Stop Using VPNs: Government Advice for OT Remote Access
Course
Andrew Ginter of Waterfall Security reviews the latest government guidance from CISA and the UK NCSC and stress-tests four OT remote access architectures against real attack sequences to show why hardware enforcement matters.
CISA, the UK NCSC and partner authorities across multiple countries have issued clear guidance: VPNs and jump hosts are no longer sufficient for OT remote access. This session stress-tests common remote access architectures against real attack sequences to show exactly why.
In this session, led by Andrew Ginter of Waterfall Security, you will learn:
- Why software-based remote access fails against connectivity exploitation, server pivots, session hijacking and client-pivot attacks;
- How hardware-enforced alternatives, including unidirectional gateways, timed switches and hardware-enforced remote access systems, structurally eliminate attack vectors that software cannot address;
- Why the latest government guidance reframes OT connectivity control as a foundational sabotage-prevention measure and not a compensating control.
Here is the course outline:
Stop Using VPNs - Latest Government Advice for OT Remote Access |