Skip to main content
Webinar
Tue, Apr 14, 5:00 PM - 6:00 PM (UTC)

Protecting Critical Infrastructure from Identity-Based Threats

About this event

Protecting Critical Infrastructure from Identity-Based Threats Webinars Protecting Critical Infrastructure from Identity-Based Threats Identity Security for Government Agencies When 911 dispatch slows, a water utility loses visibility, a transit system cannot operate safely or a district cannot deliver services, leaders ask the same three questions immediately:

• Who had access?

• What did they touch?

• Why was it not controlled?

As operational technology (OT) becomes more connected and vendor access expands, identity-based exploits are often the easiest path for attackers. They find ways to log in as legitimate users to move laterally and escalate access.

Federal, state and local organizations need to protect critical services by governing privileged access across people, vendors, endpoints, servers, cloud and OT environments.

Join us April 14 at 1pm ET for a live webinar and demo to learn:

How to reduce standing privileges, shrink exposed access paths and prove exactly who accessed what, when and why.

Why modern identity and privilege controls are essential for closing security gaps across IT and OT.

Actionable steps for critical infrastructure security leaders

Event details
Online event
Tue, Apr 14, 5:00 PM - 6:00 PM (UTC)