New algorithm for OT cybersecurity risk management

Issue 4 2023 Industrial (Industry), Cyber Security, News, Commercial (Industry)

OTORIO a provider of operational technology (OT) cyber and digital risk management solutions, announced that it has secured a patent from the U.S. Patent and Trademark Office for the company’s risk management model and attack graph analysis algorithm. This marks a significant milestone for OTORIO’s proprietary technology and further validates the company as a pioneer in the OT security market.

The USPTO issued U.S. Patent No. 11637853, ‘Operational Network Risk Mitigation System and Method,’ for OTORIO’s algorithm simulation model, which underpins its end-to-end OT cybersecurity platform. The company’s unique technology calculates OT cybersecurity threats by analysing and visualising four key components – threat, likelihood, vulnerability, and impact – and provides risk mitigation actions prioritised according to actual exposure and potential impact on operations. This enables organisations to take proactive measures to safeguard their critical assets and processes.

OTORIO’s attack vector graphs offer a dynamic visual representation of network topology for easy navigation between assets, vulnerabilities, their connections, and the security controls’ influence. This provides crucial context to OT cybersecurity posture, along with concise calls to action, enabling organisations to prioritise and address risk effectively.

OTORIO’s monitoring capabilities empower organisations to proactively manage vulnerabilities and harden security by evaluating the likelihood of incidents across all assets, threats, and potential scenarios. Any variations in the security posture serve as a clear signal for proactive measures, enabling organisations to stay ahead of emerging threats and safeguard their operational technology.

The company’s proprietary algorithm incorporates industry-standard metrics and adheres to the NIST CVSS system for vulnerability scoring, ensuring compliance with industry standards and avoiding the need for re-scoring of common risks.

Find out more at

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Protect your financial assets from unknown online threats
Products Cyber Security Financial (Industry)
Malicious actors employ a myriad of sophisticated techniques, such as hacking, phishing, spamming, card theft, online fraud, vishing, and keylogging, among others, to exploit unsuspecting individuals and gain unauthorised access to their financial resources.

Cyber incidents result in a 9% decrease in shareholder value
News Cyber Security
Aon published its 2023 Cyber Resilience Report, revealing that, on average, a significant cyber incident resulted in a 9% decrease in shareholder value – over and above the market – in the year following the event.

Automated ransomware recovery
Products Cyber Security
Organisations can now automatically recover from ransomware attacks with the capabilities in Cisco XDR, where the company is adding recovery to the response process by including infrastructure and enterprise data backup and recovery vendors.

Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

AI-powered cyber protection for consumers
IT infrastructure Cyber Security
Acronis Cyber Protect Home Office is designed for the evolving landscape of cyber threats by integrating Acronis' cyber protection and secure backup solutions, combining AI-powered defence mechanisms, robust data backup, remote management tools, and mobile device protection.

Five ways to reduce your cyber insurance premiums
Security Services & Risk Management News
With the global costs of cybercrime expected to soar to $13 trillion within the next five years, cyber insurance is booming as organisations try to mitigate the risk of financial losses.

A surge of cybersecurity for the energy sector
Government and Parastatal (Industry) Cyber Security
With a rapid transition towards renewable energy, the energy sector has an increased reliance on technology. This makes it particularly vulnerable with regards to cybersecurity, as it depends on interconnected systems and digital technologies.

Secure backup strategies imperative for business continuity
IT infrastructure Cyber Security
Cybercrime is on the rise, and businesses need to adjust how they manage their data to fend off attackers, or risk irreparable damage, writes Lisa Strydom, Senior Manager Channel and Alliance for Africa at Veeam Software.

Smart manufacturing redefined
Hikvision South Africa CCTV, Surveillance & Remote Monitoring Industrial (Industry)
AI and intuitive visualisation technology allows managers to monitor manufacturing sites, production, and operational processes, and to respond in real time in the event of an issue – helping to drive efficiency and productivity.

CHI selects NEC XON as trusted cybersecurity partner
News Cyber Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.