Supply Chain Risk and Mitigation in Operational Technology

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Operational Technology (OT) environments, critical to the infrastructure of industries such as manufacturing, energy, and healthcare, are increasingly vulnerable to cyber threats.

Third party risks have exploded in recent months and are a top concern for cybersecurity leaders working in organizations with sprawling supply chains and multiple vendors.

Ensuring secure and controlled access for vendors is paramount to maintaining the integrity and safety of OT systems.

In this 30-minute session, experts from Imprivata will introduce the unique security challenges in OT environments and the increased importance of security vendor access in OT sectors.

Join us to learn:

  • How real-world examples of OT security breaches can be mitigated
  • Ways to enhance security through multi-factor authentication (MFA) and session recording
  • Expert insights on overcoming common hurdles in OT security
  • How Imprivata VPAM provides secure, controlled, and audited vendor access

Speakers

Photo of Joel Burleson-Davis

Joel Burleson-Davis

SVP Worldwide Engineering, Cyber, Imprivata

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Imprivata here: https://www.imprivata.com/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.