2025 Session
Yucatan
1:30 pm - 2 pm, Tuesday, October 28
Navigating Third-Party Risk in OT Environments
About

Third-party risk in Operational Technology (OT) environments presents unique challenges that go far beyond traditional IT vendor management. While IT typically focuses on patching and product security, OT must contend with integrators, remote maintenance contracts, and legacy systems requiring always-on access—often with limited visibility or control. With 98% of organizations linked to a third party that experienced a breach and supply chain attacks surging by 742%, the stakes have never been higher.

In this session you will:

  • Examine key differences in third-party risk between OT and IT, including the complexities of remote access and contractual blind spots
  • Learn strategies to regain control over vendor access, monitor third-party activities in real time, and enforce access restrictions with non-repudiation
  • Explore real-world lessons from a case study where misplaced confidence in vendor controls led to a serious breach in an OT environment
Get in touch
Get in touch
Customer Service
For any and all inquiries please click the button below
Speaking Opportunities

Kris Tanaka
VP, Event Programming

InfoSec World
Stay Informed
Join our mailing list for the latest news on InfoSec World 2025.