Operational technology systems use legacy protocols and allow insider access without enough oversight. Former black hat ...