In this webcast, we’ll delve into how application security principles intersect with the Operational Technology (OT) landscape, bolstering your OT application security posture. Join us as we explore:
- Identity and Access Management (IAM): Control and manage access to OT applications. We’ll delve into best practices for authentication, authorization, and role-based access control.
- Secure Development Environment: The engineering workstation is the heart of OT development. We'll touch on industry standard secure configuration guidelines, patch management, and secure OT communication protocols.
- Secure Coding: What does secure coding look like for PLCs?
- Change Detection and Monitoring: Detecting and responding to changes in the OT environment is critical. We’ll explore tools and practices to monitor and detect changes OT systems continuously, enabling swift responses to any anomalies.