Third-party risk in Operational Technology (OT) environments presents unique challenges that go far beyond traditional IT vendor management. While IT typically focuses on patching and product security, OT must contend with integrators, remote maintenance contracts, and legacy systems requiring always-on access—often with limited visibility or control. With 98% of organizations linked to a third party that experienced a breach and supply chain attacks surging by 742%, the stakes have never been higher.
In this session you will:
Examine key differences in third-party risk between OT and IT, including the complexities of remote access and contractual blind spots
Learn strategies to regain control over vendor access, monitor third-party activities in real time, and enforce access restrictions with non-repudiation
Explore real-world lessons from a case study where misplaced confidence in vendor controls led to a serious breach in an OT environment
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.