Courtesy photo

In today's digital landscape, the convergence of Information Technology (IT) and Operational Technology (OT) presents both opportunities and challenges for critical infrastructure asset owners and operators.

UTSI, a leading systems integrator of OT technology, has assembled an OT Cybersecurity Advisory Board to address these challenges and highlight standard processes and best practices to evaluate and secure these environments.

“We are excited about the strength of our esteemed Advisory Board and are confident that these strategic alliances will enhance our competitiveness,” says Shaun Six, president of UTSI International.

A few of the drivers of OT and IT convergence include increased efficiency, enhanced data, and improved remote monitoring and control capabilities. It exists to promote the promise of connectivity, data visualization, and to enable AI and better decision-making.

Key challenges
However, there are challenges. Increased attack surface, legacy systems, and infrastructure, as well as differing security requirements and regulatory and compliance challenges are all present.

“As we witnessed our global infrastructure recover from the largest outage on July 19, this is a clear and present example of how the application of technology between IT/OT can have an impact on the underlying interdependencies in critical systems and infrastructure," says Cherise Esperaza, co-founder and president of Security Gate. "Therefore, there is an ever-increasing need for resources to be expended for this endeavor, and understanding the areas of risk alongside business outcomes as it relates to the convergence will be a critical to ensuring optimal availability of these systems.”

Increased monitoring

When it comes to security monitoring and incident response, it's vital to incorporate new tools to monitor, meeting the same standards as legacy assets and reporting vulnerabilities.

"Continuous monitoring is one of the most critical aspects of securing your IT/OT infrastructure," offers Eric Rippetoe, former CISO of Federal Energy Regulatory Commission and UTSI cybersecurity consultant. "Automated tools coupled with mature processes allow organizations to rapidly detect security threats and enable teams to quickly respond to address issues. Having a security incident and not knowing about it could result in huge remediation costs and major long-term reputational damage."

Emerging technology and trends
With the rise of AI, it makes sense now more than ever to follow the principle of "never trust, always verify." A Zero Trust architecture is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

In line with this approach, UTSI International Corporation, as a Gold Partner of ThreatGEN, has been intensively utilizing ThreatGEN's AutoTableTop™ incident response tabletop exercise simulation tool. This advanced technology is helping UTSI provide meaningful tabletop exercises to their client base, particularly in high-risk SCADA and OT environments.

Clint Bodungen, president of ThreatGEN, emphasizes the tool's significance: "This tool is designed to sharpen incident response capabilities for teams operating in critical SCADA and OT environments. In these high-stakes settings, where system availability is paramount and the consequences of failure can be catastrophic, AutoTableTop™ provides an unparalleled platform for realistic, AI-driven tabletop exercises. It allows teams to practice and refine their responses to a wide range of scenarios, with practically zero planning time required, ensuring they're prepared for the unique challenges posed by industrial control systems where even a minor slip-up could have deadly consequences. This application of advanced simulation technology aligns with the industry's move towards more robust and realistic cybersecurity training, especially in sectors where the stakes are exceptionally high."

In conclusion
The convergence of IT and OT presents significant cybersecurity challenges for critical infrastructure. However, by understanding these challenges and implementing effective strategies, organizations can protect their essential systems from cyber threats.

“Maintaining an accurate inventory of assets poses a significant challenge for companies with control system networks," says Derek Harp, chairman, Control System Cyber Security Association International. "As outlined in our 2024 OT Cybersecurity Technology Report, not only is it difficult to identify these assets, but understanding their communication adds an additional layer of complexity. Typically, companies only gain a snapshot of their OT network status and assets' interactions during periodic assessments. Not surprisingly, our research also indicates that the frequency of these critical evaluations is increasing.”

The role of UTSI's OT Cybersecurity Advisory Board, along with the use of advanced tools like Security Gate and ThreatGEN, is pivotal in navigating this complex landscape. As the threat landscape continues to evolve, proactive measures and ongoing investment in cybersecurity will be crucial to safeguarding our most critical assets.

UTSI expands service offerings with acquisition of Pandata Tech, enhancing AI/ML and data quality expertise

Announcing Acquisition

UTSI, a leading independent consulting and engineering firm specializing in automated system design, implementation, and project engineering services in Industrial Control Systems and Operational Technology, has announced the acquisition of Pandata Tech.

“The combination of Pandata Tech’s considerable experience with AI and Machine Learning technologies, along with UTSI’s global understanding and extensive background with real-time control systems and operations for large industrial applications, provides a unique fusion of complimentary expertise to solve problems for operators of complex systems that were previously unsolvable by a single entity," says Daniel Nagala, founder of UTSI.

