Join us to discuss “defense in depth” in the industrial networks, how to implement a “trust no one” and cyber safe remote access solutions.
Complimentary drinks and appetizers!
Cyber threats force IT departments to implement “defense in depth” which group devices into very small network zones to prevent mass scale takeover in case of a compromise. These devices “must talk together” for work to be done. This can make zone to zone data transfers impossible. Push protocols like MQTT, Rest, OPC-UA can overcome these limitations. Implementing “trust no one” also limits user access to only “what is required” for them to do their work. Another industry challenge is remotely accessing equipment while following these “defense in depth” and the “trust no one”.