There and back again: discovering OT devices across protocol gateways with Rob King

Operational Technology (OT) describes devices that control things in the real world, like factories and generators. This talk discusses the security implications of the convergence of IT and OT, with deep dives into OT protocols and device discovery — even behind legacy protocol gateways.

Meet Our Speakers

Rob King

Director of Applied Research, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Talks
Detecting Forbidden White Labeled and Counterfeit Devices (SecTor 2025)
Learn how to tell if your expensive router (bought cheap!) really is the real thing, and whether your network really is free from forbidden devices.
Talks
The once and future rules of cybersecurity (SecTor keynote)
In this session, HD revisits the rules we lived by in the 2000s, reveal which ones still matter, which ones failed us, and what new rules we'll...
Talks
Vulnerability haruspicy: using woo to confirm your biases (NorthSec 25)
This talk digs into the strengths, weaknesses, and absurdities of CVSS, EPSS, and SSVC, comparing them to the reality of how security teams...
Talks
DEF CON 33 - There and back again: detecting OT devices across protocol gateways (Rob King)
Presented by Rob King at DEF CON 33, this talk discusses techniques for detecting devices on the "other side" of protocol gateways.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.