adi Goldstein on Unsplash

As UTSI International celebrates its 40th anniversary, president and CEO Shaun Six reflects on the company's history, achievements, and exciting future.

---

In March 1985, Dan Nagala and a few friends took a risk, leaving their full-time jobs to pursue their passion and start their own company.

They founded UTSI Internationalamidst groundbreaking advancements in Industrial Control Systems and SCADA technology, revolutionizing remote operations for critical infrastructure. From the start, UTSI has been at the forefront of OT innovation and integration — a legacy we proudly carry forward today.

The legacy of Dan Nagala

Dan Nagala’s 50-plus-year career is too vast to cover every accomplishment, but if you’ve ever heard the phrase “Houston, we have a problem” in a movie, those screens in the control room and the logic causing the “blinky lights” to alert the operators, you’ve seen some of his work. Dan and his team ultimately paved the way for field communications to detect and communicate leaks on pipelines and give operators in remote locations situational awareness, expanding their ability to safely monitor and control their operations.

This capability was requested early on in the first pipeline control rooms, leading to UTSI’s first check-in 1985 (which I proudly have framed on my bookshelf). The protocols to communicate and do advanced calculations — which many would be tempted to call AI today — for the purpose of monitoring and control, was created from this group of enthusiasts who open sourced it and allowed it to proliferate, leading to over 80 percent of all critical infrastructure in the world now utilizing a variant thereof.

Given the novelty of the technology and the experience of UTSI, having implemented control systems and automation for pipelines in over 22 countries, Dan was asked to collaborate with industry experts, creating the first API leak detection and control room management standards for the American Petroleum Institute. These would later become regulation under PHMSA, DoT, and TSA, placing UTSI as the go-to experts in compliance in addition to their traditional expertise.

UTSI has delivered for the world’s largest infrastructure owners in multiple critical infrastructure sectors, like mining, water/wastewater, oil and gas, green energy, transportation authorities, etc. We have also done AI and cybersecurity, in addition to SCADA and ICS work for the DoD and DoE.

Strength in partners

I joined UTSI in 2022 as vice president, working under Dan, with the goal of gradually stepping into leadership. In 2023, I became CEO, president, and majority shareholder. While no one can truly fill Dan’s shoes alone, we’ve focused on strengthening our team, partnerships, and capabilities to continue UTSI’s legacy of excellence.

One of our first strategic partnerships was with Tory Tech, a leading API-compliant Control Room Management tool. UTSI has worked as integrators with Tory Tech for years and Dan worked as a CRM compliance advisor for them in the U.S. while they were setting up their headquarters in Houston. In 2024 we made it an official partnership, becoming a preferred integrator and focusing our team on training and development in the MaCRoM (Master Control Room Management) tool.

We've also made significant investments in our OT cybersecurity capabilities, expanding our team and partnering with industry leaders like Dennis Parker, Derrik Oates, Nozomi Networks, Fortinet, and Schneider Electric. These strategic moves ensure we deliver top-tier expertise, products, and solutions to better serve our customers.

Our partnership with ThreatGEN and the utilization of their AI-driven “AutoTableTop” tool not only utilizes our experience with TSA guidelines, but adds an element of reality that the traditional methods are lacking, making these engagements more interactive and beneficial for operators who are required to participate annually.

In 2024, UTSI also invested heavily in AI and Data Science by acquiring Houston-based AI company Pandata Tech and leveraging their Data-Quality-Methodology (DQM), Leak Geek, and time-series data science expertise to solve industry specific problems.

Moving up – in and around Houston

Building on our recent successes, we strategically relocated our office to the Netrality building (1301 Fannin St.), bringing us closer to clients and partners, while getting access to a Tier 3 Data Center with an uninterrupted 40-year power record.

Netrality is a SOC2-compliant facility with seven points of detection from the street to our server, including biometric screening. Our very own Roberto deLeon has architected our upgraded servers using the Purdue model as a basis of design while leveraging our relationship with Fortinet to standardize our hardware and software to the highest standards. We practice what we preach — every architecture, framework, and hardware recommendation we make is not just advised but actively implemented within our own operations.

Our investment in this space includes increasing our “SCADA R&D Lab” to play with toys from vendors, testing them out in our environment before we recommend and advise them to our clients and partners. Currently we’re working on LLMs for OT, building our own “DANN2.0” for use in-house. DANN is an homage to Dan Nagala (and, for the nerds, stands for Dan Artificial Neural Network), which we started in 2022 when I realized that knowledge capture is an industry wide epidemic and we need to be ready to integrate for our clients in a safe and local way at scale, in the OT environment.

Additionally, having come from a startup before joining UTSI, I wanted to get us closer to the heart of innovation, so we’ve added additional office space at The Cannon downtown. While there are many tech hubs around Houston, and we are proud to work with and partner with companies from Greentown Labs and the Ion, to name a few, we’ve found that The Cannon community is incredibly active and innovative, with experience in industrial use-cases.

Houston is set to become the Energy Transition capital, leading in hydrogen, carbon capture, and repurposing. With a 5:1 ratio of engineers leaving the industry and an average age over 60, we must innovate. The solution lies in combining a secure, cloud-free "ChatGPT for OT" with digital twins. Bringing the field to engineers is essential. We've partnered with a satellite constellation for asset imaging and U.K.-based Mods Solutions to leverage their CFIHOS-driven platform for intelligent digital twins — more on that partnership soon!

And we will need to leverage enhanced automation tools and actively monitor control networks to ensure security and respond quickly to issues, which is why we’ve partnered with Nozomi Networks.

Shaping the future

Although Dan has semi-retired to his cabin in Montana, he continues to do “the fun stuff” that brings him joy, such as conducting research for PRCI and assisting long-time clients. He also has been a mentor and advisor to me since I started at UTSI three years ago. I’m grateful for him and the group of industry experts he gathered around him to make UTSI such a well-known systems integrator and OT advisor for the world’s largest asset owners.

Our group of experts are active in the industry and will be speaking at events throughout the year, with a presence at Entellec, Level Zero, and participating at this year's API Cybernetics and PSIGs biannual conferences. We proudly serve on the BCarbon advisory board and GHPs Energy Committee.

Lastly, we have one request: We see a critical need for H2 and supercritical CO2 studies to develop simulation models, response plans, and leak detection best practices. These gases differ from those covered in existing standards. If you know anyone interested in funding or contributing, we’re collaborating with industry partners to secure support.

Photo by Jasmin Merdan/Getty

Mastering control room management for smoother critical infrastructure operations

Up to Date

Control room management (CRM) systems play an integral role in ensuring the safe and efficient remote operations of automated processes for the world's most critical infrastructures (CI). If anything goes wrong with these CIs, the risks are major: loss of life or catastrophic environmental disasters. For this reason, rigorous regulatory requirements are crucial.

CRM systems give operators the ability to automate and take control of CI processes, giving operators situational awareness and real-time visibility of remote assets. This minimizes the need for manual work and inspection, and scales a company's ability to safely manage many assets over a large geographical area from one control room.

Most CI have to handle hazardous material in some, if not all, of their operational areas. Though different by industry, regulations and oversight are extremely necessary.

ICS (Industrial Control Systems) and CRM tools are key components of real-time monitoring for advanced warning and emergency alarming. The combination of a “green, amber, red” alert on the screen of an operator's control console will prompt them to respond, and potentially lead to following emergency shut-down response procedures. Training and testing of the control systems and their related standards, procedures, and activities are all recorded in a system of record in compliance with regulatory requirements.

Current challenges
One of the biggest challenges is the ability to easily aggregate the data from the many different systems and integrate them with the operator's daily activity and responses to the many notifications they receive. This makes it difficult for handover, when a new control room operator comes in fresh to take over from the operator coming off duty. Ensuring a clean and clear handover that encompasses all the pertinent information, so that the new operator can take over the console with ease and clarity, is much more difficult than some would imagine.

Another issue is the sheer volume of data. When you have thousands of sensors streaming data, it is not unrealistic for a console to receive a few thousand data points per second. Performance and continuity are priorities on a CI control room console(s). So there is no room for error — meaning there is no room for big (quite literally) data.

All of this means that real-time data must be pushed off the operational and process control network and moved into an area where there are no controls, but big data can be stored to produce big-data analytic capabilities, enabling AI, machine learning, and other data science.

