Zero-trust, AI and other new tools nose into cybersecurity
Paralleling digitalization and AI’s emergence in other fields, cybersecurity developers are quickly experimenting and adapting similar tools to meet their needs. These include zero-trust, AI-enabled surveillance and others that can benefit from IT-OT convergence, according to Eric Medecke, IT/OT solutions director at E Tech Group, which is (etechgroup.com) a system integrator in West Chester Township, Ohio, and certified member of the Control System Integrators Association.
“Traditional perimeter-based security is being replaced by zero-trust architectures, which are never-trust-always-verify models tailored for operations technology (OT). This includes micro-segmentation and robust identity and access management for industrial systems,” says Medecke. “As operational systems become more connected, IT/OT security teams and toolsets are merging to better monitor and protect the broader attack surface across both domains.
“Likewise, growth in secure gateways and zero-trust access are being prompted by the growing demand for remote operations and access to industrial assets, especially for maintenance and configuration. Plus, machine learning (ML)-based threat detection is increasingly being deployed to model normal behavior in order to spot deviations that might signal attacks or safety hazards.”
Impact of recent history
Medecke reports many cybersecurity efforts are fueled by recent geopolitical crises, such as regional wars and lingering shifts from COVID-19, especially persistent workforce shortages. These and other events continue to drive demand for remote operations, automated tools and managed services, and reshape how industries secure their critical infrastructures, emphasizing resilience and proactive defenses. The pandemic fueled digitalization of many operations, including adoption of cloud-computing, remote monitoring and automated orchestration, but the downside was expanded cyber-attack surfaces, and the need for increased focus on securing these new pathways.
“The wars in Ukraine and the Gaza Strip heightened awareness of cyber-threats to power grids, water systems, and manufacturing elsewhere. There’s also been a sharp increase in nation-state-influenced attacks on industrial systems, prompting more stringent network segmentation and monitoring,” explains Medecke. “In response to these elevated geopolitical cyber-risks, infrastructure operators and regional governments are exchanging threat intelligence more proactively, especially regarding malware tactics targeting OT. Operators are also investing more in contingency planning, backup systems, resilience and redundancy measures, and emergency response simulations to ensure continuity despite cyber-attacks.”
End-user experiences and advice
In conjunction with its usual system integration services, Medecke reports that E Tech has collaborated with multiple clients on their cybersecurity initiatives and programs.
For example, a large pharmaceutical company operating multiple, global manufacturing sites unintentionally expanded remote access during COVID-19, and subsequently discovered multiple virtual private networks (VPN) with weak authentication and flat network architecture. E Tech helped it implement zero-trust gateways, enforce multi-factor authentication (MFA), separate and segment its OT network from IT, and conduct tabletop exercises to validate incident response plans.
Likewise, a global machine builder needed to balance cybersecurity with useability on the automated lines it installs worldwide because its customers wanted convenient remote monitoring, but this could expose its machine controls to significant risks. To resolve this dilemma, E Tech worked with the machine builder to deploy secure remote access via provider-managed gateways, with session logging and strict access policies. They also standardized hardened configurations for equipment before installation.
Lastly, a system integrator for water utilities had field sites with legacy PLCs and HMIs with default configurations, unsegmented networks, and remote updates performed via USB drives or poorly secured remote links. It and E Tech paired air-gapping practices with data diodes for safe data extraction, and deployed OT-specific, anomaly-detection tools to flag suspicious behavior.
“The pharmaceutical manufacturer reported gaining better visibility and control over its systems. It even improved remote diagnostics once unnecessary routes were removed,” explains Medecke. “Securing systems upfront meant the machine builder’s clients had control without compromising safety, and support became smoother with clean baselines. And, the water systems integrator found that even simple tweaks like blocking auto-runs on USB devices or forcing configuration backups prevented potential breaches.”
Get your subscription to Control's tri-weekly newsletter.
Baked-in, automated, AI-aided future
Going forward, Medecke reports that cybersecurity will be increasingly integrated into devices and networks ahead of time, and these protections will be accelerated by AI, ML and other types of automation.
“The never-trust-always-verify ethos of zero-trust cybersecurity will be the default, and will be applied deeply in OT down to the device level. Likewise, role-based, identity-aware controls will be baked into every connection, not just at the perimeter,” says Medecke. “Users can also expect more micro-segmentation with automated policy enforcement, and integration of OT-specific, cyber-threat intelligence.”
Medecke reports that real-time feeds tailored to industrial protocols and equipment will become standard, and new cyber-threat intelligence will be correlated directly with asset inventories to flag risks the moment a vulnerability surfaces. Similarly, AI-driven anomaly detection will be enabled by ML that will baseline every asset’s normal behavior such as traffic patterns, PLC logic, and sensor and process data, and production systems will auto-generate alerts, and even initiate containment without waiting for human reviews. AI will contribute by distinguishing malicious activity from normal process variations.
“Unified monitoring dashboards will combine IT and OT events in one place for stronger, converged security programs. Coordinated incident response between IT and plant operations will become the norm, and security policies will be written to account for both sides from the start,” explains Medecke. “On the supplier side, more OEMs will ship secure-by-design PLCs, HMIs and sensors with built-in encryption, authentication and hardened firmware. Plus, firmware signing and secure-boot up procedures will be standard, making tampering harder.”
Finally, more facilities and companies will outsource continuous monitoring and other cybersecurity services to managed security service provider (MSSP) or security operations centers (SoC) with OT expertise. This will be especially crucial for smaller organizations and users without in-house, 24/7 coverage.
