Beyond the Firewall: Ensuring OT App Security

In this webcast, we’ll delve into how application security principles intersect with the Operational Technology (OT) landscape, bolstering your OT application security posture. Join us as we explore:

  • Identity and Access Management (IAM): Control and manage access to OT applications. We’ll delve into best practices for authentication, authorization, and role-based access control.
  • Secure Development Environment: The engineering workstation is the heart of OT development. We’ll touch on industry standard secure configuration guidelines, patch management, and secure OT communication protocols.
  • Secure Coding: What does secure coding look like for PLCs?
  • Change Detection and Monitoring: Detecting and responding to changes in the OT environment is critical. We’ll explore tools and practices to monitor and detect changes OT systems continuously, enabling swift responses to any anomalies.
  • Webinar Recording

    Related Webinars