Governance & Risk Management , Operational Technology (OT)
Overcoming the Challenges of Securing OT Systems
WALLIX's Graham Hawkey on Addressing Privileged Access Management ChallengesPrivileged access management plays a critical role in securing both IT and OT environments. Graham Hawkey of WALLIX outlined the unique challenges organizations face in securing legacy OT systems. He advises shifting from outdated VPNs to more robust and secure access methods to protect against emerging cyberthreats.
Implementing PAM in OT environments comes with operational hurdles, such as user resistance and lack of security expertise. But Hawkey pointed out that automated credential management helps prevent PAM from disrupting operations, while also ensuring compliance and security.
"Automating the credentials that we inject into the target system for the users helps mitigate the risk of the users having access to password keys or credentials," Hawkey said, adding that organizations should enable multifactor authentication to secure remote access for both internal users and third-party contractors
In this video interview with Information Security Media Group, Hawkey also discussed:
- Securing legacy OT systems without disrupting operations;
- Overcoming barriers to adopting privileged access management;
- The role of automated credential management in reducing risk.
Hawkey is a seasoned professional with 10 years of expertise in PAM, IT and OT. His knowledge spans multiple industries and is known for enhancing security and efficiency for customers. At Wallix he helps and advises clients on best practices for privileged access and identity access management.