Controller/operator fatigue is also an issue. Manual tracking, documenting, and record-keeping increases fatigue, leading to more mistakes and omissions.

Opportunities for improvement
The Houston-based Tory Technologies, Inc.is a corporation specializing in advanced software applications, creating and integrating various innovative technologies, and providing solutions for control room management and electronic flow measurement data management.

Tory Technologies, Inc. can help with the auto population of forms, inclusion of historical alarms and responses, and easy handover of control with active/open issues highlighted, making for an easier transition from one operator to the next.

"CRM is essential for keeping operations safe and efficient in industries where mistakes can lead to serious problems," says Juan Torres, director of operations - MaCRoM at Tory Technologies, Inc. "While many control rooms have worked hard to meet compliance standards, challenges remain that can affect performance and safety. It's not enough to just meet the basic rules; we need to go further by using smarter tools and strategies that make CRM more than just compliant, but truly effective."

Shaun Six, president of UTSI International, notes that, "CRM solutions are scalable. A smart integration with relevant systems and related data will reduce 'white noise' and increase relevance of data being displayed at the right time, or recalled when most helpful."

The future state
Offering CRM as a service for non-regulated control rooms will give economies of scale to critical infrastructure operators, which will allow dispatching, troubleshooting, and network monitoring so operators can focus on more value-add activities.

It can also virtualize network monitoring, ensuring that field machines and edge computers are compliant with industry and company standards and are not exposed to external threats.

Even better: Much of this can be automated. Smart tools can look through each device and test that passwords are changed, configurations are secure, and firmware/software has been properly patched or safeguarded against known exploits.

The sheer volume of data from these exercises can be overwhelming to operators. But a trained professional can easily filter and curate this data, cutting through the noise and helping asset owners address high-risk/high-probability exploits and plan/manage them.

Ultimately, the goal is to make control rooms efficient, getting the right information to the right people at the right time, while also retaining and maintaining required documents and data, ensuring an operators “license to operator” is uninterrupted and easily accessible to external parties when requested or needed.

Integrating smart CRM systems, network monitoring tools, and testing/validating processes and procedures are all easily accessible with current technological capabilities and availability, letting operators focus on the task at hand with ease and peace of mind.

Courtesy photo

UTSI's advisory board digs into cybersecurity's challenges, trends + tech

From The Board

In today's digital landscape, the convergence of Information Technology (IT) and Operational Technology (OT) presents both opportunities and challenges for critical infrastructure asset owners and operators.

UTSI, a leading systems integrator of OT technology, has assembled an OT Cybersecurity Advisory Board to address these challenges and highlight standard processes and best practices to evaluate and secure these environments.

“We are excited about the strength of our esteemed Advisory Board and are confident that these strategic alliances will enhance our competitiveness,” says Shaun Six, president of UTSI International.

A few of the drivers of OT and IT convergence include increased efficiency, enhanced data, and improved remote monitoring and control capabilities. It exists to promote the promise of connectivity, data visualization, and to enable AI and better decision-making.

Key challenges
However, there are challenges. Increased attack surface, legacy systems, and infrastructure, as well as differing security requirements and regulatory and compliance challenges are all present.

“As we witnessed our global infrastructure recover from the largest outage on July 19, this is a clear and present example of how the application of technology between IT/OT can have an impact on the underlying interdependencies in critical systems and infrastructure," says Cherise Esperaza, co-founder and president of Security Gate. "Therefore, there is an ever-increasing need for resources to be expended for this endeavor, and understanding the areas of risk alongside business outcomes as it relates to the convergence will be a critical to ensuring optimal availability of these systems.”

Increased monitoring

When it comes to security monitoring and incident response, it's vital to incorporate new tools to monitor, meeting the same standards as legacy assets and reporting vulnerabilities.

"Continuous monitoring is one of the most critical aspects of securing your IT/OT infrastructure," offers Eric Rippetoe, former CISO of Federal Energy Regulatory Commission and UTSI cybersecurity consultant. "Automated tools coupled with mature processes allow organizations to rapidly detect security threats and enable teams to quickly respond to address issues. Having a security incident and not knowing about it could result in huge remediation costs and major long-term reputational damage."

Emerging technology and trends
With the rise of AI, it makes sense now more than ever to follow the principle of "never trust, always verify." A Zero Trust architecture is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

In line with this approach, UTSI International Corporation, as a Gold Partner of ThreatGEN, has been intensively utilizing ThreatGEN's AutoTableTop™ incident response tabletop exercise simulation tool. This advanced technology is helping UTSI provide meaningful tabletop exercises to their client base, particularly in high-risk SCADA and OT environments.

Clint Bodungen, president of ThreatGEN, emphasizes the tool's significance: "This tool is designed to sharpen incident response capabilities for teams operating in critical SCADA and OT environments. In these high-stakes settings, where system availability is paramount and the consequences of failure can be catastrophic, AutoTableTop™ provides an unparalleled platform for realistic, AI-driven tabletop exercises. It allows teams to practice and refine their responses to a wide range of scenarios, with practically zero planning time required, ensuring they're prepared for the unique challenges posed by industrial control systems where even a minor slip-up could have deadly consequences. This application of advanced simulation technology aligns with the industry's move towards more robust and realistic cybersecurity training, especially in sectors where the stakes are exceptionally high."

In conclusion
The convergence of IT and OT presents significant cybersecurity challenges for critical infrastructure. However, by understanding these challenges and implementing effective strategies, organizations can protect their essential systems from cyber threats.

“Maintaining an accurate inventory of assets poses a significant challenge for companies with control system networks," says Derek Harp, chairman, Control System Cyber Security Association International. "As outlined in our 2024 OT Cybersecurity Technology Report, not only is it difficult to identify these assets, but understanding their communication adds an additional layer of complexity. Typically, companies only gain a snapshot of their OT network status and assets' interactions during periodic assessments. Not surprisingly, our research also indicates that the frequency of these critical evaluations is increasing.”

The role of UTSI's OT Cybersecurity Advisory Board, along with the use of advanced tools like Security Gate and ThreatGEN, is pivotal in navigating this complex landscape. As the threat landscape continues to evolve, proactive measures and ongoing investment in cybersecurity will be crucial to safeguarding our most critical assets.

UTSI expands service offerings with acquisition of Pandata Tech, enhancing AI/ML and data quality expertise

Announcing Acquisition

UTSI, a leading independent consulting and engineering firm specializing in automated system design, implementation, and project engineering services in Industrial Control Systems and Operational Technology, has announced the acquisition of Pandata Tech.

“The combination of Pandata Tech’s considerable experience with AI and Machine Learning technologies, along with UTSI’s global understanding and extensive background with real-time control systems and operations for large industrial applications, provides a unique fusion of complimentary expertise to solve problems for operators of complex systems that were previously unsolvable by a single entity," says Daniel Nagala, founder of UTSI.

Pandata Tech, founded in January 2016 in Houston, specializes in data quality solutions with an emphasis on AI and Machine Learning. “It was a natural fit for all of us," says Jessica Reitmeier, co-founder of Pandata Tech. "Pandata Tech and UTSI have been partners over the last couple of years. Pandata Tech’s AI/ML data quality products complement and support UTSI’s products and services. We’re able to offer clients a fuller solution together.”

“UTSI works with most major energy operators, and they have seen firsthand the challenge of managing data acquisition systems at scale. Pandata Tech’s risk mitigation technology is a perfect match with their services," says Gustavo Sanchez, co-founder of Pandata Tech.

UTSI has been offering technical consulting and systems integration for Operational Technology (predominantly around SCADA and ICS) solutions throughout Texas, the greater U.S., and international markets since 1985, serving asset owners and operators of critical infrastructure in varying industries. With the acquisition, UTSI will continue to target traditional energy, the clean energy and renewable sectors, water treatment facilities, and transportation. It will also leverage Pandata Tech’s expertise in the federal space utilizing its DoD contracting vehicles.

"I'm thrilled about this merger and the vast potential it brings to UTSI," says Shaun Six, president of UTSI. "Not only does it pave the way the way to better serve our current clients, but it also presents exciting opportunities in new markets."

InnovationMap interviewed UTSI’s president and CEO, Shaun Six, to learn more about how the strategic acquisition benefits for current and future clients of UTSI.

InnovationMap: Can you tell us about the decision to acquire Pandata Tech? What specific strengths or capabilities do you see in Pandata Tech that align with UTSI's mission and goals?