Pandata Tech, founded in January 2016 in Houston, specializes in data quality solutions with an emphasis on AI and Machine Learning. “It was a natural fit for all of us," says Jessica Reitmeier, co-founder of Pandata Tech. "Pandata Tech and UTSI have been partners over the last couple of years. Pandata Tech’s AI/ML data quality products complement and support UTSI’s products and services. We’re able to offer clients a fuller solution together.”

“UTSI works with most major energy operators, and they have seen firsthand the challenge of managing data acquisition systems at scale. Pandata Tech’s risk mitigation technology is a perfect match with their services," says Gustavo Sanchez, co-founder of Pandata Tech.

UTSI has been offering technical consulting and systems integration for Operational Technology (predominantly around SCADA and ICS) solutions throughout Texas, the greater U.S., and international markets since 1985, serving asset owners and operators of critical infrastructure in varying industries. With the acquisition, UTSI will continue to target traditional energy, the clean energy and renewable sectors, water treatment facilities, and transportation. It will also leverage Pandata Tech’s expertise in the federal space utilizing its DoD contracting vehicles.

"I'm thrilled about this merger and the vast potential it brings to UTSI," says Shaun Six, president of UTSI. "Not only does it pave the way the way to better serve our current clients, but it also presents exciting opportunities in new markets."

InnovationMap interviewed UTSI’s president and CEO, Shaun Six, to learn more about how the strategic acquisition benefits for current and future clients of UTSI.

InnovationMap: Can you tell us about the decision to acquire Pandata Tech? What specific strengths or capabilities do you see in Pandata Tech that align with UTSI's mission and goals?

Shaun Six: Our decision to acquire Pandata Tech was driven by a clear strategic vision to expand and enhance our core capabilities, especially in cybersecurity for operational technology, AI, and data science. This move is particularly vital for sectors like energy, where the security and integrity of data and operational systems are of utmost importance.

We saw in Pandata Tech a unique blend of expertise in data science, AI, and machine learning (ML), bolstered by their significant experience in both the defense and energy sectors. This collaboration opens exciting avenues to enhance our service offerings, guaranteeing our clients receive the most cutting-edge and secure solutions on the market.

InnovationMap: How do you envision integrating Pandata Tech's AI/ML capabilities into UTSI's existing services and solutions?

Shaun Six: Integrating Pandata Tech's AI/ML expertise into our current offerings holds immense promise, especially in fortifying our cybersecurity measures for critical infrastructure. Utilizing their advanced skills in data labeling and analysis will enable us to offer our clients deeper and more nuanced insights into their operational environments. This means they'll have the capability to anticipate and counteract potential risks and threats more effectively.

Additionally, Pandata Tech's proficiency in evaluating data quality complements our commitment to the reliability and precision of crucial systems, including those for leak detection and control room management. This integration boosts our capacity to protect and refine the efficiency of essential infrastructures, ensuring operational excellence.

InnovationMap: Can you highlight any specific synergies or complementary aspects between UTSI's focus on OT, ICS, and SCADA cybersecurity and Pandata Tech's specialization in data science and AI/ML?

Shaun Six: There are notable complementary aspects between UTSI’s expertise in OT, ICS, and SCADA cybersecurity and Pandata Tech’s specialization in data science and AI/ML that make this partnership especially advantageous.

Our dedication to securing critical infrastructure meshes perfectly with Pandata Tech’s prowess in data analysis and risk evaluation. Merging our insights into OT, ICS, and SCADA systems with Pandata Tech's sophisticated analytics enables us to provide a holistic cybersecurity strategy that tackles not only traditional threats but also the nuanced challenges related to data integrity and quality.

Furthermore, Pandata Tech’s background in collaborating with the DoD and DoE, along with UTSI’s long history working alongside the DoD, enhances our capabilities to help secure and protect our nation's most critical infrastructures.

InnovationMap: How do you anticipate this acquisition will benefit UTSI's clients, particularly those in hazardous material regulation sectors such as PHMSA (Pipeline Hazardous Material Security Administration/TSA/DOT)?

Shaun Six: The acquisition of Pandata Tech is set to deliver substantial advantages to our clients, particularly those navigating the complex waters of hazardous material regulations like PHMSA. Leveraging Pandata Tech’s AI/ML technologies will enhance our capacity for detecting and addressing potential vulnerabilities tied to data integrity and cybersecurity. This means we’ll be able to offer more sophisticated monitoring and analytical tools for critical systems, empowering operators to preemptively tackle issues before they morph into major safety or compliance problems.

This allows us to look at external and internal bad actors, diagnose poor configuration of physical sensors, or mistakes in selected algorithms running on the edge while also monitoring the health of the physical infrastructure and the hardware/software combinations that make it possible to run and supervise infrastructure from a remote operations center. Our combined expertise will enable us to develop tailored solutions that meet the specific needs of clients in highly regulated industries, such as leak detection, simulation, and compliance reporting under PHMSA regulations.

