TL;DR
AI is accelerating attacks, OT systems remain fragile, and M&A is creating hidden cyber debt. Identity is now the primary attack surface, and attackers can map networks faster than defenders can secure them. Framework adoption is rising, but real OT implementation still lags. The industry is shifting toward Operational Zero Trust: invisible OT, no shared credentials, no flat networks, and tightly controlled outsider access. Zero Trust for vendors, contractors, machine identities, and AI agents is now essential — not optional.
Recently, at the 20th Annual API Cybersecurity Conference for the Oil & Natural Gas Industry, one message came through clearly:
Everything in the threat landscape is accelerating — especially the risks driven by AI — but OT environments are not becoming easier to defend.
Across keynotes, technical tracks, and deep-dive sessions, several themes emerged that should concern every operator, integrator, and executive responsible for industrial cyber resilience.
At the same time, the industry is beginning to converge around new defensive models — ones far more aligned with continuity, safety, and Zero Trust principles.
As someone who works closely with OT defenders and industrial operators, here are the biggest insights I took away from this year’s event. These insights directly map to the four sessions in our OT cybersecurity webinar series, built for engineers and leaders facing these exact challenges.
Multiple sessions reinforced a reality many of us have observed for years:
identity is now the central nervous system of cybersecurity.
Microsoft’s team highlighted that adversaries are:
This is unfolding at the same time OT environments are rapidly adopting:
Meanwhile, most OT systems cannot:
The identity gap between IT and OT is widening — and attackers are capitalizing on it.
If you're looking to close this gap without passwords or fragile MFA, we broke this down in depth during one of our webinars for CISA Cybersecurity Awareness Month:
Passwordless Industrial MFA → https://www.blastwave.com/webinar/passwordless-industrial-mfa
AI is not simply accelerating attacks.
It is transforming them.
From the threat briefings:
AI-enabled attackers no longer need deep OT expertise.
AI gives them just enough knowledge — and automation — to be dangerous.
This makes undiscoverability, identity-based gating, and no-fail-open access essential. Detection alone is no longer fast enough.
That’s why we showed operators how to make legacy OT invisible — even to AI-driven reconnaissance — in the first webinar from the series:
The Invisible OT → https://www.blastwave.com/webinar/the-invisible-ot
One of the clearest themes across discussions was the growing cybersecurity burden created by mergers and acquisitions — a constant reality in oil and gas.
Every acquisition introduces:
In today’s accelerated threat environment, AI-assisted attackers can map this inherited complexity far faster than defenders can.
As I put it at the conference:
“The most dangerous moment in cybersecurity isn’t the day you get breached — it’s the day you acquire an environment you don’t fully understand.”
You cannot patch or scan your way out of inherited cyber debt.
You can only isolate, cloak, and tightly control access to limit exposure.
New data presented at the conference showed:
However, alignment does not translate to implementation in OT.
Operators consistently struggle with NIST CSF controls related to:
Most IT controls cannot be deployed into OT without operational risk.
This is why more operators are now seeking Zero Trust architectures designed specifically for industrial environments.
Ten years ago, prevention dominated discussions.
Then the industry shifted to detection.
Then to “assume breach.”
This year, a new theme took center stage:
Zero Trust is no longer theoretical — and OT needs a Zero Trust model built for operational reality, not IT retrofits.
This means:
We are entering a world where defenders must assume attackers are already using AI — and build architectures that limit what those attackers can see or reach.
This is exactly why our recent webinar focuses on segmentation without downtime or re-architecting OT:
Microsegmentation Simplified → https://www.blastwave.com/webinar/microsegmentation-simplified
Vendor access.
Integrator access.
Contractor access.
Supply chain access.
Machine identities.
AI agents.
These aren’t edge cases — they are the dominant vector for breaches.
This is exactly why our 4th webinar in our OT cybersecurity series focuses entirely on securing outsider access.
“Secure the Outsider: Zero Trust for Remote Vendors, AI Agents & the OT Supply Chain”
Live on December 3rd
We will demonstrate how to enforce:
Register here: https://www.blastwave.com/webinar/ot-zero-trust
AI has changed the speed and scale of cyber threats.
But OT environments cannot absorb more complex tools, more agents, or more operational risk.
What OT needs is:
The industry is converging on this view — and operators that move early will be in the strongest position to protect operational continuity in the years ahead.
I hope to see you at our next webinar.
Tom Sego
CEO, BlastWave
Experience the simplicity of BlastShield to secure your OT network and legacy infrastructure.