Search
X

Webinar Recording

Strong Authenticated Remote Access to Critical Infrastructure

Withdrawal
You can revoke your consent at any time without giving reasons to iC Consult Group GmbH by sending an e-mail to datenschutz@ic-consult.com or by using the contact data provided in the imprint with effect for the future. Further information on data protection can be found in our privacy policy.

A Webinar with together with Secret Double Octopus

Critical industries face fast-approaching deadlines to prove they meet MFA mandates from both sides of the pond. It isn’t enough to check the box with partial coverage anymore with financial penalties on the line. Post-incident investigators, cyber insurance auditors, and attackers will inevitably discover coverage gaps, especially around remote accesses across the enterprise and production layers.

ICS infrastructure has evolved into a complex web employee and 3rd party equipment and services technicians needing remote access to the network and applications across multiple layered DMZ infrastructure. Unfortunately, traditional enterprise MFA approaches don’t work in these environments.

Watch our webinar together with Secret Double Octopus to learn how to stop attackers and satisfy auditors with phishing-resistant passwordless MFA in your critical industrial infrastructure.

Simply submit our form to watch the recording.

Our Speakers

Don Shin
Identity Security Strategist

Samir Kirouani
Solutions Engineer

Gavin Brown
Sales Director UK & I