Legacy systems remain the backbone of semiconductor manufacturing, operating in high-precision environments where downtime is costly, and system stability is paramount. However, as these systems age, they become increasingly vulnerable to cyber threats due to outdated software, lack of security updates, and growing IT-OT connectivity. With modern malware threats evolving rapidly, organizations must adopt innovative security strategies to protect legacy infrastructure while ensuring uninterrupted operations. This session will address the cybersecurity challenges of legacy Windows-based systems commonly found in semiconductor fabs, focusing on malware scanning, network segmentation, virtual patching, and endpoint protection strategies. We’ll explore how traditional IT security approaches—such as agent-based antivirus solutions—often fail in operational technology (OT) environments and discuss alternative security models tailored for manufacturing constraints. Key discussion points include: • Understanding the Risk Landscape – Why legacy systems remain a prime target for cyberattacks, and how threat actors exploit these vulnerabilities. • Challenges with Traditional Security Measures – The limitations of conventional antivirus solutions, patching constraints, and real-time scanning risks in high-availability production environments. • Network Segmentation and Access Control – Using firewalls, VLANs, micro-segmentation, and protocol control to reduce attack surfaces while maintaining system operability. • Malware Scanning & Endpoint Protection – Selecting security tools that are compatible with Windows XP, 7, and other unpatched legacy OS environments without disrupting factory processes. • Virtual Patching & Intrusion Prevention – Leveraging next-generation antivirus, application whitelisting, and behavior-based anomaly detection to mitigate threats on unpatchable systems. • Air-Gapping & Data Flow Controls – Implementing trusted peripheral controls, removable media restrictions, and isolated backup solutions to prevent lateral malware movement. • Backup & Disaster Recovery Planning – Best practices for securing tool configurations, production recipes, and operational logs while ensuring rapid recovery from cyber incidents. In addition, we will go over Real-world case studies will illustrate how leading semiconductor manufacturers have successfully secured legacy environments through vendor solutions and customized cybersecurity architectures. This session is ideal for CISOs, OT security professionals, IT managers, and semiconductor industry leaders looking to safeguard their legacy systems without compromising uptime, operational efficiency, or compliance. Join us to explore how modern cybersecurity approaches can be seamlessly integrated into legacy semiconductor environments, ensuring a future-proof defense against evolving cyber threats.