Loading
Loading
C08
You can bolt on monitoring, threat detection, and encryption — but the underlying system was designed in an era when 'cybersecurity' wasn't a word, and it can't be replaced without shutting everything down.
Critical Infrastructure OT/Cyber-Physical Security Gap
10 problems across 7 domains · v3: 3 → v4: 5 → v5: 7 → v6: 10
Shared Structural DNA
These 10 problems share a paradox: monitoring technology works, but it's bolted onto infrastructure designed before cybersecurity existed. At 500 briefs, three new members expanded the cluster: building automation systems using BACnet/Modbus protocols with no authentication, water treatment SCADA with no independent safety limits on chemical dosing, and maritime navigation systems accepting unverified AIS/GPS position data. Among the 8 operational core members (physically deployed systems), installed-base prevalence is 100%. You can't upgrade the underlying system, so security solutions fail when retrofitted to legacy hardware.
Member Problems
Domain Spread