Photo by Jasmin Merdan/Getty

Control room management (CRM) systems play an integral role in ensuring the safe and efficient remote operations of automated processes for the world's most critical infrastructures (CI). If anything goes wrong with these CIs, the risks are major: loss of life or catastrophic environmental disasters. For this reason, rigorous regulatory requirements are crucial.

CRM systems give operators the ability to automate and take control of CI processes, giving operators situational awareness and real-time visibility of remote assets. This minimizes the need for manual work and inspection, and scales a company's ability to safely manage many assets over a large geographical area from one control room.

Most CI have to handle hazardous material in some, if not all, of their operational areas. Though different by industry, regulations and oversight are extremely necessary.

ICS (Industrial Control Systems) and CRM tools are key components of real-time monitoring for advanced warning and emergency alarming. The combination of a “green, amber, red” alert on the screen of an operator's control console will prompt them to respond, and potentially lead to following emergency shut-down response procedures. Training and testing of the control systems and their related standards, procedures, and activities are all recorded in a system of record in compliance with regulatory requirements.

Current challenges
One of the biggest challenges is the ability to easily aggregate the data from the many different systems and integrate them with the operator's daily activity and responses to the many notifications they receive. This makes it difficult for handover, when a new control room operator comes in fresh to take over from the operator coming off duty. Ensuring a clean and clear handover that encompasses all the pertinent information, so that the new operator can take over the console with ease and clarity, is much more difficult than some would imagine.

Another issue is the sheer volume of data. When you have thousands of sensors streaming data, it is not unrealistic for a console to receive a few thousand data points per second. Performance and continuity are priorities on a CI control room console(s). So there is no room for error — meaning there is no room for big (quite literally) data.

All of this means that real-time data must be pushed off the operational and process control network and moved into an area where there are no controls, but big data can be stored to produce big-data analytic capabilities, enabling AI, machine learning, and other data science.

Controller/operator fatigue is also an issue. Manual tracking, documenting, and record-keeping increases fatigue, leading to more mistakes and omissions.

Opportunities for improvement
The Houston-based Tory Technologies, Inc.is a corporation specializing in advanced software applications, creating and integrating various innovative technologies, and providing solutions for control room management and electronic flow measurement data management.

Tory Technologies, Inc. can help with the auto population of forms, inclusion of historical alarms and responses, and easy handover of control with active/open issues highlighted, making for an easier transition from one operator to the next.

"CRM is essential for keeping operations safe and efficient in industries where mistakes can lead to serious problems," says Juan Torres, director of operations - MaCRoM at Tory Technologies, Inc. "While many control rooms have worked hard to meet compliance standards, challenges remain that can affect performance and safety. It's not enough to just meet the basic rules; we need to go further by using smarter tools and strategies that make CRM more than just compliant, but truly effective."

Shaun Six, president of UTSI International, notes that, "CRM solutions are scalable. A smart integration with relevant systems and related data will reduce 'white noise' and increase relevance of data being displayed at the right time, or recalled when most helpful."

The future state
Offering CRM as a service for non-regulated control rooms will give economies of scale to critical infrastructure operators, which will allow dispatching, troubleshooting, and network monitoring so operators can focus on more value-add activities.

It can also virtualize network monitoring, ensuring that field machines and edge computers are compliant with industry and company standards and are not exposed to external threats.

Even better: Much of this can be automated. Smart tools can look through each device and test that passwords are changed, configurations are secure, and firmware/software has been properly patched or safeguarded against known exploits.

The sheer volume of data from these exercises can be overwhelming to operators. But a trained professional can easily filter and curate this data, cutting through the noise and helping asset owners address high-risk/high-probability exploits and plan/manage them.

Ultimately, the goal is to make control rooms efficient, getting the right information to the right people at the right time, while also retaining and maintaining required documents and data, ensuring an operators “license to operator” is uninterrupted and easily accessible to external parties when requested or needed.

Integrating smart CRM systems, network monitoring tools, and testing/validating processes and procedures are all easily accessible with current technological capabilities and availability, letting operators focus on the task at hand with ease and peace of mind.

Courtesy photo

UTSI's advisory board digs into cybersecurity's challenges, trends + tech

From The Board

In today's digital landscape, the convergence of Information Technology (IT) and Operational Technology (OT) presents both opportunities and challenges for critical infrastructure asset owners and operators.

