About
Third-party risk in Operational Technology (OT) environments presents unique challenges that go far beyond traditional IT vendor management. While IT typically focuses on patching and product security, OT must contend with integrators, remote maintenance contracts, and legacy systems requiring always-on access—often with limited visibility or control. With 98% of organizations linked to a third party that experienced a breach and supply chain attacks surging by 742%, the stakes have never been higher.
In this session you will:
- Examine key differences in third-party risk between OT and IT, including the complexities of remote access and contractual blind spots
- Learn strategies to regain control over vendor access, monitor third-party activities in real time, and enforce access restrictions with non-repudiation
- Explore real-world lessons from a case study where misplaced confidence in vendor controls led to a serious breach in an OT environment