Skip to content

Driving OT Security Forward Evolving Architectures for Monitoring and Segmentation in OT

Presenter:

Blake Gilson

This session focuses on how OT security architectures are evolving—but most organizations are still stuck in legacy designs that can’t support modern monitoring and segmentation. The gap between old infrastructure and new threats is where risk lives.

Key takeaways

  • Legacy architecture is the root constraint
    • Flat networks, implicit trust, and fragile connectivity
    • Designed for uptime—not security
    • Hard to retrofit without breaking operations
  • Segmentation is critical—but hard to do right
    • It’s not just “add firewalls”
    • Requires deep understanding of process flows
    • Poor segmentation can disrupt operations or create blind spots
  • Monitoring has to evolve with architecture
    • Traditional IT monitoring doesn’t translate cleanly to OT
    • You need visibility into both network traffic and process behavior
    • Passive monitoring is often preferred to avoid operational risk
  • Architecture drives visibility
    • If your network isn’t designed for visibility, tools won’t fix it
    • Good architecture enables better detection and response
    • Bad architecture guarantees blind spots
  • Incremental change is the only realistic path
    • You can’t rip and replace OT environments
    • Security improvements have to be phased and operationally safe
    • Progress = gradual segmentation + improved monitoring

Latest