UTSI, a leading systems integrator of OT technology, has assembled an OT Cybersecurity Advisory Board to address these challenges and highlight standard processes and best practices to evaluate and secure these environments.

“We are excited about the strength of our esteemed Advisory Board and are confident that these strategic alliances will enhance our competitiveness,” says Shaun Six, president of UTSI International.

A few of the drivers of OT and IT convergence include increased efficiency, enhanced data, and improved remote monitoring and control capabilities. It exists to promote the promise of connectivity, data visualization, and to enable AI and better decision-making.

Key challenges
However, there are challenges. Increased attack surface, legacy systems, and infrastructure, as well as differing security requirements and regulatory and compliance challenges are all present.

“As we witnessed our global infrastructure recover from the largest outage on July 19, this is a clear and present example of how the application of technology between IT/OT can have an impact on the underlying interdependencies in critical systems and infrastructure," says Cherise Esperaza, co-founder and president of Security Gate. "Therefore, there is an ever-increasing need for resources to be expended for this endeavor, and understanding the areas of risk alongside business outcomes as it relates to the convergence will be a critical to ensuring optimal availability of these systems.”

Increased monitoring

When it comes to security monitoring and incident response, it's vital to incorporate new tools to monitor, meeting the same standards as legacy assets and reporting vulnerabilities.

"Continuous monitoring is one of the most critical aspects of securing your IT/OT infrastructure," offers Eric Rippetoe, former CISO of Federal Energy Regulatory Commission and UTSI cybersecurity consultant. "Automated tools coupled with mature processes allow organizations to rapidly detect security threats and enable teams to quickly respond to address issues. Having a security incident and not knowing about it could result in huge remediation costs and major long-term reputational damage."

Emerging technology and trends
With the rise of AI, it makes sense now more than ever to follow the principle of "never trust, always verify." A Zero Trust architecture is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

In line with this approach, UTSI International Corporation, as a Gold Partner of ThreatGEN, has been intensively utilizing ThreatGEN's AutoTableTop™ incident response tabletop exercise simulation tool. This advanced technology is helping UTSI provide meaningful tabletop exercises to their client base, particularly in high-risk SCADA and OT environments.

Clint Bodungen, president of ThreatGEN, emphasizes the tool's significance: "This tool is designed to sharpen incident response capabilities for teams operating in critical SCADA and OT environments. In these high-stakes settings, where system availability is paramount and the consequences of failure can be catastrophic, AutoTableTop™ provides an unparalleled platform for realistic, AI-driven tabletop exercises. It allows teams to practice and refine their responses to a wide range of scenarios, with practically zero planning time required, ensuring they're prepared for the unique challenges posed by industrial control systems where even a minor slip-up could have deadly consequences. This application of advanced simulation technology aligns with the industry's move towards more robust and realistic cybersecurity training, especially in sectors where the stakes are exceptionally high."

In conclusion
The convergence of IT and OT presents significant cybersecurity challenges for critical infrastructure. However, by understanding these challenges and implementing effective strategies, organizations can protect their essential systems from cyber threats.

“Maintaining an accurate inventory of assets poses a significant challenge for companies with control system networks," says Derek Harp, chairman, Control System Cyber Security Association International. "As outlined in our 2024 OT Cybersecurity Technology Report, not only is it difficult to identify these assets, but understanding their communication adds an additional layer of complexity. Typically, companies only gain a snapshot of their OT network status and assets' interactions during periodic assessments. Not surprisingly, our research also indicates that the frequency of these critical evaluations is increasing.”

The role of UTSI's OT Cybersecurity Advisory Board, along with the use of advanced tools like Security Gate and ThreatGEN, is pivotal in navigating this complex landscape. As the threat landscape continues to evolve, proactive measures and ongoing investment in cybersecurity will be crucial to safeguarding our most critical assets.

UTSI expands service offerings with acquisition of Pandata Tech, enhancing AI/ML and data quality expertise

Announcing Acquisition

UTSI, a leading independent consulting and engineering firm specializing in automated system design, implementation, and project engineering services in Industrial Control Systems and Operational Technology, has announced the acquisition of Pandata Tech.

