Manufacturers worldwide are adopting capabilities that allow for more remote operations. While the benefits of remote and mobile access are multifaceted, remote operations can pose new risks to critical infrastructures. When workers and third-party vendors use remote communication technologies to directly access critical OT systems, the attack surface can become increasingly complex with new vulnerabilities.
To prevent direct access to network access, manufacturers must prioritize security measures that ensure any remote vendor access is closely managed and monitored.
In this webinar, attendees will learn: