Securing Remote Access for Vendors – How to Do It Right


Posted on in Presentations

We’ve all seen the news implicating remote access in headline grabbing incidents, but these often lack any best practices in remote access. This BOF session will discuss what is working and what is not working with remote ICS access to facilitate operational requirements while maintaining security.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Amie Wozniak

Participant

Project Manager, Nth Degree

Cecilia Marinier

Participant

RSA Conference Program Manager, Self Employed

Mark Bristow

Facilitator, Participant

Director, CISA Hunt and Incident Response Team, Cybersecurity and Infrastructure Security Agency (CISA)

Technology Infrastructure & Operations

critical infrastructure remote access access control infrastructure security


Topic

Subtopic


Share With Your Community