CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 13, 2026

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

Dark Reading Archived Apr 13, 2026 ✓ Full text saved

OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.

Full text archived locally
✦ AI Summary · Claude Sonnet


    ICS/OT SECURITY THREAT INTELLIGENCE VULNERABILITIES & THREATS COMMENTARY Empty Attestations: OT Lacks the Tools for Cryptographic Readiness OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security. Brad McInnis,Founder and CEO,Cyberzero April 13, 2026 5 Min Read SOURCE: NICK GREGORY VIA ALAMY STOCK PHOTO In 2003, 55 million people lost power across the US and Canada because of a software bug and a failure to communicate. Nobody attacked anything. And more than two decades later, the same infrastructure faces sophisticated adversaries who are planning very carefully. Operational technology (OT) operates on a different set of priorities than the rest of us. In IT, confidentiality and integrity come first. In OT — the systems that open and close breakers, adjust voltage, and monitor load and faults — only one thing matters: availability. Security was never part of the original design. And bolting it on later is harder than it sounds when downtime is simply not an option. Many of these systems still run on older protocols with no encryption and weak authentication. Get it wrong, and the consequences aren't a data breach or a regulatory fine. People lose power, water, and heat. The systems that modern life depends on stop working. Quietly at first — then all at once. Related:Industrial Controllers Still Vulnerable As Conflicts Move to Cyber Volt Typhoon, a Chinese state-sponsored threat actor, maintained long-term access inside US critical infrastructure networks using legitimate credentials and native tools. In at least one documented case, Volt Typhoon's access lasted nearly a year. That kind of access is not about theft. It is about positioning for disruption. And because the Canada-US energy grid is deeply interconnected, the threat does not stop at the border. Our security frameworks largely do. But the real question is not what they saw while they were inside. It is what they took with them on the way out. Today asset owners operating critical infrastructure are being asked to attest to their cryptographic readiness; confirm that your encryption is safe in the quantum era and demonstrate that you know what you have. It is a reasonable ask. The problem is most of them have no idea. And the frameworks being used to assess them were never built for the environments in which they operate. This is not a criticism of regulators or asset owners. It is a gap. And until we acknowledge it honestly, we are not solving it. IT environments were designed with the assumption that systems could be interrogated, updated, and occasionally taken offline. OT was not. OT was designed around a completely different priority: availability. These systems were never meant to be patched on a Tuesday night. Many were installed before cybersecurity was even a word. Migrating to post-quantum cryptography in IT environments is already a complex multiyear effort. In OT environments the challenge is greater. Cryptography may be embedded in firmware, hard coded into devices that cannot be upgraded without physical access, or dependent on vendor support cycles measured in decades. Some of those devices operate with as little as 32KB of RAM and lack the processing power to execute modern cryptographic operations. Post-quantum algorithms were not designed for those constraints. Some equipment currently in service was installed before cryptographic standards even existed. Related:Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs Asking an OT asset owner to attest to cryptographic readiness using frameworks built for IT environments is like asking someone to pass a driving test in a vehicle with no dashboard. The requirement exists. The instrumentation does not. OT Data Has Already Been Harvested, Here's the Bigger Risk  Here is what most people are not saying out loud: The data is already being taken. Adversaries collecting encrypted traffic from OT environments today are not waiting to see if they can read it. They are waiting for the moment when they can. That moment is getting closer. Quantum computing doesn't just threaten future communications; it threatens the assumption that everything collected in the past was safe. The ghost that lived inside your network for a year didn't just learn your layout. It may have left with your keys. Now consider a broader scenario. An attacker that harvested encrypted data from your network today can decrypt it once quantum computing makes that possible. That is harvest now decrypt later.  Related:Vehicle Tire Pressure Sensors Enable Silent Tracking But there is a second threat that gets even less attention. If an attacker has collected a vendor's firmware signing keys, they could come back years from now and push a malicious update to every device on your network. Every device accepts it without question because the signature looks legitimate. That is trust now, forge later.  The ghost doesn't need to break back in. It left the door open on the way out. And most operators can't answer the most basic question: Where does cryptography live in their environment? Not because they are negligent. Because these systems were never built to be audited that way.  Cryptography is buried in long-forgotten libraries, embedded in devices installed decades ago, invisible to the tools most security teams rely on. The data does not exist. The process to collect it has never been built. Signing an attestation form does not change that reality. It just creates the appearance of assurance where none exists. When the gap between what is being asked and what can be demonstrated is large enough, organizations do one of two things. Either they invest in genuinely closing the gap, or they invest in looking like they closed it. In under-resourced OT environments operating on thin margins with aging infrastructure and skeleton security teams, the path of least resistance is obvious. Check the box. File the attestation. Move on. The result is a false sense of assurance that may be more dangerous than acknowledged uncertainty. A regulator who believes attestations are meaningful stops asking hard questions. An asset owner who has filed the paperwork stops feeling the urgency. The ghost is still in the grid. Nobody is looking for it anymore. The urgency behind cryptographic readiness requirements is real. NIST released its Post-Quantum Cryptography Standards for a reason, and government timelines exist for a reason. But determining where cryptography lives across an OT environment takes years. For many organizations, a decade may not be enough. But urgency without capability is just pressure. And pressure without the right tools produces paperwork, not security. Before asking asset owners to attest to something, regulators have an obligation to ensure the frameworks, guidance, and tooling exist to make that attestation meaningful. Right now, they do not. Until that changes, attestation requirements are asking people to confirm something they can't verify. That is not security. That is paperwork dressed up as security. The ghost is already inside the grid, walking the halls, looking exactly like it belongs there. The question is whether we find it before it decides to act. Read more about: Opinion About the Author Brad McInnis Founder and CEO, Cyberzero Brad McInnis is the Founder and CEO of cyberzero, a Canadian company focused on post-quantum cryptography. He has over 25 years of experience in cybersecurity operations and applied cryptography across Five Eyes defense and intelligence environments, and previously served as Chief Security Architect at Deloitte. He contributes to NIST post-quantum cryptography working groups. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World More Webinars You May Also Like ICS/OT SECURITY Critical Claroty Authentication Bypass Flaw Opened OT to Attack by Jai Vijayan, Contributing Writer OCT 30, 2025 ICS/OT SECURITY Patch Now: Attackers Target OT Networks via Critical RCE Flaw by Elizabeth Montalbano, Contributing Writer AUG 13, 2025 ICS/OT SECURITY CISO Conversations: How IT and OT Security Worlds Are Converging by Kelly Jackson Higgins JUL 22, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 THREAT INTELLIGENCE Axios Attack Shows How Complex Social Engineering Is Industrialized byAlexander Culafi APR 6, 2026 5 MIN READ ICS/OT SECURITY Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs byElizabeth Montalbano APR 8, 2026 4 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 13, 2026
    Archived
    Apr 13, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