Skip to content

Stop Using VPNs - Latest Government Advice for OT Remote Access


Course

Andrew Ginter of Waterfall Security reviews the latest government guidance from CISA and the UK NCSC and stress-tests four OT remote access architectures against real attack sequences to show why hardware enforcement matters.

CISA, the UK NCSC and partner authorities across multiple countries have issued clear guidance: VPNs and jump hosts are no longer sufficient for OT remote access. This session stress-tests common remote access architectures against real attack sequences to show exactly why.

In this session, led by Andrew Ginter of Waterfall Security, you will learn:

  • Why software-based remote access fails against connectivity exploitation, server pivots, session hijacking and client-pivot attacks;
  • How hardware-enforced alternatives, including unidirectional gateways, timed switches and hardware-enforced remote access systems, structurally eliminate attack vectors that software cannot address;
  • Why the latest government guidance reframes OT connectivity control as a foundational sabotage-prevention measure and not a compensating control.
 

 

Here is the course outline:

Stop Using VPNs - Latest Government Advice for OT Remote Access

Floating Button