Photo by Jasmin Merdan/Getty

Control room management (CRM) systems play an integral role in ensuring the safe and efficient remote operations of automated processes for the world's most critical infrastructures (CI). If anything goes wrong with these CIs, the risks are major: loss of life or catastrophic environmental disasters. For this reason, rigorous regulatory requirements are crucial.

CRM systems give operators the ability to automate and take control of CI processes, giving operators situational awareness and real-time visibility of remote assets. This minimizes the need for manual work and inspection, and scales a company's ability to safely manage many assets over a large geographical area from one control room.

Most CI have to handle hazardous material in some, if not all, of their operational areas. Though different by industry, regulations and oversight are extremely necessary.

ICS (Industrial Control Systems) and CRM tools are key components of real-time monitoring for advanced warning and emergency alarming. The combination of a “green, amber, red” alert on the screen of an operator's control console will prompt them to respond, and potentially lead to following emergency shut-down response procedures. Training and testing of the control systems and their related standards, procedures, and activities are all recorded in a system of record in compliance with regulatory requirements.

Current challenges
One of the biggest challenges is the ability to easily aggregate the data from the many different systems and integrate them with the operator's daily activity and responses to the many notifications they receive. This makes it difficult for handover, when a new control room operator comes in fresh to take over from the operator coming off duty. Ensuring a clean and clear handover that encompasses all the pertinent information, so that the new operator can take over the console with ease and clarity, is much more difficult than some would imagine.

Another issue is the sheer volume of data. When you have thousands of sensors streaming data, it is not unrealistic for a console to receive a few thousand data points per second. Performance and continuity are priorities on a CI control room console(s). So there is no room for error — meaning there is no room for big (quite literally) data.

All of this means that real-time data must be pushed off the operational and process control network and moved into an area where there are no controls, but big data can be stored to produce big-data analytic capabilities, enabling AI, machine learning, and other data science.

Controller/operator fatigue is also an issue. Manual tracking, documenting, and record-keeping increases fatigue, leading to more mistakes and omissions.

Opportunities for improvement
The Houston-based Tory Technologies, Inc.is a corporation specializing in advanced software applications, creating and integrating various innovative technologies, and providing solutions for control room management and electronic flow measurement data management.

Tory Technologies, Inc. can help with the auto population of forms, inclusion of historical alarms and responses, and easy handover of control with active/open issues highlighted, making for an easier transition from one operator to the next.

"CRM is essential for keeping operations safe and efficient in industries where mistakes can lead to serious problems," says Juan Torres, director of operations - MaCRoM at Tory Technologies, Inc. "While many control rooms have worked hard to meet compliance standards, challenges remain that can affect performance and safety. It's not enough to just meet the basic rules; we need to go further by using smarter tools and strategies that make CRM more than just compliant, but truly effective."

Shaun Six, president of UTSI International, notes that, "CRM solutions are scalable. A smart integration with relevant systems and related data will reduce 'white noise' and increase relevance of data being displayed at the right time, or recalled when most helpful."

The future state
Offering CRM as a service for non-regulated control rooms will give economies of scale to critical infrastructure operators, which will allow dispatching, troubleshooting, and network monitoring so operators can focus on more value-add activities.

It can also virtualize network monitoring, ensuring that field machines and edge computers are compliant with industry and company standards and are not exposed to external threats.

Even better: Much of this can be automated. Smart tools can look through each device and test that passwords are changed, configurations are secure, and firmware/software has been properly patched or safeguarded against known exploits.

The sheer volume of data from these exercises can be overwhelming to operators. But a trained professional can easily filter and curate this data, cutting through the noise and helping asset owners address high-risk/high-probability exploits and plan/manage them.

Ultimately, the goal is to make control rooms efficient, getting the right information to the right people at the right time, while also retaining and maintaining required documents and data, ensuring an operators “license to operator” is uninterrupted and easily accessible to external parties when requested or needed.

Integrating smart CRM systems, network monitoring tools, and testing/validating processes and procedures are all easily accessible with current technological capabilities and availability, letting operators focus on the task at hand with ease and peace of mind.

Courtesy photo

UTSI's advisory board digs into cybersecurity's challenges, trends + tech

From The Board

In today's digital landscape, the convergence of Information Technology (IT) and Operational Technology (OT) presents both opportunities and challenges for critical infrastructure asset owners and operators.

UTSI, a leading systems integrator of OT technology, has assembled an OT Cybersecurity Advisory Board to address these challenges and highlight standard processes and best practices to evaluate and secure these environments.

“We are excited about the strength of our esteemed Advisory Board and are confident that these strategic alliances will enhance our competitiveness,” says Shaun Six, president of UTSI International.

A few of the drivers of OT and IT convergence include increased efficiency, enhanced data, and improved remote monitoring and control capabilities. It exists to promote the promise of connectivity, data visualization, and to enable AI and better decision-making.

