Mini Sharma and Dr. Yusuf Hashmi discuss implementing zero trust for OT environments through continuous authentication, microsegmentation and real-time monitoring while ensuring operational continuity.
Traditional security models that rely on network perimeters are insufficient in protecting industrial control systems, SCADA networks and IoT-enabled OT devices. Zero trust security offers a robust approach to secure enterprise OT environments by enforcing continuous authentication, least-privilege access, microsegmentation and real-time threat monitoring. This session will explore key zero trust practices and implementation strategies to enhance OT security resilience while ensuring operational continuity.
The session will cover:
- IT-OT convergence and its security implications;
- Zero trust strategies for third-party integrations and remote maintenance;
- Securing cloud-based OT analytics, digital twins and remote monitoring solutions.
Here is the course outline:
Zero Trust for OT Security: A Practical Use Case |