3rd Party Risk Management , Governance & Risk Management , Operational Technology (OT)

How to Secure Third-Party Remote Access in OT Environments

Nicolas Moskal of Wallix Offers Practical Solutions
Nicolas Moskal, presales engineer, Wallix

Remote third-party access is a particular problem in OT environments compared to IT environments, since OT often uses older legacy systems with longer replacement cycles. Consequently, the operators may not be familiar with using more advanced systems with remote connections as they more often work on-site. Also, there is often a lack of IT support in factories. Where remote access is needed, it is essential to ensure that the right, authorized, person - or machine ID - is connecting to the right resource for the approved purpose.

Nicolas Moskal of Wallix provides a demonstration of practical solutions to overcome these challenges, including push two-factor authentication via phone.

Watch this videocast to:

  • Understand why remote third-party access is a particular problem in OT environments compared to IT environments;
  • Learn about the different types of third-party access that cause problems and where the pain points are;
  • Discover how to secure remote access without having to install any additional software.

An expert in IT and OT security, Moskal has more than 16 years of experience. At Wallix, he guides organizations to adeptly navigate and resolve their privileged access management hurdles, leads innovative solutions and imparts wisdom across the spectrum of cybersecurity, forensics, virtualization and networking.

About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.