Key challenges
However, there are challenges. Increased attack surface, legacy systems, and infrastructure, as well as differing security requirements and regulatory and compliance challenges are all present.

“As we witnessed our global infrastructure recover from the largest outage on July 19, this is a clear and present example of how the application of technology between IT/OT can have an impact on the underlying interdependencies in critical systems and infrastructure," says Cherise Esperaza, co-founder and president of Security Gate. "Therefore, there is an ever-increasing need for resources to be expended for this endeavor, and understanding the areas of risk alongside business outcomes as it relates to the convergence will be a critical to ensuring optimal availability of these systems.”

Increased monitoring

When it comes to security monitoring and incident response, it's vital to incorporate new tools to monitor, meeting the same standards as legacy assets and reporting vulnerabilities.

"Continuous monitoring is one of the most critical aspects of securing your IT/OT infrastructure," offers Eric Rippetoe, former CISO of Federal Energy Regulatory Commission and UTSI cybersecurity consultant. "Automated tools coupled with mature processes allow organizations to rapidly detect security threats and enable teams to quickly respond to address issues. Having a security incident and not knowing about it could result in huge remediation costs and major long-term reputational damage."

Emerging technology and trends
With the rise of AI, it makes sense now more than ever to follow the principle of "never trust, always verify." A Zero Trust architecture is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

In line with this approach, UTSI International Corporation, as a Gold Partner of ThreatGEN, has been intensively utilizing ThreatGEN's AutoTableTop™ incident response tabletop exercise simulation tool. This advanced technology is helping UTSI provide meaningful tabletop exercises to their client base, particularly in high-risk SCADA and OT environments.

Clint Bodungen, president of ThreatGEN, emphasizes the tool's significance: "This tool is designed to sharpen incident response capabilities for teams operating in critical SCADA and OT environments. In these high-stakes settings, where system availability is paramount and the consequences of failure can be catastrophic, AutoTableTop™ provides an unparalleled platform for realistic, AI-driven tabletop exercises. It allows teams to practice and refine their responses to a wide range of scenarios, with practically zero planning time required, ensuring they're prepared for the unique challenges posed by industrial control systems where even a minor slip-up could have deadly consequences. This application of advanced simulation technology aligns with the industry's move towards more robust and realistic cybersecurity training, especially in sectors where the stakes are exceptionally high."

In conclusion
The convergence of IT and OT presents significant cybersecurity challenges for critical infrastructure. However, by understanding these challenges and implementing effective strategies, organizations can protect their essential systems from cyber threats.

“Maintaining an accurate inventory of assets poses a significant challenge for companies with control system networks," says Derek Harp, chairman, Control System Cyber Security Association International. "As outlined in our 2024 OT Cybersecurity Technology Report, not only is it difficult to identify these assets, but understanding their communication adds an additional layer of complexity. Typically, companies only gain a snapshot of their OT network status and assets' interactions during periodic assessments. Not surprisingly, our research also indicates that the frequency of these critical evaluations is increasing.”

The role of UTSI's OT Cybersecurity Advisory Board, along with the use of advanced tools like Security Gate and ThreatGEN, is pivotal in navigating this complex landscape. As the threat landscape continues to evolve, proactive measures and ongoing investment in cybersecurity will be crucial to safeguarding our most critical assets.

UTSI expands service offerings with acquisition of Pandata Tech, enhancing AI/ML and data quality expertise

Announcing Acquisition

UTSI, a leading independent consulting and engineering firm specializing in automated system design, implementation, and project engineering services in Industrial Control Systems and Operational Technology, has announced the acquisition of Pandata Tech.

“The combination of Pandata Tech’s considerable experience with AI and Machine Learning technologies, along with UTSI’s global understanding and extensive background with real-time control systems and operations for large industrial applications, provides a unique fusion of complimentary expertise to solve problems for operators of complex systems that were previously unsolvable by a single entity," says Daniel Nagala, founder of UTSI.

Pandata Tech, founded in January 2016 in Houston, specializes in data quality solutions with an emphasis on AI and Machine Learning. “It was a natural fit for all of us," says Jessica Reitmeier, co-founder of Pandata Tech. "Pandata Tech and UTSI have been partners over the last couple of years. Pandata Tech’s AI/ML data quality products complement and support UTSI’s products and services. We’re able to offer clients a fuller solution together.”

“UTSI works with most major energy operators, and they have seen firsthand the challenge of managing data acquisition systems at scale. Pandata Tech’s risk mitigation technology is a perfect match with their services," says Gustavo Sanchez, co-founder of Pandata Tech.

