No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Scheduled
Wait Listed
Personal Calendar
Speaking
Conference Event
Meeting
Interest
Times for this session to be announced soon.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
LiveWorx 2019

IN483B - Identity, Authentication and Security for Automation Systems

Session Description

Many factories, process and building automation firms remain reluctant to connect their enterprises due to concerns surrounding privacy, data integrity and cyber security risk. Furthermore, the downtime, complexity and costs associated with evolving their currently installed legacy Programmable Logic Controllers, SCADA and ICS network devices is also prohibitive. At this session attendees will learn about strategies and solutions to enable the digital enterprise in a safe, secure and adaptive approach for legacy and future architectures.


Session Presenter
Additional Information
Industry 4.0 (Digital Manufacturing)
Security in the Factory & OT Networks
Firms do not need to “rip and replace” their current hardware and software infrastructure to safely and securely connect their enterprises to the internet.
Micro-segmentation and segregation utilizing authenticated identity at the edge node, is an adaptive approach, is not expensive to implement and can scale, over time.
“Zero Trust” models are valuable to address many of the critical issues surrounding the IT to OT convergence.
Breakout Session
45 minutes
Session Schedule