“As more control data moves to the cloud for analytics, expect robust encryption, tokenized access, and one-way transfer devices. Edge gateways will act as security enforcement points, filtering and inspecting data before it leaves the facility,” adds Medecke. “This will be increasingly essential as compliance frameworks and standards, such as CMMC, IEC 62443 and NIST 800-82. drive adoption of certain controls. In addition, cybersecurity-related, business insurance policies will increasingly require proof of segmentation, MFA, monitoring and pretested recovery plans.”
Risk assess to understand and respond
While digitalization and AI promise to help improve cybersecurity, Medecke reports that third-party hardware, software and cybersecurity risk assessments can guide supply-chain visibility and network hardening, including making sure that embedded systems and IoT components are patched and free from hidden vulnerabilities. A risk assessment helps relate global cyber-threats to specific operations, so users can determine:
- Where are exposures located? Map networks, devices and applications, and compare them to tactics observed in recent conflicts, pandemic-related events, and other emerging cyberattack trends.
- What does each cyber-threat mean for operations? More specifically, ask: could production be slowed, stopped or manipulated? Could applications like SCADA, MES or control systems be disrupted? Could a facility’s safety systems HVAC or utilities be taken offline?
- Why does this cyber-threat matter now? Seek to understand and cope with cyber-threats by giving them context, such as finding commonalities with other targeted cyber-attacks on industrial systems or larger, geopolitical events and conflicts. For example, COVID-19 left many facilities with expanded, but often insecure, remote access, while supply-chain instabilities can delay replacement of critical security components.
- What needs to be done next? Use cybersecurity risk assessments to develop prioritized plans for fixing the gaps most likely to be exploited, improve resilience before incidents occurs, and reassess regularly.
How to implement a network cybersecurity program
A practical and resilient network cybersecurity program begins with visibility from a cyber-risk assessment, locking in strong boundaries with network segmentation and hardened access, adding continuous monitoring, and maintaining people readiness with training and drills, Medecke. More specifically, these steps include:
- Get the lay of the land by conducting a full network assessment. Map IT and OT networks, assets, firmware versions and communication paths. Identify critical systems, and rank them according to safety, production and compliance.
- Build a secure architecture by segmenting IT and OT networks with managed gateways or firewalls. Harden control devices by patching firmware, disabling unused ports/services, and changing default credentials. Secure remote access by implement multifactor authentication (MFA), role-based access, session monitoring, and time-bound vendor access.
- Monitor the network by deploying OT-aware intrusion detection to baseline normal traffic, so anomalies can be identified. Log and review security events by centralizing logs for IT and OT, and retain them securely. Set alerts for key changes, such as PLC logic edits, new device connections or unexpected protocol traffic.
- Prevent easy wins for cyber-attackers by controlling removable media. Scan USB drives, block auto-run software, and keep an inventory. Limit privileges by applying a least-privilege procedure for accounts and review it quarterly. Secure data flows with one-way or tightly controlled links for OT-to-IT data sharing.
- Plan for resilience by creating offline backups for control system configurations, SCADA/MES databases, and key IT services. Test restore procedures, don’t assume backups work, simulate recovery, and establish redundancy for power, networking and key control components.
- Train and align people, and raise staff awareness by training operators, engineers and contractors about security policies. Include security and access requirements in vendor agreement and contracts. Perform incident response drills and run scenarios, so roles and actions are clear during a crisis.
- Keep cybersecurity alive by scheduling quarterly reviews. Update asset inventory, check software patching status, adjust controls for new cyber-threats. Stay informed by tracking Cybersecurity and Infrastructure Security Agency (CISA) alerts, vendor advisories and industry-specific threat intelligence.
Device-level security for sensors and components
Though it’s often neglected, cybersecurity for sensors and device-level components is at least as important as protecting higher-level networks. It starts with strong configuration, restricting access, securing communications and continuous monitoring. If each device is locked down and tracked, cyber-threats and -attacks lose the easy foothold they often exploit to move deeper into networks, according to Medecke. It’s primary elements include:
- Secure device configurations by changing default credentials, and using strong, unique passwords for each device. Disable unused services and ports to minimize cyber-attack surfaces from the start. et appropriate permissions to prevent unnecessary write permissions or control access.
- Keep firmware current by only updating from trusted sources, and using vendor-signed firmware updates. Schedule updates during maintenance windows to reduce downtime risks, while keeping security tight.
- Control physical access by locking cabinets or enclosures containing sensors, controllers and I/O modules. Limit maintenance access to authorized personnel, and logging who worked on which device and when.
- Protect communications paths by encrypting where possible. Use protocols that support encryption between devices and controllers.
- Authenticate device connections by ensuring that devices only talk to approved controllers or networks. Segregate critical signals by keeping safety- or process-critical data on dedicated virtual, local area networks (VLAN) or physical segments.
- Monitor at the device level. Baseline device behavior by record normal polling rates, data values and status signals, and set alerts for anomalies, such as unexpected configuration changes or signal spikes.
- Plan for recovery. Back up configuration files by storing a clean, known-good version for each sensor or device. Document device setup to make redeployment fast and accurate after a failure or compromise.
- Integrate with the bigger picture by connect device-level security to overall OT security monitoring, so threats spotted at the edge will trigger alerts at the control-network level. Include sensors and components in asset inventory so they’re not overlooked during patching or incident responses.
About the Author

Leaders relevant to this article:

