Redefining Cybersecurity from the Ground Up

What The Tech Ep. 203
Seth Eaton

By Seth Eaton, Vice President, Technology & Innovation, Amentum

Click here to listen to the podcast episode “Exploring Cybersecurity Fundamentals and Essentials: Part 1” on Spotify

Cybersecurity isn’t just a matter of firewalls and passwords but it’s about trust, resilience, and protecting the systems that power our daily lives. In the latest episode of the What the Tech? podcast, my co-host, Ashley Isaak and I sit down with Adi Karisik, Vice President for Global Technology Enablement in our Cyber & Intelligence business, to unpack how Amentum approaches this mission-critical domain and why “cyber” means something different depending on where you stand.

Adi brings more than 15 years of leadership experience in operational technology (OT) and enterprise cybersecurity, spanning both national-security and commercial environments. His unique perspective, shaped through mergers, acquisitions, and hands-on work with infrastructure systems, helps illustrate one of the core truths of modern security: there is no single definition of “cyber.” Everyone, from executives to field technicians, views it through a different lens. The challenge, as Adi notes, is aligning those perspectives into a cohesive enterprise posture.

Cyber Health

We start with the basics: cyber hygiene. The concept sounds simple; maintain training, standardization, and discipline, but it’s where many organizations falter. Each person who shortcuts a protocol or delays an update adds risk to the larger system. From there, Adi explores the harder problem, understanding the depth of cyber risk and translating it into language that decision-makers can act on. You can’t defend what you don’t truly understand.

Information vs. Operational Technology

Our conversation also dives into the contrast between IT and OT systems, the difference between protecting data and protecting up-time. In traditional enterprise networks, confidentiality reigns supreme. In industrial environments like energy grids, water treatment facilities, or transportation systems, availability often comes first. Adi explains how the CIA (Confidentiality-Integrity-Availability) triad flips in priority once you cross into operational technology, where a locked-out sensor can have the same consequence as a malicious intrusion.

Running 2.0

We close by exploring real-world lessons: aging infrastructure still running on decades-old equipment, insider threats that outpace external attacks, and even a memorable case where poor cyber hygiene led to environmental contamination. The takeaway is clear; cybersecurity isn’t confined to screens and servers. It lives everywhere from data centers to wastewater tanks.

If you’ve ever wondered how Amentum secures critical infrastructure and supports national resilience, this episode is a must-listen. Tune in to hear how we’re bridging technology and mission to build a safer, smarter future.

Listen to Part 1 of “What the Tech?” with Adi Karisik to learn how Amentum is redefining cybersecurity across every domain.  Stay tuned for Part 2 as we explore the path ahead.

As always, stay curious.


Related News