Practical Guide for Evaluating OT Identity Access Management, Endpoint Protection & Backup Solutions
About This Session
With the rise of smart manufacturing, organizations are facing increased expectation to evaluate and integrate a modern set of technologies that support both operational continuity and cyber protection. This shift is driving the need for a balanced adoption of security solutions to support digital transformation in manufacturing.
Many organizations struggle to select and implement the right mix of solutions that are not only effective but also adhere to OT operational requirements. IAM must account for shared engineering workstations and OEM vendor access, endpoint protection needs to operate with minimal resource overhead, and both immutable and PLC backups must ensure operational resiliency with reliable backup and robust restoration processes.
In this session attendees will learn a structured approach for building requirements and evaluating IAM, endpoint protection, immutable backup, and PLC backup solutions for their OT environments. Attendees will learn how to weigh evaluation criteria, gain insights for piloting and scaling these solutions.
Many organizations struggle to select and implement the right mix of solutions that are not only effective but also adhere to OT operational requirements. IAM must account for shared engineering workstations and OEM vendor access, endpoint protection needs to operate with minimal resource overhead, and both immutable and PLC backups must ensure operational resiliency with reliable backup and robust restoration processes.
In this session attendees will learn a structured approach for building requirements and evaluating IAM, endpoint protection, immutable backup, and PLC backup solutions for their OT environments. Attendees will learn how to weigh evaluation criteria, gain insights for piloting and scaling these solutions.
Speaker
William Donohue
Booz Allen - OT Cybersecurity Engineer
Will Donohue an OT Cybersecurity Engineer for Booz Allen. He is the OT Cybersecurity Lab Manager who is dedicated to continuous improvements across development and maintenance workstreams. Will has leveraged the OT Innovation Hub to mirror client environments as best as possible for testing various OT security tools including Endpoint Protection tools, OT Passive Monitoring tools, Data Diodes, and more. Additionally, Will supports a range of OT Security focused client engagements ranging from setting up an OT Vulnerability management program to integrating various platforms into ServiceNow to create a centralized OT Asset and Vulnerability Management platform.
