Strong Authenticated Remote Access to Industrial Critical Infrastructure

Past Session

Speakers:

Session Details

Critical industries face a fast-approaching deadline to prove they meet regulatory MFA mandates everywhere. Checking the box with partial coverage won’t work, with financial penalties looming. Incident investigators, auditors, and attackers will inevitably find gaps with remote accesses across the L5/L4 enterprise and down into the ICS lower layers.

Strong authenticated remote access is critical for the complex web of employees and 3rd party workers needing to cross these layered DMZ networks. Unfortunately, traditional MFA approaches don’t work in these environments.

In this session, you will learn approaches to implementing phishing-resistant passwordless MFA in industrial applications.