The purpose of this presentation is to show that successful
retrocomputing projects and groups which currently exist follow
patterns we can use to help low-resource and industrial
organizations that need to secure their devices. Can retrocomputing
breathe new life into older technology to help secure the
enterprise?