Securing Remote Access for Vendors – How to Do It Right

Posted on in Presentations

We’ve all seen the news implicating remote access in headline grabbing incidents, but these often lack any best practices in remote access. This BOF session will discuss what is working and what is not working with remote ICS access to facilitate operational requirements while maintaining security.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Mark Bristow


Director, CISA Hunt and Incident Response Team, Cybersecurity and Infrastructure Security Agency (CISA)

Technology Infrastructure & Operations

critical infrastructure remote access access control infrastructure security



Share With Your Community