UTSI has been offering technical consulting and systems integration for Operational Technology (predominantly around SCADA and ICS) solutions throughout Texas, the greater U.S., and international markets since 1985, serving asset owners and operators of critical infrastructure in varying industries. With the acquisition, UTSI will continue to target traditional energy, the clean energy and renewable sectors, water treatment facilities, and transportation. It will also leverage Pandata Tech’s expertise in the federal space utilizing its DoD contracting vehicles.

"I'm thrilled about this merger and the vast potential it brings to UTSI," says Shaun Six, president of UTSI. "Not only does it pave the way the way to better serve our current clients, but it also presents exciting opportunities in new markets."

InnovationMap interviewed UTSI’s president and CEO, Shaun Six, to learn more about how the strategic acquisition benefits for current and future clients of UTSI.

InnovationMap: Can you tell us about the decision to acquire Pandata Tech? What specific strengths or capabilities do you see in Pandata Tech that align with UTSI's mission and goals?

Shaun Six: Our decision to acquire Pandata Tech was driven by a clear strategic vision to expand and enhance our core capabilities, especially in cybersecurity for operational technology, AI, and data science. This move is particularly vital for sectors like energy, where the security and integrity of data and operational systems are of utmost importance.

We saw in Pandata Tech a unique blend of expertise in data science, AI, and machine learning (ML), bolstered by their significant experience in both the defense and energy sectors. This collaboration opens exciting avenues to enhance our service offerings, guaranteeing our clients receive the most cutting-edge and secure solutions on the market.

InnovationMap: How do you envision integrating Pandata Tech's AI/ML capabilities into UTSI's existing services and solutions?

Shaun Six: Integrating Pandata Tech's AI/ML expertise into our current offerings holds immense promise, especially in fortifying our cybersecurity measures for critical infrastructure. Utilizing their advanced skills in data labeling and analysis will enable us to offer our clients deeper and more nuanced insights into their operational environments. This means they'll have the capability to anticipate and counteract potential risks and threats more effectively.

Additionally, Pandata Tech's proficiency in evaluating data quality complements our commitment to the reliability and precision of crucial systems, including those for leak detection and control room management. This integration boosts our capacity to protect and refine the efficiency of essential infrastructures, ensuring operational excellence.

InnovationMap: Can you highlight any specific synergies or complementary aspects between UTSI's focus on OT, ICS, and SCADA cybersecurity and Pandata Tech's specialization in data science and AI/ML?

Shaun Six: There are notable complementary aspects between UTSI’s expertise in OT, ICS, and SCADA cybersecurity and Pandata Tech’s specialization in data science and AI/ML that make this partnership especially advantageous.

Our dedication to securing critical infrastructure meshes perfectly with Pandata Tech’s prowess in data analysis and risk evaluation. Merging our insights into OT, ICS, and SCADA systems with Pandata Tech's sophisticated analytics enables us to provide a holistic cybersecurity strategy that tackles not only traditional threats but also the nuanced challenges related to data integrity and quality.

Furthermore, Pandata Tech’s background in collaborating with the DoD and DoE, along with UTSI’s long history working alongside the DoD, enhances our capabilities to help secure and protect our nation's most critical infrastructures.

InnovationMap: How do you anticipate this acquisition will benefit UTSI's clients, particularly those in hazardous material regulation sectors such as PHMSA (Pipeline Hazardous Material Security Administration/TSA/DOT)?

Shaun Six: The acquisition of Pandata Tech is set to deliver substantial advantages to our clients, particularly those navigating the complex waters of hazardous material regulations like PHMSA. Leveraging Pandata Tech’s AI/ML technologies will enhance our capacity for detecting and addressing potential vulnerabilities tied to data integrity and cybersecurity. This means we’ll be able to offer more sophisticated monitoring and analytical tools for critical systems, empowering operators to preemptively tackle issues before they morph into major safety or compliance problems.

This allows us to look at external and internal bad actors, diagnose poor configuration of physical sensors, or mistakes in selected algorithms running on the edge while also monitoring the health of the physical infrastructure and the hardware/software combinations that make it possible to run and supervise infrastructure from a remote operations center. Our combined expertise will enable us to develop tailored solutions that meet the specific needs of clients in highly regulated industries, such as leak detection, simulation, and compliance reporting under PHMSA regulations.

InnovationMap: How will acquiring Pandata Tech strengthen UTSI's position in the market and differentiate your offerings from competitors?

Shaun Six: The acquisition of Pandata Tech will strengthen UTSI's position as a leader in cybersecurity and technology consulting for critical infrastructure sectors. By combining our domain expertise with Pandata Tech's advanced analytics capabilities, we can offer our clients a unique value proposition that goes beyond traditional cybersecurity solutions.

Our ability to provide actionable insights derived from sophisticated data analysis sets us apart from competitors, allowing us to deliver more effective and comprehensive solutions for safeguarding critical infrastructure against cyber threats and operational risks.

InnovationMap: Are there any specific projects or initiatives that you are particularly excited about pursuing as a result of this acquisition?

