Skip to content
Identity and Access Management

Identity & Access Management in OT


Course
Upgrade subscription below

Amaro Neto shares how to establish clear roles and governance enabling effective IAM implementation, design IAM architectures tailored to OT constraints, and manage identities through cross-functional collaboration between IT, OT, and security teams.

Operational technology environments present unique identity and access management challenges that traditional IT IAM frameworks struggle to address. Legacy systems often lack native authentication capabilities, operational continuity demands conflict with security controls, and shared accounts persist across critical infrastructure - creating gaps that threaten both cybersecurity and operational safety when left unmanaged.

In this session, led by Amaro Neto, CISO at Hospital Ernesto Dornelles, you will learn:

  • How to establish clear roles, responsibilities and governance structures that enable effective IAM implementation across OT environments;
  • How to design IAM architectures tailored to OT constraints, including legacy system limitations and operational availability requirements;
  • How to manage identities and secure privileged access through cross-functional collaboration between IT, OT and security teams.
 

 

Here is the course outline:

Identity and Access Management in OT: A Practical Implementation Strategy

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button