OT Identity Access Management: Architecture, Roles and Deployment Best Practices
Course
Leonardo Ovidio of Brookfield Renewable Energy Group examines IAM architecture, access control and deployment best practices for OT environments.
As OT environments grow more complex, applying IT-style identity controls without adaptation creates significant gaps in security. Leonardo Ovidio of Brookfield Renewable Energy Group brings over two decades of cybersecurity leadership to explore how organizations can build IAM architectures that are purpose-built for OT constraints - from legacy PLCs to remote access risks.
In this session, you will learn:
- Why privileged access management must be treated differently in OT than in IT, and how to avoid common pitfalls when adapting IAM controls to industrial environments;
- How to apply frameworks such as NIST CSF 2.0, IEC 62443 and NERC CIP to identity management in ways that account for OT-specific risk, legacy protocols and operational continuity;
- How AI-powered monitoring and anomaly detection can strengthen identity governance in OT, and why foundational controls must come first.
Here is the course outline:
OT Identity Access Management: Architecture, Roles and Deployment Best Practices |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