“The combination of Pandata Tech’s considerable experience with AI and Machine Learning technologies, along with UTSI’s global understanding and extensive background with real-time control systems and operations for large industrial applications, provides a unique fusion of complimentary expertise to solve problems for operators of complex systems that were previously unsolvable by a single entity," says Daniel Nagala, founder of UTSI.

Pandata Tech, founded in January 2016 in Houston, specializes in data quality solutions with an emphasis on AI and Machine Learning. “It was a natural fit for all of us," says Jessica Reitmeier, co-founder of Pandata Tech. "Pandata Tech and UTSI have been partners over the last couple of years. Pandata Tech’s AI/ML data quality products complement and support UTSI’s products and services. We’re able to offer clients a fuller solution together.”

“UTSI works with most major energy operators, and they have seen firsthand the challenge of managing data acquisition systems at scale. Pandata Tech’s risk mitigation technology is a perfect match with their services," says Gustavo Sanchez, co-founder of Pandata Tech.

UTSI has been offering technical consulting and systems integration for Operational Technology (predominantly around SCADA and ICS) solutions throughout Texas, the greater U.S., and international markets since 1985, serving asset owners and operators of critical infrastructure in varying industries. With the acquisition, UTSI will continue to target traditional energy, the clean energy and renewable sectors, water treatment facilities, and transportation. It will also leverage Pandata Tech’s expertise in the federal space utilizing its DoD contracting vehicles.

"I'm thrilled about this merger and the vast potential it brings to UTSI," says Shaun Six, president of UTSI. "Not only does it pave the way the way to better serve our current clients, but it also presents exciting opportunities in new markets."

InnovationMap interviewed UTSI’s president and CEO, Shaun Six, to learn more about how the strategic acquisition benefits for current and future clients of UTSI.

InnovationMap: Can you tell us about the decision to acquire Pandata Tech? What specific strengths or capabilities do you see in Pandata Tech that align with UTSI's mission and goals?

Shaun Six: Our decision to acquire Pandata Tech was driven by a clear strategic vision to expand and enhance our core capabilities, especially in cybersecurity for operational technology, AI, and data science. This move is particularly vital for sectors like energy, where the security and integrity of data and operational systems are of utmost importance.

We saw in Pandata Tech a unique blend of expertise in data science, AI, and machine learning (ML), bolstered by their significant experience in both the defense and energy sectors. This collaboration opens exciting avenues to enhance our service offerings, guaranteeing our clients receive the most cutting-edge and secure solutions on the market.

InnovationMap: How do you envision integrating Pandata Tech's AI/ML capabilities into UTSI's existing services and solutions?

Shaun Six: Integrating Pandata Tech's AI/ML expertise into our current offerings holds immense promise, especially in fortifying our cybersecurity measures for critical infrastructure. Utilizing their advanced skills in data labeling and analysis will enable us to offer our clients deeper and more nuanced insights into their operational environments. This means they'll have the capability to anticipate and counteract potential risks and threats more effectively.

Additionally, Pandata Tech's proficiency in evaluating data quality complements our commitment to the reliability and precision of crucial systems, including those for leak detection and control room management. This integration boosts our capacity to protect and refine the efficiency of essential infrastructures, ensuring operational excellence.

InnovationMap: Can you highlight any specific synergies or complementary aspects between UTSI's focus on OT, ICS, and SCADA cybersecurity and Pandata Tech's specialization in data science and AI/ML?

Shaun Six: There are notable complementary aspects between UTSI’s expertise in OT, ICS, and SCADA cybersecurity and Pandata Tech’s specialization in data science and AI/ML that make this partnership especially advantageous.

Our dedication to securing critical infrastructure meshes perfectly with Pandata Tech’s prowess in data analysis and risk evaluation. Merging our insights into OT, ICS, and SCADA systems with Pandata Tech's sophisticated analytics enables us to provide a holistic cybersecurity strategy that tackles not only traditional threats but also the nuanced challenges related to data integrity and quality.

Furthermore, Pandata Tech’s background in collaborating with the DoD and DoE, along with UTSI’s long history working alongside the DoD, enhances our capabilities to help secure and protect our nation's most critical infrastructures.

