Webinar Recording

Strong Authenticated Remote Access to Critical Infrastructure

A Webinar with together with Secret Double Octopus

Critical industries face fast-approaching deadlines to prove they meet MFA mandates from both sides of the pond. It isn’t enough to check the box with partial coverage anymore with financial penalties on the line. Post-incident investigators, cyber insurance auditors, and attackers will inevitably discover coverage gaps, especially around remote accesses across the enterprise and production layers.

ICS infrastructure has evolved into a complex web employee and 3rd party equipment and services technicians needing remote access to the network and applications across multiple layered DMZ infrastructure. Unfortunately, traditional enterprise MFA approaches don’t work in these environments.

Watch our webinar together with Secret Double Octopus to learn how to stop attackers and satisfy auditors with phishing-resistant passwordless MFA in your critical industrial infrastructure.

Speakers:

  • Don Shin, Identity Security Strategist, Secret Double Octopus
  • Samir Kirouani, Solutions Engineer, Secret Double Octopus
  • Gavin Brown, Sales Director UK & I, iC Consult

Simply submit our form to watch the recording.

Withdrawal

You can revoke your consent at any time without giving reasons to iC Consult Group GmbH by sending an e-mail to datenschutz@ic-consult.com or by using the contact data provided in the imprint with effect for the future.

Further information on data protection can be found in our privacy policy.

 


Looking for a new job?

Join iC Consult!

Find Job

 

Whitepaper

Speeding up Zero Trust Delivery Using Managed Services

Download

Webinar: Navigating NIS2

Watch now


Centralized IAM for over 300,000 Identities | DB Schenker

Read Reference