In Zenner’s customer magazine, Mirko Ross explains in an interview with energieblog the differences between IT and OT cybersecurity and why
predictive cyber risk analysis is becoming increasingly important for operators of critical infrastructures.

While in traditional IT security, shutting down compromised systems is often the first response,
this is not possible in operational technology (OT) environments such as waterworks or power plants. Continuous monitoring and targeted cyber risk management are essential here.

To address this, asvin has developed the Risk-by-Context software platform, which protects OT environments through a network of digital “reporting points.”

At the core of the platform
lies a data analytics model that contextualizes threat data using AI, graph analysis, and topology theory.
Relevant data — even from incomplete or heterogeneous sources — is consolidated into a Risk-by-Context index.

This index generates a risk score, prioritizes recommended actions, and visualizes potential vulnerabilities across dashboards
from individual assets to the entire infrastructure. This enables organizations not only to detect attack risks but also to predict and proactively mitigate them.

Read more in the interview in Zenner Magazine on page 12.

https://zenner.de/wp-content/uploads/2021/03/SmartEasy2025-01_19-09-2025_DS_web.pdf

cyber risk management - Zenner Magazine
Konrad Buck

Konrad Buck

Head of Press and Media Relations

Background & Expert Access for Media

I provide journalists with access to in-depth background information beyond our public materials, including:
  • Product & technology insights – technical context, solution architecture, and real-world use cases for professional and trade media
  • Expert commentary & background talks – our CEO is available as an expert source on current cybersecurity developments, threat landscapes, and the impact of AI on security and regulation
Media contact
I speak openly, fact-based, and without PR spin. I am a former IT journalist with decades of experience in the IT and cybersecurity space, familiar with the highs and lows of the industry. Off-the-record discussions are possible upon request.