InnovationMap: How do you anticipate this acquisition will benefit UTSI's clients, particularly those in hazardous material regulation sectors such as PHMSA (Pipeline Hazardous Material Security Administration/TSA/DOT)?

Shaun Six: The acquisition of Pandata Tech is set to deliver substantial advantages to our clients, particularly those navigating the complex waters of hazardous material regulations like PHMSA. Leveraging Pandata Tech’s AI/ML technologies will enhance our capacity for detecting and addressing potential vulnerabilities tied to data integrity and cybersecurity. This means we’ll be able to offer more sophisticated monitoring and analytical tools for critical systems, empowering operators to preemptively tackle issues before they morph into major safety or compliance problems.

This allows us to look at external and internal bad actors, diagnose poor configuration of physical sensors, or mistakes in selected algorithms running on the edge while also monitoring the health of the physical infrastructure and the hardware/software combinations that make it possible to run and supervise infrastructure from a remote operations center. Our combined expertise will enable us to develop tailored solutions that meet the specific needs of clients in highly regulated industries, such as leak detection, simulation, and compliance reporting under PHMSA regulations.

InnovationMap: How will acquiring Pandata Tech strengthen UTSI's position in the market and differentiate your offerings from competitors?

Shaun Six: The acquisition of Pandata Tech will strengthen UTSI's position as a leader in cybersecurity and technology consulting for critical infrastructure sectors. By combining our domain expertise with Pandata Tech's advanced analytics capabilities, we can offer our clients a unique value proposition that goes beyond traditional cybersecurity solutions.

Our ability to provide actionable insights derived from sophisticated data analysis sets us apart from competitors, allowing us to deliver more effective and comprehensive solutions for safeguarding critical infrastructure against cyber threats and operational risks.

InnovationMap: Are there any specific projects or initiatives that you are particularly excited about pursuing as a result of this acquisition?

Shaun Six: Following this acquisition, we're thrilled about embarking on initiatives that capitalize on the combined strengths of UTSI's cybersecurity know-how in OT, ICS, and SCADA systems and Pandata Tech's proficiency in AI/ML.

A key project we're eager to pursue involves the creation of state-of-the-art monitoring and detection systems for critical infrastructure. By incorporating Pandata Tech's advanced techniques in data labeling and analysis, we aim to significantly enhance our capabilities in leak detection and control room operations.

This merger opens up avenues to venture into new markets and sectors, drawing on Pandata Tech's extensive experience in the defense and energy industries to tackle the evolving landscape of cybersecurity challenges across various domains.

Ad Placement 300x100
Ad Placement 300x600

CultureMap Emails are Awesome

Tesla recalling more than 375,000 vehicles due to power steering issue

Tesla Talk

Tesla is recalling more than 375,000 vehicles due to a power steering issue.

The recall is for certain 2023 Model 3 and Model Y vehicles operating software prior to 2023.38.4, according to the National Highway Traffic Safety Administration.

The printed circuit board for the electronic power steering assist may become overstressed, causing a loss of power steering assist when the vehicle reaches a stop and then accelerates again, the agency said.

The loss of power could required more effort to control the car by drivers, particularly at low speeds, increasing the risk of a crash.

Tesla isn't aware of any crashes, injuries, or deaths related to the condition.

The electric vehicle maker headed by Elon Musk has released a free software update to address the issue.

Letters are expected to be sent to vehicle owners on March 25. Owners may contact Tesla customer service at 1-877-798-3752 or the NHTSA at 1-888-327-4236.

Houston space tech companies land $25 million from Texas commission

Out Of This World

Two Houston aerospace companies have collectively received $25 million in grants from the Texas Space Commission.

Starlab Space picked up a $15 million grant, and Intuitive Machines gained a $10 million grant, according to a Space Commission news release.

Starlab Space says the money will help it develop the Systems Integration Lab in Webster, which will feature two components — the main lab and a software verification facility. The integration lab will aid creation of Starlab’s commercial space station.

“To ensure the success of our future space missions, we are starting with state-of-the-art testing facilities that will include the closest approximation to the flight environment as possible and allow us to verify requirements and validate the design of the Starlab space station,” Starlab CEO Tim Kopra said in a news release.

Starlab’s grant comes on top of a $217.5 million award from NASA to help eventually transition activity from the soon-to-be-retired International Space Station to new commercial destinations.

Intuitive Machines is a space exploration, infrastructure and services company. Among its projects are a lunar lander designed to land on the moon and a lunar rover designed for astronauts to travel on the moon’s surface.

The grants come from the Space Commission’s Space Exploration and Aeronautics Research Fund, which recently awarded $47.7 million to Texas companies.

Other recipients were:

  • Cedar Park-based Firefly Aerospace, which received $8.2 million
  • Brownsville-based Space Exploration Technologies (SpaceX), which received $7.5 million
  • Van Horn-based Blue Origin, which received $7 million

Gwen Griffin, chair of the commission, says the grants “will support Texas companies as we grow commercial, military, and civil aerospace activity across the state.”

State lawmakers established the commission in 2023, along with the Texas Aerospace Research & Space Economy Consortium, to bolster the state’s space industry.

Houston experts: Can AI bridge the gap between tech ambitions and market realities?

guest column

Despite successful IPOs from the likes of Ibotta, Reddit and OneStream, 2024 hasn’t provided the influx of capital-raising opportunities that many late-stage tech startups and venture capitalists (VCs) have been waiting for. Since highs last seen in 2021—when 90 tech companies went public—the IPO market has been effectively frozen, with just five tech IPOs between January and September 2024.

As a result, limited partners have not been able to replenish investments and redeploy capital. This shifting investment landscape has VCs and tech leaders feeling stuck in a holding pattern. Tech leaders are hesitant to enter the public markets because valuations are down 30 percent to 40 percent from 2021, which is also making late-stage fundraising more challenging. After all, longer IPO timelines mean fewer exit opportunities for VCs and reduced capital from institutional investors who are turning toward shorter-term investments with more liquid exit options.

Of course, there’s always an exception. And in the case of a slowed IPO market, a select slice of tech companies—AI-related companies—are far outperforming others. While not every tech startup has AI software or infrastructure as their core offering, most can benefit from using AI to revise their playbook and become more attractive to investors.

Unlocking Growth Potential with AI

While overall tech startup investment has slowed, the AI sector burns bright. This presents an opportunity for companies that strategically leverage AI, not just as a buzzword but as a tool for genuine growth and differentiation. Imagine a future where AI-powered insights unlock unprecedented efficiency, customer engagement and a paradigm shift in value creation. This isn’t just about weathering the current storm of reduced access to capital; it’s about emerging stronger, ready to lead the next wave of tech innovation.

Here's how to navigate the AI frontier and unlock its potential:

  1. Understand that data is the foundation of AI success. AI is powerful, but it’s not magic. It thrives on high-quality, interconnected data. Before diving into AI initiatives, companies must assess their data health. Is it structured in a way that AI can understand? Does it go beyond raw numbers to capture context and meaning—like customer sentiment alongside sales figures? Rethinking data infrastructure is often the crucial first step.
  1. Focus on amplifying strengths, not reinventing the wheel. The allure of AI can tempt companies into pursuing radical reinvention. However, a more effective strategy is to leverage AI to enhance existing strengths and address core customer needs. Why do customers choose your company? How can AI supercharge your value proposition? Consider Reddit’s strategic approach: They didn’t overhaul their platform before their 2024 IPO. Instead, they showcased the value of their vast online communities as fertile ground for AI development, leading to a remarkable first-day stock surge of 48 percent.

  2. Use AI as a customer-centric force multiplier. Companies with a deep understanding of their customer base are primed for AI success. By integrating AI into the very core of their product or service—the reason customers choose them—they can create a decisive competitive advantage based on delivering tangible customer value.

From Incremental Gains to Transformative Growth

This practical, customer-centric approach has the potential to help companies generate immediate growth while laying the foundation for future reinvention. By leveraging AI to optimize operations, deepen customer relationships, and redefine industry paradigms, late-state tech startups can not only survive but thrive in a dynamic market. The future belongs to those who embrace AI not as a destination but as a continuous journey of innovation and growth.

------

Hong Ogle is the president of Bank of America Houston. Rodrigo Ortiz Gomez is a market executive in Bank of America’s Transformative Technology Banking Group as well as the national software banking lead for the Global Commercial Bank.