Session Details:
For most industrial control systems (ICS), trust has historically been assumed. PLCs have been set up to assume that any messages they received were legitimate, authentic, authorized and did not even use encryption. As we enter an era of zero trust, we must move from always trust to assume breached where nothing is trusted without verification and minimal access is granted. Learn how to leverage the principles of zero trust to reduce the risk of potential disruption to critical processes, even with the use of legacy equipment, the need for remote access for OEMs and integrators, and the importance of maintaining warranties for automation controls equipment. During this session, Fabio will review a strategy for deploying zero trust across OT and IT, including general deployment models and use cases to support remote access to critically protected resources (assets, processes, services, etc.) within a network boundary.
PresenterS: