Avoid Downtime by Protecting Your Operational Technology (OT) Systems From Cyber Attacks
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote connections have blurred the IT-OT segmentation and expanded the attack surface providing new entry points for hackers to exploit.
Attendees learned how to:
- Implement strong, unphishable MFA and policy-based access controls to ensure high-trust authentication for admin accounts.
- Establish identity before privileged actions on an endpoint are allowed using a frictionless step-up authentication.
- Ensure only devices that meet the company’s security policy have access to admin accounts.
- Create a zero-trust PAM architecture. Don’t trust the user until they pass a high-assurance authentication and don’t trust their device unless it meets security policies.
- Eliminate passwords and the corresponding vulnerabilities from privileged accounts
BeyondTrust and Tenable work together to enable all organizations to close their cybersecurity exposure gap with continuous threat detection, vulnerability management and highly secure remote access for IT, OT, Cloud, Container, Mobile, apps and more.
Speaker and Presenter Information
Amrit Sokhal, Sr. Technology Alliances Integrations Manager, BeyondTrust
Dan Hewitt, Product Manager, OT Security, Tenable
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
BeyondTrust Government Team at Carahsoft
Tenable Government Team at Carahsoft