Picture this: You wake up. No power. No water. Your phone's dead. The city's transportation system is down. These aren't doomsday fantasies; they're very real possibilities in today's world.
When addressing gaps in cybersecurity, we often think of non-digital natives—those born before the digital age of the early 1980s— as those who have very limited experience with the technical world. But what about engineers, power distributors, and other infrastructure workers?
We asked industry professionals such as Dr. Tarvin Arafin at GMU's Department of Computer Engineering, conducted surveys with local college students, and analyzed data to foster an empathetic design mindset and determine why this demographic is disproportionately unrecognized.
Infrastructure workers interact with technical systems every day yet, contrary to assumption, a significant portion lack cybersecurity training. The numbers tell a clear story:
55.7% of power distributors and dispatchers are aged 45 and above, placing them in the generation that may be defined as "non-digital native".
53.8% of rail yard engineers fall within this same age range.
11% of infrastructure workers are 24 or younger... but also lack adequate training
(Brookings 2022)
Why is this demographic ignored?
💰Stricter budgets
🗣️Lower awareness of the likelihood of cyber attacks
🧑💻Poor cyber hygiene from workers
The systems we take for granted, such as power grids, water treatment, and transportation networks, face digital threats that grow more sophisticated daily. This isn't just tech talk. When these systems fail, people get hurt, economies suffer, and communities break down.
Across America, infrastructure managers face impossible choices:
Small municipal utilities and regional infrastructure operators are fighting this battle with one hand tied behind their backs. They're running networks designed in the 1990s with 2023's threats knocking at the door. Many don't have a single dedicated security person on staff. Some still use passwords like "password123" because they simply don't know better.
Consider the reality for many small utilities: control systems connected to the internet with minimal protection, skeleton crews responsible for everything from daily operations to cybersecurity, and budgets that force impossible choices between essential maintenance and critical security upgrades.
For these organizations, the stakes couldn't be higher. It's not just about system downtime or data loss—it's about 30,000 people potentially without clean water. Or a community facing power outages during extreme weather. Or transportation systems failing when people need them most.
That's the human cost of this problem. It's the plant operator who is three years from retirement trying to learn cybersecurity overnight. It's the IT administrator juggling hundreds of critical systems with outdated tools. It's the city manager deciding between fixing roads or upgrading security.
When infrastructure fails, we all feel it:
The hospital that loses power during a critical surgery.
The small business that can't process payments for days.
The family whose financial information is stolen when municipal systems are breached.
With thousands of local utilities and infrastructure providers across America, many serving just a few thousand people, this isn't a problem for "someone else" to solve. It's happening in communities just like yours.
Organizations spend millions on security solutions they barely understand and can barely implement. Well-meaning federal programs offer guidance but not practical help. The status quo isn't working.
What these organizations need isn't another expensive black box or 500-page security framework. They need tools that work in the real world, with real constraints, operated by people who didn't major in computer science.
That's why we built OASIS. Because securing our nation's backbone shouldn't require a Fortune 500 budget or a team of security PhDs.
The OASIS solution emerged through a rigorous design thinking process, embracing two key innovative mindsets:
We began by immersing ourselves in the world of infrastructure operators. Rather than starting with technology, we started with people. Our team:
Spoke with Academic researchers intimately familiar with ICS, SCADA, and IoT Security
Polled our local communities to better understand their awareness and engagement with the current state of infrastructure security
Continually refined our understanding of current security needs by deeply researching prior and relevant attacks on critical infrastructure
This human-centered approach revealed that many existing solutions fail because they don't account for the realities of infrastructure work environments—often noisy, interruption-heavy, and staffed by workers with deep domain expertise but limited security training.
We embraced the experimental mindset by:
Testing different approaches to gamification and employee engagement
Building and breaking our own simulated ICS environments to understand vulnerability patterns
Creating rapid prototypes of training modules with the goal of testing them with real infrastructure workers
These experiments transformed our understanding of the problem. We initially assumed technical complexity was the main barrier to security adoption, but discovered that organizational culture and staff engagement were far more significant factors.
Through rigorous prototyping, planning, and deployment, OASIS was born. Learn more about OASIS on our "Why Choose Us?" page!