From power grids and pipelines to water plants and emergency services, our critical infrastructure is more connected than ever—and more vulnerable. In the latest episode of Tech in Translation, we sat down with Barry Wood, cybersecurity expert at Iron Bow, to explore what happens when cyber threats jump from the digital world into the real one.
Barry shares his unconventional journey from art history professor to infrastructure security advocate, offering deep insights into the convergence of IT and OT (operational technology). As our essential systems go online to reap the benefits of efficiency and remote access, they also open the door to increasingly sophisticated cyberattacks. As Barry puts it, “Art and technology are two sides of the same coin—both expressions of human ingenuity applied to the physical world.”
Cyber Threats with Real-World Consequences
No longer confined to stolen data or email phishing, cyberattacks now have the power to disrupt physical operations. Barry explains how attacks on water systems, power grids, and transportation can leave entire communities in danger. He walks listeners through real-world examples like the Colonial Pipeline hack, the Ukraine power grid attacks, and even a sewage spill in Australia caused by a disgruntled employee. “Just think of any convenience we take for granted,” Barry warns, “and imagine it suddenly gone.”
These stories aren't just cautionary tales—they underscore how urgently infrastructure must be secured in the face of modern threats.
Legacy Tech, Modern Risks
Much of our infrastructure runs on decades-old systems designed for uptime, not security. Barry breaks down the infamous "air gap" myth and explains why patching isn't always an option when systems have five-nines uptime requirements. “Some systems still run on Windows XP or even NT,” he notes. “They work, so no one wants to risk taking them offline—but that leaves them dangerously exposed.”
Using the Purdue model, Barry helps us understand how industrial systems are layered, and why attacks at the lower levels (where the machines actually move, heat, and cut) pose the greatest risks. “Level zero is where things get dangerous. That’s where heavy, sharp, pointy things are moving,” he explains. “If hackers reach that layer, it’s a threat to life and limb.”
Defense Is Doable: The Five ICS Critical Controls
Barry also highlights the five critical controls for defending industrial systems, as outlined by the SANS Institute:
- ICS-Specific Incident Response Plans
- Secure Architecture and Network Segmentation
- OT Visibility and Monitoring
- Secured Remote Access
- Risk-Based Vulnerability Assessments
A story about a utility company that successfully isolated an intruder thanks to these basic safeguards proves that good defense isn't just possible—it's effective. “The intruder got in, but they were trapped in a locked room with nothing to do,” Barry shares. “Because the basics were in place, the damage was zero.”
Empowering Everyone from Engineers to End Users
Barry offers practical advice for everyone from IT admins to the Accounting crowd. Whether it’s keeping antivirus updated, avoiding shadow IT, or enabling PowerShell logging, basic cyber hygiene can make a big difference. “Don’t plug in your own stuff to the network,” he emphasizes. “That cool app on your USB stick might be the thing that opens the door to an attacker.”
He ends the episode with a rallying cry: "Defense is doable. But we have to do it."
Looking Ahead
As cyber threats evolve—especially with adversaries gaining real-world practice in global conflicts—Barry stresses the need for continued investment, training, and awareness. “The bad guys are learning fast, and they’re getting funded,” he warns. “We’ve got to match that urgency.” From federal agencies to utility companies, those who take OT security seriously today will be the ones best positioned to defend tomorrow.
Subscribe now to receive the TechSource newsletter and never miss an episode!

COMMENTS