Shaun Six: Our decision to acquire Pandata Tech was driven by a clear strategic vision to expand and enhance our core capabilities, especially in cybersecurity for operational technology, AI, and data science. This move is particularly vital for sectors like energy, where the security and integrity of data and operational systems are of utmost importance.

We saw in Pandata Tech a unique blend of expertise in data science, AI, and machine learning (ML), bolstered by their significant experience in both the defense and energy sectors. This collaboration opens exciting avenues to enhance our service offerings, guaranteeing our clients receive the most cutting-edge and secure solutions on the market.

InnovationMap: How do you envision integrating Pandata Tech's AI/ML capabilities into UTSI's existing services and solutions?

Shaun Six: Integrating Pandata Tech's AI/ML expertise into our current offerings holds immense promise, especially in fortifying our cybersecurity measures for critical infrastructure. Utilizing their advanced skills in data labeling and analysis will enable us to offer our clients deeper and more nuanced insights into their operational environments. This means they'll have the capability to anticipate and counteract potential risks and threats more effectively.

Additionally, Pandata Tech's proficiency in evaluating data quality complements our commitment to the reliability and precision of crucial systems, including those for leak detection and control room management. This integration boosts our capacity to protect and refine the efficiency of essential infrastructures, ensuring operational excellence.

InnovationMap: Can you highlight any specific synergies or complementary aspects between UTSI's focus on OT, ICS, and SCADA cybersecurity and Pandata Tech's specialization in data science and AI/ML?

Shaun Six: There are notable complementary aspects between UTSI’s expertise in OT, ICS, and SCADA cybersecurity and Pandata Tech’s specialization in data science and AI/ML that make this partnership especially advantageous.

Our dedication to securing critical infrastructure meshes perfectly with Pandata Tech’s prowess in data analysis and risk evaluation. Merging our insights into OT, ICS, and SCADA systems with Pandata Tech's sophisticated analytics enables us to provide a holistic cybersecurity strategy that tackles not only traditional threats but also the nuanced challenges related to data integrity and quality.

Furthermore, Pandata Tech’s background in collaborating with the DoD and DoE, along with UTSI’s long history working alongside the DoD, enhances our capabilities to help secure and protect our nation's most critical infrastructures.

InnovationMap: How do you anticipate this acquisition will benefit UTSI's clients, particularly those in hazardous material regulation sectors such as PHMSA (Pipeline Hazardous Material Security Administration/TSA/DOT)?

Shaun Six: The acquisition of Pandata Tech is set to deliver substantial advantages to our clients, particularly those navigating the complex waters of hazardous material regulations like PHMSA. Leveraging Pandata Tech’s AI/ML technologies will enhance our capacity for detecting and addressing potential vulnerabilities tied to data integrity and cybersecurity. This means we’ll be able to offer more sophisticated monitoring and analytical tools for critical systems, empowering operators to preemptively tackle issues before they morph into major safety or compliance problems.

This allows us to look at external and internal bad actors, diagnose poor configuration of physical sensors, or mistakes in selected algorithms running on the edge while also monitoring the health of the physical infrastructure and the hardware/software combinations that make it possible to run and supervise infrastructure from a remote operations center. Our combined expertise will enable us to develop tailored solutions that meet the specific needs of clients in highly regulated industries, such as leak detection, simulation, and compliance reporting under PHMSA regulations.

InnovationMap: How will acquiring Pandata Tech strengthen UTSI's position in the market and differentiate your offerings from competitors?

Shaun Six: The acquisition of Pandata Tech will strengthen UTSI's position as a leader in cybersecurity and technology consulting for critical infrastructure sectors. By combining our domain expertise with Pandata Tech's advanced analytics capabilities, we can offer our clients a unique value proposition that goes beyond traditional cybersecurity solutions.

Our ability to provide actionable insights derived from sophisticated data analysis sets us apart from competitors, allowing us to deliver more effective and comprehensive solutions for safeguarding critical infrastructure against cyber threats and operational risks.

InnovationMap: Are there any specific projects or initiatives that you are particularly excited about pursuing as a result of this acquisition?

