Things Run Amok. Leveraging Zero Trust to protect IoT and OT assets.

preview_player
Показать описание
The Colonial Pipeline attack highlighted a need for improved cyber security for Operational Technology (OT) systems. Additionally, the rise of the Internet of Things (IoT) has led to new, sophisticated attacks like the Marai Botnet which targeted consumer IoT devices such as IP cameras to create a malicious network of compromised systems to run damaging Distributed Denial of Services attacks.

In 2021, President Biden issued "Executive Order 14028: Improving the Nation's Cybersecurity." This EO called for significant upgrades in cyber security for both IT and OT environments. The order also called for the federal government to "advance toward Zero Trust Architecture."

In this session, Zero Trust Creator, John Kindervag will discuss how Zero Trust principles can be used to protect various IT and OT environments by leveraging the 5 Steps of Zero Trust. He will also discuss how Zero Trust simplifies an organization's adoption of the new ISA/IEC 62443 Standards for industrial automation and control systems (IACS).
Рекомендации по теме