Critical infrastructure industries are prime targets for cyberattacks, and more than 70% of breaches exploit stolen credentials. Multi-factor authentication (MFA) should be a first-line defense of any cybersecurity strategy to protect critical data, information technology (IT) and operational technology (OT) environments from ransomware and other cyberattacks. But not all forms of MFA are created equal.  
 
Join us to hear from thought leaders at Schneider Electric and Yubico as they discuss the role of phishing-resistant authentication and hardware backed security using Zero Trust principles across your company and supply chain.  
 
You will learn:  
 
              - Schneider Electric’s journey to using modern phishing-resistant FIDO protocols to secure users, IT and OT environments, such as SCADA systems  
              - How Schneider Electric is protecting critical infrastructure through their IEC-62443 certified solutions for users and hardware-backed security for devices, positioning them well to meet higher-level cybersecurity regulations in the future 
             - Best practices that can apply to your organization and how phishing-resistant MFA is a business differentiator and can even help drive revenue  
Speakers
 
Chad Lloyd | Director, Security Engineering Team and Senior Fellow | Schneider Electric 
For more than 15 years, Chad Lloyd has served in a variety of roles at Schneider Electric,  a global leader in digital transformation of energy management and automation. Lloyd leads the Schneider Electric Cybersecurity Architecture Team involved with secure solution design and development (primarily for critical infrastructure). Lloyd holds numerous patents related to his work in cybersecurity, hardware, and software. 
 
Lloyd has earned multiple certifications including CISSP (Certified Information Systems Security Professional) and CEH (Certified Ethical Hacker). He obtained his M.S. in Computer Science and his M.S. in Computer Engineering from Middle Tennessee State University.  
 
David Treece | Vice President, Solutions Architecture and Integrations | Yubico 
 
David Treece focuses on enterprise solutions and partner integrations at Yubico, a global leader in modern phishing-resistant hardware authentication. Treece works with enterprise organizations to deploy strong authentication and the IT industry to provide phishing-resistant authentication solutions that are easy to use. He also works with the FIDO Alliance to define implementation patterns for the FIDO standards. He has over 20 years’ experience architecting and implementing Identity and Access Management systems for enterprises in the retail, manufacturing, IT and services industries.  
 
Treece is CISSP certified and has a Master’s of Science degree in Business Administration focused on Information Systems from San Diego State University. 
 

 

Hora

20:00 - 21:00 hs GMT+1

Organizador

industry week
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Abril / 2025 418 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 31 de Abril de 2025
Mar 01 de Abril de 2025
Mié 02 de Abril de 2025
Jue 03 de Abril de 2025
Vie 04 de Abril de 2025
Sáb 05 de Abril de 2025
Dom 06 de Abril de 2025
Lun 07 de Abril de 2025
Mar 08 de Abril de 2025
Mié 09 de Abril de 2025
Jue 10 de Abril de 2025
Vie 11 de Abril de 2025
Sáb 12 de Abril de 2025
Dom 13 de Abril de 2025
Lun 14 de Abril de 2025
Mar 15 de Abril de 2025
Mié 16 de Abril de 2025
Jue 17 de Abril de 2025
Vie 18 de Abril de 2025
Sáb 19 de Abril de 2025
Dom 20 de Abril de 2025
Lun 21 de Abril de 2025
Mar 22 de Abril de 2025
Mié 23 de Abril de 2025
Jue 24 de Abril de 2025
Vie 25 de Abril de 2025
Sáb 26 de Abril de 2025
Dom 27 de Abril de 2025
Lun 28 de Abril de 2025
Mar 29 de Abril de 2025
Mié 30 de Abril de 2025
Jue 01 de Abril de 2025
Vie 02 de Abril de 2025
Sáb 03 de Abril de 2025
Dom 04 de Abril de 2025

.

  • Comparativas de Software

    ¿No te salen las cuentas en la nube?

    La nube tiene importantes ventajas: ahorros de costes, facilidad para trabajar en equipos remotos, menor necesidad de administración de la infraestructura, mejoras de seguridad, etc. Sin embargo, al comentar con algunos clientes la posibilidad de migrar las licencias de Atlassian a cloud, me comentaron que habían hecho alguna experiencia de migración y no le salían tan bien las cuentas. Estos comentarios me hicieron reflexionar sobre cuáles podían ser las causas de que no salieran las cuentas y permitirme ofrecer algunas recomendaciones y consejos. ... Leer más

    Publicado el 22-Dic-2021 • 14.40hs

    0 comentarios

  • TODOS Comparativas de Software PDF

    Comparativas de software ERP para todos los sectores

    Publicado el 27-Set-2021 • 12.50hs

  • TODOS Comparativas de Software PDF

    Comparativas de software ERP para Fabricación

    Publicado el 27-Set-2021 • 09.51hs

.

.

.

.

.

Más Secciones »

Hola Invitado