Skip to main content

Webinar

Protecting Operational Technology in a Remote Environment

Visibility and coverage are critical to operational technology security 

Within the past year, 74 percent of operational technology (OT) organisations experienced a data breach. To protect your remote environment from increasing cyber manipulation of OT and industrial control systems (ICS) and devices, Booz Allen and Dragos experts explore how to best configure defenses in a remote environment. 

What You Will Learn:
  • Anatomy of an OT attack
  • Your role in protecting OT and ICS remotely
  • OT cybersecurity trends and threats
  • Overview of IT, OT, and ICS remote access