Avoid Downtime by Protecting Your Operational Technology (OT) Systems From Cyber Attacks



Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote connections have blurred the IT-OT segmentation and expanded the attack surface providing new entry points for hackers to exploit.

Attendees learned how to:

  • Implement strong, unphishable MFA and policy-based access controls to ensure high-trust authentication for admin accounts.
  • Establish identity before privileged actions on an endpoint are allowed using a frictionless step-up authentication.
  • Ensure only devices that meet the company’s security policy have access to admin accounts.
  • Create a zero-trust PAM architecture. Don’t trust the user until they pass a high-assurance authentication and don’t trust their device unless it meets security policies.
  • Eliminate passwords and the corresponding vulnerabilities from privileged accounts

BeyondTrust and Tenable work together to enable all organizations to close their cybersecurity exposure gap with continuous threat detection, vulnerability management and highly secure remote access for IT, OT, Cloud, Container, Mobile, apps and more.

Speaker and Presenter Information

Amrit Sokhal, Sr. Technology Alliances Integrations Manager, BeyondTrust

 

Dan Hewitt, Product Manager, OT Security, Tenable

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register


Register


Event Type
On-Demand Webcast


This event has no exhibitor/sponsor opportunities


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Organizer
BeyondTrust Government Team at Carahsoft
Tenable Government Team at Carahsoft


Contact Event Organizer



Return to search results