Exploited: The Cyber Truth

2026 ICS Security Predictions: What’s Next for Critical Infrastructure


Listen Later

As industrial control systems become more connected, more Linux-based, and more exposed to IT-style threats, 2026 is shaping up to be a turning point for ICS security.

In this end-of-year predictions episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder & CEO Joseph M. Saunders and CTO Shane Fry to discuss what will define ICS and critical infrastructure security in 2026.

The episode explores a bold prediction: We will see a major ICS breach originating from a web application vulnerability running directly on an embedded control device. As full Linux operating systems, Node.js apps, and web servers increasingly appear inside OT equipment, long-standing IT vulnerabilities are colliding with systems that are difficult—or impossible—to patch.

Joe and Shane dig into why detection-only strategies fall short in constrained, long-lived devices, and why secure by design engineering, memory safety, and runtime protections are becoming essential. They also discuss the importance of accurate, build-time Software Bills of Materials, especially as regulations like the EU Cyber Resilience Act push manufacturers toward transparency, accountability, and provable supply-chain visibility.

Together, they cover:

  • Why ICS exploitation is shifting from theoretical to operational
  • How web app and RCE vulnerabilities are creeping into OT devices
  • The limits of detection-only security strategies
  • Why memory safety and runtime protections reduce exploitable risk
  • How build-time SBOMs improve vulnerability tracking and trust
...more
View all episodesView all episodes
Download on the App Store

Exploited: The Cyber TruthBy RunSafe Security