Compromised identities and stolen credentials present major opportunities for cyber criminals. With
operational technologies that control critical infrastructure systems becoming increasingly connected, the
risk of attack via compromised identity dramatically increases.
Join this workshop to understand and respond to:
● Identifying the cyber attack risks that connected and remotely accessible OT systems face
● Potential solutions for users with multiple identities and credentials for different assets
● Overcoming the challenges faced when OT assets are not compatible with modern identity and access
management solutions
● Responding to losing access to OT assets in remote areas when the network is down
● Reducing your attack surface with multi-layer identity-based access management
Legacy OT systems are vulnerable to cyber attack as they were not built with security in mind and are compromised by outdated systems and lack of compatibility with new security technology. Many organizations may also not understand the dangers posed by legacy systems which is exasperated by lack of visibility across OT systems and security knowledge amongst their workforce.
Join this session to discuss:
● Finding the balance between maintaining legacy systems and transitioning to new technology
● Regularly auditing of your legacy systems to provide a clearer picture of potential vulnerabilities
● Isolating legacy systems from your network to protect your entire infrastructure from attack
● Identifying the security tools that will work effectively across legacy systems
Check out the incredible speaker line-up to see who will be joining David.
Download The Latest Agenda