InnovationMap: How will acquiring Pandata Tech strengthen UTSI's position in the market and differentiate your offerings from competitors?

Shaun Six: The acquisition of Pandata Tech will strengthen UTSI's position as a leader in cybersecurity and technology consulting for critical infrastructure sectors. By combining our domain expertise with Pandata Tech's advanced analytics capabilities, we can offer our clients a unique value proposition that goes beyond traditional cybersecurity solutions.

Our ability to provide actionable insights derived from sophisticated data analysis sets us apart from competitors, allowing us to deliver more effective and comprehensive solutions for safeguarding critical infrastructure against cyber threats and operational risks.

InnovationMap: Are there any specific projects or initiatives that you are particularly excited about pursuing as a result of this acquisition?

Shaun Six: Following this acquisition, we're thrilled about embarking on initiatives that capitalize on the combined strengths of UTSI's cybersecurity know-how in OT, ICS, and SCADA systems and Pandata Tech's proficiency in AI/ML.

A key project we're eager to pursue involves the creation of state-of-the-art monitoring and detection systems for critical infrastructure. By incorporating Pandata Tech's advanced techniques in data labeling and analysis, we aim to significantly enhance our capabilities in leak detection and control room operations.

This merger opens up avenues to venture into new markets and sectors, drawing on Pandata Tech's extensive experience in the defense and energy industries to tackle the evolving landscape of cybersecurity challenges across various domains.

Ad Placement 300x100
Ad Placement 300x600

CultureMap Emails are Awesome

Houston biotech VC firm's portfolio cos. score $5.3M in federal funding

money moves

Three portfolio companies of Houston venture capital firm First Bight Ventures have received a combined $5.25 million from the U.S. Defense Department’s Distributed Bioindustrial Manufacturing Program.

“The allocation of funds by the federal government will be critical in helping grow biomanufacturing capacity,” Veronica Breckenridge (née Wu), founder of First Bight, says in a news release. “We are very proud to represent three dynamic companies that are awardees of this competitive and widely praised program.”

The three companies that were awarded Defense Department funds are:

  • Hayward, California-based Visolis, received $2.25 million to plan a facility for production of a chemical that can be transformed into rocket propellants, explosive binders, and sustainable aviation fuel.
  • Alameda, California-based Industrial Microbes received $1.55 million to plan a facility for converting ethanol feedstock into acrylic acid. This acid is a key component used in coatings, adhesives, sealants, lubricants, corrosion inhibitors, and wound dressings.
  • San Diego-based Algenesis received $1.5 million to plan and develop a facility that’ll produce diisocyanates, which are chemical building blocks used to make polyurethane products.

“This award is a testament to our commitment to advancing sustainable materials and will enable us to contribute to both national security and industrial resilience. Our planned facility represents a key step towards securing a domestic supply of critical components for polyurethanes,” says Stephen Mayfield, CEO of Algenesis.

Texas grocer H-E-B finally rolls out digital tap-to-pay services

hi, tech

Texas' favorite grocery store has some good news for shoppers who have a habit of forgetting their wallets. H-E-B is starting a phased rollout for digital tap-to-pay services, starting in San Antonio before spreading to the rest of the chain's stores.

The rollout began Monday, October 7. A release says it'll take "about a week" to spread to all stores in the region before making it ways across Texas. Although it is not known which stores will add the service on what date, the rollout includes all H-E-B stores, including Mi Tienda, H-E-B's Mexican grocery store that has locations in Houston.

With tap to pay, shoppers will finally be able to use smartphone-based systems such as Apple Pay, Samsung Pay, and Google Pay, as well as tapping a physical card.

Payments can be made with those apps, or "digital wallets," at cash registers and self-checkout lanes, as well as restaurants and pharmacies within H-E-B stores. They won't be accepted right away at H-E-B fuel pumps, but customers can use them to pay for gas if they bring their phones to the fuel station payment window.

This isn't exactly cutting-edge technology; Google Wallet launched in 2011, leading the market, and was followed by Apple Pay in 2014. But it's not ubiquitous either. In 2023, a poll by Forbes Advisor found that barely more than half of respondents used digital wallets more than traditional forms of payment.

H-E-B is on a bit of a payment revolutionizing kick, also launching a debit card in 2022 and a partnership in August of 2024 with the H-E-B-owned delivery service Favor for its fastest order fulfillment yet. Central Market and Joe V’s Smart Shop, two other H-E-B brands, also recently launched tap to pay.

“At H-E-B, we’re always exploring a broad range of technologies to enhance how customers shop and pay for products,” H-E-B vice president Ashwin Nathan said in a statement. “This has been one of the most requested services we have received from our customers and partners, and we are excited to now make this popular technology available at all our H-E-B locations.”

------

This article originally ran on CultureMap.