3rd Party Risk Management , Governance & Risk Management , Operational Technology (OT)
How to Secure Third-Party Remote Access in OT Environments
Nicolas Moskal of Wallix Offers Practical SolutionsRemote third-party access is a particular problem in OT environments compared to IT environments, since OT often uses older legacy systems with longer replacement cycles. Consequently, the operators may not be familiar with using more advanced systems with remote connections as they more often work on-site. Also, there is often a lack of IT support in factories. Where remote access is needed, it is essential to ensure that the right, authorized, person - or machine ID - is connecting to the right resource for the approved purpose.
Nicolas Moskal of Wallix provides a demonstration of practical solutions to overcome these challenges, including push two-factor authentication via phone.
Watch this videocast to:
- Understand why remote third-party access is a particular problem in OT environments compared to IT environments;
- Learn about the different types of third-party access that cause problems and where the pain points are;
- Discover how to secure remote access without having to install any additional software.
An expert in IT and OT security, Moskal has more than 16 years of experience. At Wallix, he guides organizations to adeptly navigate and resolve their privileged access management hurdles, leads innovative solutions and imparts wisdom across the spectrum of cybersecurity, forensics, virtualization and networking.