Loading…
Welcome to the Interactive Agenda for SecurityWeek’s 2018 ICS Cyber Security Conference! (View the full conference website here)  (You can Register for ICS Cyber Security Conference Here
View analytic
Monday, October 22 • 3:30pm - 4:15pm
Zero Trust Networking for ICS Environments

Sign up or log in to save this to your schedule and see who's attending!

Perimeter-focused security programs prescribe a ‘one-size-fits-all’ approach to devices on the internal network, which historically has resulted in marginal effectiveness. The growing business requirement to incorporate IoT, OT, and IIoT devices into these programs means exceptions will become the new norm. A new approach is desperately needed.

Introduced in 2010 by Forrester Research, Zero Trust is a conceptual and architectural model for how security teams should redesign networks into secure microperimeters, strengthen data security using obfuscation techniques, limit the risks associated with user privileges and access, and improve security detection and response with analytics and automation. But will this practice work in industrial control system (ICS) environments where most equipment currently operating wasn’t designed for IT-oriented security methods?

Join ICS security expert Wayne Dixon as he discusses the advantages of Zero Trust security, common pitfalls of Zero Trust in converged IT and OT environments, and best practices for consuming a Zero Trust security model in ICS environments.

Speakers
avatar for Wayne Dixon

Wayne Dixon

Director, OT Technology Management, ForeScout Technologies
Wayne Dixon is Director of OT Technology Management at ForeScout Technologies, Inc. Wayne brings 20 years of hands on experience in both ‘boots on the ground’ and consultative roles, supporting commercial, federal, defense, local government, and international customers.


Monday October 22, 2018 3:30pm - 4:15pm