Operational Technology | Secured with Strategy
Zero Trust in
OT Environments
Risk Identification and Mitigation
Preparedness and Response
SCALE MODEL
HACK THE BOAT
An innovative research initiative in close cooperation with Damen that demonstrates cybersecurity vulnerabilities in maritime operations.
The initiative provides valuable insights into securing maritime infrastructures against cyber threats. Through live hacking sessions, it provides real life insights for the maritime industry and technology suppliers into both attack vectors and defense opportunities.

WATER SYSTEM
HACK THE BUILDING
An innovative research initiative to demonstrate vulnerabilities within building management systems. The initiative provides valuable insights into some of the most overlooked components of our daily lives: HVAC and water supply management systems.
Many organizations (including hospitals) heavily depend on uninterrupted availability of their building management systems but have a hard time to secure them. This initiative aims to provide concrete steps to securing building management systems for everyone.
Emerging
THREATS TO INDUSTRIAL IoT
More and more threats to Industrial IoT exploit the growing convergence of IT and OT and supply chain vulnerabilities.
Additionally, an increase in specialized IIoT targeted malware and vulnerabilities is observed. Through the analysis of recent cyber-attacks against Industrial IoT devices, lessons are learned that aid in securing IIoT environments. What can be done to secure IIoT environments?
ADVANCEMENTS IN
OT SECURITY AUTOMATION
Advancements in OT security enable automated security response while the characteristics of OT itself require high levels of (physical) safety, reliability and performance.
These can be contradictory in nature but with the introduction of digital twins combined with AI and ML on OT data the impact of security automation can be evaluated before impact occurs. As the automation of security response in OT matures, the efficiency and time-to-containment are improved, safeguarding critical industrial infrastructures against evolving cyber threats.
REGULATORY
CHANGES IMPACTING OT
Global cybersecurity regulations are increasingly impacting OT, particularly for critical infrastructure. The EU’s NIS2, North American NERC CIP, and global IEC 62443 are key frameworks, emphasizing risk management, incident reporting, and supply chain security.
National regulations are also emerging, driving a more holistic IT/OT security approach and board-level responsibility. Compliance demands specialized expertise and continuous monitoring to safeguard essential operations.
OT Research blogs
Introduction:
Understanding the landscape
What are we doing here? Quantum computing challenges some of today’s cryptographic foundations. We explain the real risks, the realistic timelines, and why calm, early preparation beats last-minute scrambles.
Learning from the past: signed, sealed, subverted
Broken cryptography isn’t new, it’s a recurring theme. We show how historical cryptographic failures offer urgent lessons for avoiding brittle systems in a quantum future.