COMMENTARY
When you stroll the expo flooring at any of the Black Hat or RSAC Conferences, the trade tells you the long run is right here. It is all quantum-resilient encryption, AI-driven safety operations facilities, and cloud-native architectures.
Then, I am going again to my day job.
With over 20 years of expertise spanning federal authorities, non-public manufacturing, and enterprise safety, I’ve seen the trade from each angle. In my present twin roles —advising Fortune 100s as a area CISO and defending a significant US metropolis as a sitting practitioner — I spend half my time discussing the “innovative,” and the opposite half defending the “rusting edge.”
The soiled secret of essential infrastructure and American manufacturing is not that we’re “behind” on patching. It is that we’re working the spine of our economic system on techniques the place “patching” is bodily inconceivable.
I’m speaking about operational know-how (OT) and programmable logic controllers (PLCs) working on Home windows 95 or customized DOS kernels. I’m speaking about controllers the place the seller dissolved 20 years in the past; the supply code was misplaced in a merger; and the engineer who hard-coded the logic died in 2005.
There is no such thing as a toll-free assist quantity. There is no such thing as a GitHub repository. There’s only a blinking inexperienced gentle that we pray by no means turns purple.
The Physics of Patching
This is not a case of laziness: It is a case of physics and CapEx [capital expenses].
Within the IT world, when a server reaches end-of-life, you spin up a brand new VM. Within the OT world, that “server” is a PLC bodily cemented into the facility plant’s basis or hardwired into the chassis of a hydraulic press.
Changing that $5,000 controller would not price $5,000.
-
In manufacturing: It means halting a manufacturing line that generates $50,000 an hour to tear out and rewire the “nervous system” of the manufacturing unit flooring.
-
In utilities: It means utilizing heavy cranes to hoist out a turbine generator put in earlier than the web existed.
-
In municipalities: It means digging up a significant metropolis intersection to succeed in a sewage elevate station buried 20 toes underground.
I’ve seen improve quotes for a single manufacturing line hit $10 million, not for the {hardware}, however for the development, re-certification, and downtime required to put in it.
So, the CFO says “No.” And the CISO is informed to “make it work.”
The “eBay Provide Chain”
This results in a actuality that might terrify the common client: The eBay Provide Chain.
I’ve personally helped manufacturing and municipal purchasers scour eBay for particular management modules that have not been manufactured for the reason that Clinton administration. We aren’t searching for antiques, however for the precise I/O playing cards wanted to maintain the water working or the meeting line transferring.
I do know of purchasers who actively monitor chapter filings, not for market intelligence, however to scavenge elements. When a manufacturing unit shuts down, they purchase up the legacy controllers, refurbish them, and put them into chilly storage. We’re cannibalizing the previous to outlive the current.
Securing the Un-Securable
We’re tasked with securing this “zombie” infrastructure towards nation-state actors armed with fashionable weaponry. We can not set up fashionable endpoint detection and response brokers on these PLCs. They might crash the kernel. We can not scan them for vulnerabilities. A easy nmap scan can knock a legacy SCADA system offline.
We’re pressured to construct a digital fortress round a corpse. Right here is how we do it in the true world:
-
“Digital Concrete.” True Segmentation VLANs usually are not sufficient. In case your legacy OT community can “speak” to the company IT community through a easy rule, you could have already misplaced. I counsel purchasers to make use of “Digital Concrete,” strict, hardware-based firewalls, or information diodes that enable site visitors to movement in just one route. The OT community ought to seem as a black gap to the surface world: Telemetry comes out, however nothing goes in.
-
Monitoring the wire, not the endpoint. Since we will not put an agent on a 30-year-old controller, we’ve to look at the wire. We use passive community monitoring to determine a baseline for “regular.” If a PLC that has spoken to the identical inside IP tackle for 15 years immediately tries to speak to a server in a distinct subnet, that’s your alarm.
-
Bodily safety is cyber safety. When digital locks fail, bodily locks should maintain. I’ve seen assessments the place we bypassed a million-dollar firewall by strolling into an unlocked utility shed and plugging a Raspberry Pi right into a change. In case you are working legacy gear, your bodily perimeter with fences, locks, and cameras turns into your main firewall.
The Actuality Verify
We have to cease shaming organizations for having legacy tech and begin serving to them safe it.
The water pump down the road from your own home, the manufacturing unit making your automobile elements, and the grid powering your workplace are seemingly counting on the “eBay Provide Chain.” We can not patch our approach out of this.
The man who wrote the code is gone. The seller is bankrupt. The {hardware} is out of date. However the mission — holding the lights on and the water clear — stays.
As safety leaders, our job is not to complain concerning the rust. It is to ensure the rust would not turn out to be a breach.
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s developments at the moment: learn extra, subscribe to our e-newsletter, and turn out to be a part of the NextTech group at NextTech-news.com

_Maskot_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=1024&resize=1024,1024&ssl=1)