Controlling Access in an IT/OT Converging Environment

Explore methods for managing access in mixed IT/OT environments, including identity-based controls and zone segmentation.

Topic

Awareness / Phishing / FraudLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceIndustry 4.0 / IoT / Edge ComputingNetwork Security / Patch ManagementData CenterTrend topic

When & Where

calendar_month

Wed, 10/08/2025, 09:30 - 09:45

location_on

Forum, Booth 9-105

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

  • Language:

    German

Session description

In today's connected world, managing access in mixed IT/OT environments is critical to security. Organizations must develop robust strategies to protect both traditional IT networks and critical industrial control systems (OT).

Identity-based access controls are a key pillar of this strategy. Rather than relying on static passwords or device identifiers, these controls focus on the identity of the user or device. This means that access to systems is dynamically granted or denied via Network Access Control based on roles, permissions, and the current context. For example, a technician responsible for maintaining a PLC is only granted access to the relevant network segment from an authorized device. This method minimizes the risk posed by compromised accounts or unauthorized access ...

Moderator