IoT and OT cyber security is truly here. That fact became all the more apparent when a water treatment plant in Oldsmar, Florida was hacked to attempt to poison the water source. While that hack was unsophisticated, the US has a power grid backdoor which a nation state walked through. It is time for cyber security executives to sound the alarm around IoT security.
Real-time Zero Trust Network Access is increasingly becoming an enterprise-wide requirement. As recently as Q4 2020, 75% of the Cyber Security community utilized VPN for myriad reasons, with the principle logic being that the total timeline and cost for implementation of a ZTNA (outside of the technology itself) is remarkably high. The reality is, a VPN environment is costly, designed for built-in obsolescence through licensing and software updates, cannot encompass protections for IoT and most importantly, leaves the network it is supposed to protect inherently vulnerable to a breach. This session will elucidate attendees to state of the art commercial technologies brought over from the defense and intelligence communities to operate on a “Verify then Trust” principle for the world of devices in the IT/IoT.