Shaun Six: Following this acquisition, we're thrilled about embarking on initiatives that capitalize on the combined strengths of UTSI's cybersecurity know-how in OT, ICS, and SCADA systems and Pandata Tech's proficiency in AI/ML.

A key project we're eager to pursue involves the creation of state-of-the-art monitoring and detection systems for critical infrastructure. By incorporating Pandata Tech's advanced techniques in data labeling and analysis, we aim to significantly enhance our capabilities in leak detection and control room operations.

This merger opens up avenues to venture into new markets and sectors, drawing on Pandata Tech's extensive experience in the defense and energy industries to tackle the evolving landscape of cybersecurity challenges across various domains.

Ad Placement 300x100
Ad Placement 300x600

CultureMap Emails are Awesome

UH study uncovers sustainable farming methods for hemp production

growth plan

A new University of Houston study of hemp microbes can potentially assist scientists in creating special mixtures of microbes to make hemp plants produce more CBD or have better-quality fibers.

The study, led by Abdul Latif Khan, an assistant professor of biotechnology at the Cullen College of Engineering Technology Division, was published in the journal Scientific Reports from the Nature Publishing Group. The team also included Venkatesh Balan, UH associate professor of biotechnology at the Cullen College of Engineering Technology Division; Aruna Weerasooriya, professor of medicinal plants at Prairie View A&M University; and Ram Ray, professor of agronomy at Prairie View A&M University.

The study examined microbiomes living in and around the roots (rhizosphere) and on the leaves (phyllosphere) of four types of hemp plants. The team at UH compared how these microorganisms differ between hemp grown for fiber and hemp grown for CBD production.

“In hemp, the microbiome is important in terms of optimizing the production of CBD and enhancing the quality of fiber,” Khan said in a news release. “This work explains how different genotypes of hemp harbor microbial communities to live inside and contribute to such processes. We showed how different types of hemp plants have their own special groups of tiny living microbes that help the plants grow and stay healthy.”

The study indicates that hemp cultivation can be improved by better understanding these distinct microbial communities, which impact growth, nutrient absorption, stress resilience, synthesis and more. This could help decrease the need for chemical inputs and allow growers to use more sustainable agricultural practices.

“Understanding these microorganisms can also lead to more sustainable farming methods, using nature to boost plant growth instead of relying heavily on chemicals,” Ahmad, the paper’s first author and doctoral student of Khan’s, said the news release.

Other findings in the study included higher fungal diversity in leaves and stems, higher bacterial diversity in roots and soil, and differing microbiome diversity. According to UH, CBD-rich varieties are currently in high demand for pharmaceutical products, and fiber-rich varieties are used in industrial applications like textiles.

Tom Hanks touches down at Space Center Houston for lunar film premiere

To The Moon

The Artemis Exhibit at Space Center Houston shimmered with star power as nearly 500 insiders gathered for an out-of-this-world affair celebrating the premiere of The Moonwalkers: A Journey with Tom Hanks. The immersive cinematic experience, narrated and co-written by Oscar-winning actor Tom Hanks, offers guests a front-row seat to the triumphs of past lunar missions and a look ahead to NASA’s Artemis era.

The VIP reception brought a celestial twist to the traditional cocktail hour. Guests were served shrimp and oysters, along with potato croquettes paired with peach gastrique, a playful nod to the first vegetable grown in space and the first fruit consumed on the Moon. Espresso martinis featuring Hanks’ coffee brand, Hanx, were shaken and served.

Inside the newly renovated Space Center Theater, a 270-degree projection mapping spectacle brought The Moonwalkers to life. The film weaves rare astronaut interviews with behind-the-scenes glimpses into the upcoming Artemis missions.

Following the screening, a panel discussion brought the experience back to Earth. William T. Harris, Space Center Houston president and CEO, moderated a conversation with Tom Hanks, Apollo 16 moonwalker Charlie Duke, and Artemis II astronauts Victor Glover, Christina Koch, and Reid Wiseman. Together, they explored the film’s themes and what lies ahead as humanity returns to the Moon.

The Moonwalkers: A Journey with Tom Hanks is now on view at Space Center Houston. The immersive show is included in the general admission price. It runs 50 minutes and showings begin on the half hour, starting at 10:30 am.

---

A version of this story originally appeared on our sister site, CultureMap.com.