Is Zero Trust Right for OT, Right Now?

Logo
Presented by

Brian Wrozek, Analyst, Forrester Rich Springer, Marketing OT Solutions, Fortinet Eric Schwake, Product Marketing, Fortinet

About this talk

Digital transformation has allowed businesses of all varieties to expand and take advantage of connectivity and remote access, with OT environments included. The difference for OT versus the masses - Many previously air-gapped systems are colliding with the internet creating security and production risks, exposing vulnerabilities and creating opportunities for bad actors. So, what happens with this absolute need to shift from a legacy implied trust model to a zero-trust (ZT) model? And how can this be implemented seamlessly across and within critical infrastructures? We encourage you to join this timely and intuitive discussion with our special guest from Forrester providing an analyst perspective on zero trust trends, what to pay attention to and the short- and long-term value. Plus, a unique perspective from both parties on: - Common misconceptions of ZT in OT - Key criteria and strategies for approaching ZT implementation - Aspects of successfully deploying ZT in OT environments
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (23)
Subscribers (1602)
For more than a decade, Fortinet has protected OT environments in critical infrastructure sectors such as energy, defense, manufacturing, food, and transportation. By designing security into complex infrastructure via the Fortinet Security Fabric, organizations have an efficient, non-disruptive way to ensure that the OT environment is protected and compliant. Most OT environments run legacy systems and protocols that are sensitive to disruption and lack effective security. Industrial environments once built to operate in isolated networks are now connected to the internet, exposing them to all the threats that plague IT networks. In addition, many OT organizations rely on OEMs and service providers to operate and maintain converged IT/OT networks remotely. This adds risk by both expanding the attack surface and inserting the potential for access by bad actors. The Fortinet Security Fabric seamlessly enables security for converged IT/OT ecosystems. It also provides OT-centric features and products to extend Security-Fabric capabilities to OT networks in factories, plants, remote locations, and ships. To help alleviate security risks across the organization, we’ve continued to enhance our OT security offerings. These innovations range from edge products to NOC and SOC tools and services to ensure effective and efficient networking and cybersecurity performance and operation. Subscribe to stay on top of industry trends and key areas of interest with several sessions including real-life perspectives.