Rethinking OT: It’s All Just Technology
Find Threat Talks on
Rethinking OT: It’s All Just Technology
PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable.
In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to discuss why the OT side of your business deserves the same focus and attention as IT. From default passwords to exposed PLCs, they show how these ‘tech risks’ span beyond just OT and IT.
They discuss:
✅ How to replace “default” thinking on OT security
🌐 Spotting internet-facing assets before attackers do
🔍 Using CISA’s Installed Base Initiative to locate orphaned tech
🤝 Building joint response plans across IT, OT, and government
Additional Resources:
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO
ON2IT
Episode details
Defending IT and OT Together
In this episode of Threat Talks, host Lieuwe Jan Koning teams up with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to show that the message is clear: the line between IT and OT is outdated.
From fusing Shodan-style scans with internal inventories to ring-fencing unpatchable gear, this is where risk reduction meets real equipment.
Key topics include:
• Building a living OT asset map with external scans and BitSight data
• Ranking exposed devices by criticality, exploitability, and business impact
• Using micro-segmentation, DMZs, and proxies when patches aren’t possible
• Coordinating incident response with CISA, the FBI, integrators, and operators
• Embedding “secure by operation” across the entire OT lifecycle
This is where vulnerable OT becomes vigilant OT: tune in to learn how.
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