Shaun Six: Following this acquisition, we're thrilled about embarking on initiatives that capitalize on the combined strengths of UTSI's cybersecurity know-how in OT, ICS, and SCADA systems and Pandata Tech's proficiency in AI/ML.

A key project we're eager to pursue involves the creation of state-of-the-art monitoring and detection systems for critical infrastructure. By incorporating Pandata Tech's advanced techniques in data labeling and analysis, we aim to significantly enhance our capabilities in leak detection and control room operations.

This merger opens up avenues to venture into new markets and sectors, drawing on Pandata Tech's extensive experience in the defense and energy industries to tackle the evolving landscape of cybersecurity challenges across various domains.

Ad Placement 300x100
Ad Placement 300x600

CultureMap Emails are Awesome

Houston investment firm names tech exec as new partner

new hire

Houston tech executive Robert Kester has joined Houston-based Veriten, an energy-focused research, investment and strategy firm, as technology and innovation partner.

Kester most recently served as chief technology officer for emissions solutions at Honeywell Process Solutions, where he worked for five years. Honeywell International acquired Houston-based oil and gas technology company Rebellion Photonics, where Kester was co-founder and CEO, in 2019.

Honeywell Process Solutions shares offices in Houston with the global headquarters of Honeywell Performance Materials and Technologies. Honeywell, a Fortune 100 conglomerate, employs more than 850 people in Houston.

“We are thrilled to welcome Robert to the Veriten team,” founder and CEO Maynard Holt said in a statement, “and are confident that his technical expertise and skills will make a big contribution to Veriten’s partner and investor community. He will [oversee] every aspect of what we do, with the use case for AI in energy high on the 2025 priority list.”

Kester earned a doctoral degree in bioengineering from Rice University, a master’s degree in optical sciences from the University of Arizona and a bachelor’s degree in laser optical engineering technology from the Oregon Institute of Technology. He holds 25 patents and has more than 25 patents pending.

Veriten celebrated its third anniversary on January 10, the day that the hiring of Kester was announced. The startup launched with seven employees.

“With the addition of Dr. Kester, we are a 26-person team and are as enthusiastic as ever about improving the energy dialogue and researching the future paths for energy,” Holt added.

Kester spoke on the Houston Innovators Podcast in 2021. Listen here

.

SpaceX loses mega rocket in latest thrilling Starship test flight

Testing

SpaceX launched its Starship rocket on its latest test flight Thursday, but the spacecraft was destroyed following a thrilling booster catch back at the pad.

Elon Musk’s company said Starship broke apart — what it called a “rapid unscheduled disassembly." The spacecraft's six engines appeared to shut down one by one during ascent, with contact lost just 8 1/2 minutes into the flight.

The spacecraft — a new and upgraded model making its debut — was supposed to soar across the Gulf of Mexico from Texas on a near loop around the world similar to previous test flights. SpaceX had packed it with 10 dummy satellites for practice at releasing them.

A minute before the loss, SpaceX used the launch tower's giant mechanical arms to catch the returning booster, a feat achieved only once before. The descending booster hovered over the launch pad before being gripped by the pair of arms dubbed chopsticks.

The thrill of the catch quickly turned into disappointment for not only the company, but the crowds gathered along the southern tip of Texas.

“It was great to see a booster come down, but we are obviously bummed out about [the] ship,” said SpaceX spokesman Dan Huot. “It’s a flight test. It’s an experimental vehicle," he stressed.

The last data received from the spacecraft indicated an altitude of 90 miles and a velocity of 13,245 mph.

Musk said a preliminary analysis suggests leaking fuel may have built up pressure in a cavity above the engine firewall. Fire suppression will be added to the area, with increased venting and double-checking for leaks, he said via X.

The 400-foot rocket had thundered away in late afternoon from Boca Chica Beach near the Mexican border. The late hour ensured a daylight entry halfway around the world in the Indian Ocean. But the shiny retro-looking spacecraft never got nearly that far.

SpaceX had made improvements to the spacecraft for the latest demo and added a fleet of satellite mockups. The test satellites were the same size as SpaceX’s Starlink internet satellites and, like the spacecraft, were meant to be destroyed upon entry.

Musk plans to launch actual Starlinks on Starships before moving on to other satellites and, eventually, crews.

It was the seventh test flight for the world’s biggest and most powerful rocket. NASA has reserved a pair of Starships to land astronauts on the moon later this decade. Musk’s goal is Mars.

Hours earlier in Florida, another billionaire’s rocket company — Jeff Bezos’ Blue Origin — launched the newest supersized rocket, New Glenn. The rocket reached orbit on its first flight, successfully placing an experimental satellite thousands of miles above Earth. But the first-stage booster was destroyed, missing its targeted landing on a floating platform in the Atlantic.