Skip to content
Operational Technology (OT)

Why Vendors Dictate OT Access - and How End Users Take Back Control


Course
Upgrade subscription below

Gabriel Diaz explores business and contractual forces that lead organizations to cede OT access control, practical architectures for reclaiming control through session brokering, and procurement strategies aligned with IEC 62443 and NIST standards.

Operational technology environments often operate under vendor-controlled access arrangements - persistent VPNs, shared accounts and unmanaged remote connections that compromise security perimeters. This asymmetry persists because vendors hold critical leverage: uptime guarantees, proprietary tools, specialized expertise and warranty terms that force operational teams to accept security compromises as the cost of maintaining availability.

Led by Gabriel Diaz, senior solutions architect at Xona Systems, this session will explore:

  • Business, contractual and cultural forces that lead organizations to cede control over OT access, and the security risks these arrangements create;
  • Practical architectures for reclaiming control through session brokering, just-in-time access, multifactor authentication and ephemeral credentials without breaking SLAs;
  • Procurement and legal strategies to embed warranty-safe security requirements, vendor risk tiers and incident response obligations aligned with IEC 62443 and NIST standards.
 

 

Here is the course outline:

Why Vendors Dictate OT Access - and How End Users Take Back Control

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button