News

Why OT Security Demands Context, Not Just Controls

  • Alan Shimel--securityboulevard.com
  • published date: 2025-08-29 00:00:00 UTC

None

<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="Navigating OT Security: Insights from Rockwell Automation Rick Kaun" src="https://player.vimeo.com/video/1113641404?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js" type="f27ec809a5c5e8ef2b543c38-text/javascript"></script></p><p data-start="563" data-end="1086">Operational technology (OT) security is no longer a niche concern—it’s front and center in today’s cyber conversations. At Black Hat this year, OT had a real moment, signaling that protecting critical infrastructure has finally caught the broader security community’s attention. Rick Kaun, global director of cybersecurity services at Rockwell Automation, unpacks what makes OT security so different—and why “think global, act local” is more than a catchphrase.</p><p data-start="1088" data-end="1546">Kaun traces his 25-year journey through the evolution of OT security, noting how IT-style controls don’t simply map onto industrial systems. A misconfigured patch or a routine reboot might be an inconvenience in IT, but in OT it can mean multimillion-dollar outages—or worse, safety risks. Unlike IT, OT environments run on decades-old equipment tied directly to physical processes, from pipelines to medical devices, where uptime and safety are paramount.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p data-start="1548" data-end="2049">Security has to be embedded into the very culture of manufacturing, much like safety systems. That means moving past one-off fixes and focusing on contextual data—understanding not just what vulnerabilities exist, but where they sit, how critical the affected assets are, and what protections are already in place. With that lens, organizations can prioritize risks, streamline responses, and build global strategies that adapt to local realities.</p><p data-start="2051" data-end="2315">The payoff is significant. Companies embracing this model are seeing major efficiency gains—turning what once took days of manual effort into hours—while giving boards and insurers the assurance that resiliency isn’t just an aspiration, but a measurable outcome.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="f27ec809a5c5e8ef2b543c38-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="f27ec809a5c5e8ef2b543c38-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p data-start="2317" data-end="2525">For manufacturers and critical infrastructure operators, the message is clear: Cybersecurity isn’t just about defense. It’s about keeping the systems that keep society running safe, reliable, and resilient.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/why-ot-security-demands-context-not-just-controls/" data-a2a-title="Why OT Security Demands Context, Not Just Controls"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhy-ot-security-demands-context-not-just-controls%2F&amp;linkname=Why%20OT%20Security%20Demands%20Context%2C%20Not%20Just%20Controls" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhy-ot-security-demands-context-not-just-controls%2F&amp;linkname=Why%20OT%20Security%20Demands%20Context%2C%20Not%20Just%20Controls" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhy-ot-security-demands-context-not-just-controls%2F&amp;linkname=Why%20OT%20Security%20Demands%20Context%2C%20Not%20Just%20Controls" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhy-ot-security-demands-context-not-just-controls%2F&amp;linkname=Why%20OT%20Security%20Demands%20Context%2C%20Not%20Just%20Controls" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhy-ot-security-demands-context-not-just-controls%2F&amp;linkname=Why%20OT%20Security%20Demands%20Context%2C%20Not%20Just%20Controls" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>