Protecting Critical Infrastructure from Identity-Based Threats
This event qualifies for:
When 911 dispatch slows, a water utility loses visibility, a transit system cannot operate safely, or a district cannot deliver services, leaders ask the same three questions immediately:
- Who had access?
- What did they touch?
- Why was it not controlled?
As operational technology (OT) becomes more connected and vendor access expands, identity-based exploits are often the easiest path for attackers. They find ways to log in as legitimate users to move laterally and escalate access.
Federal, state and local organizations need to protect critical services by governing privileged access across people, vendors, endpoints, servers, cloud and OT environments.
Join us April 14th at 1pm ET for a live webinar and demo to learn:
- How to reduce standing privileges, shrink exposed access paths and prove exactly who accessed what, when and why.
- Why modern identity and privilege controls are essential for closing security gaps across IT and OT.
- Actionable steps for critical infrastructure security leaders
This webinar is part of the BeyondTrust Critical Infrastructure Series. Join us again on May 5th for the next session. Registration coming soon.
Speaker Details
Bill Venteicher
Director of Public Sector Marketing
BeyondTrust
Jeff Parker
Sr Solutions Engineer
BeyondTrust
Event Topic
Cloud Computing, Public Safety, TechnologyRelevant Audiences
All State and Local Government, All Federal Government
Event Type
Virtual / Online
Event Subtype
Webinar / Webcast
When
Tue, Apr 14, 2026 | 1:00 pm - 2:00 pm ET
Registration Cost
Complimentary
Sponsor