#1664679: Beyond-the-firewall-ensuring-ot-app-security
Description: |
In this webcast, we’ll delve into how application security principles intersect with the Operational Technology (OT) landscape, bolstering your OT application security posture. Join us as we explore: Identity and Access Management (IAM): Control and manage access to OT applications. We’ll delve into best practices for authentication, authorization, and role-based access control. Secure Development Environment: The engineering workstation is the heart of OT development. We'll touch on industry standard secure configuration guidelines, patch management, and secure OT communication protocols. Secure Coding: What does secure coding look like for PLCs? Change Detection and Monitoring: Detecting and responding to changes in the OT environment is critical. We’ll explore tools and practices to monitor and detect changes OT systems continuously, enabling swift responses to any anomalies. |
---|---|
More info: | https://webinars.techstronglearning.com/beyond-the-firewall-ensuring-ot-app-security?utm_campaign=4481460-2025_RSAC_Firewall_DO%2FSB&utm_source=hs_email&utm_medium=email&utm_content=345437821&_hsenc=p2ANqtz-8WlxMeYTHIMi6lsyQRaKM13SvwwrpZCdIQamr5N6db-n-cxbwn3JFalEvHoezT_F4dygGfgWrqJssVrfGdvMM_ddIffBhmop4hd476p1mYVsvz1s4 |
Date added | Feb. 4, 2025, 10:14 a.m. |
---|---|
Source | Tech Strong Learning |
Subjects | |
Venue | April 28, 2025, midnight - May 1, 2025, midnight |