Cyber Risk Roundtable Ep. 4: Protecting OT Networks with Zero Trust Architecture

Logo
Presented by

Robert Albach (Palo Alto Networks), Jeff Harrison (Verizon), Ashish Khanna (Verizon)

About this talk

Zero Trust Architecture (ZTA) is a cybersecurity framework for prioritizing and managing cyber risk with the fundamental approach of “Never Trust, Always Verify”. While traction for ZTA began in IT environments, we are starting to see proliferation into Operational Technology (OT) use cases and even callouts within OT-specific standards and regulations. Still there are many asset owners and owners with questions on the suitability of ZTA for OT and best way to operationalize the frameworks. Join Zero Trust and OT Security experts from Verizon and Palo Alto Networks to learn more about: - The cybersecurity and regulatory trends driving ZTA adoption - A 5-step approach for developing a Zero Trust Architecture - Insights from real world assessments on why ZTA is needed - How to implement change that is aligned with the needs of industrial environments - Practical Zero Trust OT security use cases from the perimeter to the core industrial networks - Use cases including third party remote access, visibility, network segmentation - Key takeaways and lessons learned
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (519)
Subscribers (67661)
We deliver the promise of the connected world. In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity. Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.