Archer

The 6 Areas Where a Centralized Access Management Approach can Simplify Compliance Coverage

  • June 6, 2017
  • 11:00 am

When researching solutions to address security and regulatory compliance, many utility organizations find themselves acquiring a number of point tools to address the various security / compliance gaps.

This webinar replay discusses how a centralized access management approach can simplify adherence to security and compliance by investigating its value and compliance coverage across both IT and OT devices for interactive access and authentication, password management, asset management, configuration monitoring, logging across various applications and devices, and patch gap analysis.

WATCH REPLAY HERE

Speakers:

Steven Parker, CISA, CISSP, has been engaged in critical infrastructure protection within the energy sector for more than a decade, including eight years as a senior security staff member at PacifiCorp. Mr. Parker was part of the original audit team that established the NERC CIP audit program at the Western Electricity Coordinating Council (WECC). His experience includes a broad range of security disciplines including e-commerce, identity management, intrusion detection, forensics, incident response and investigations, security event monitoring, and NERC CIP compliance.

Ray Erlinger is a senior engineer at TDi Technologies responsible for the SCADA and Control Systems solutions.  His expertise is in telecommunications, WAN and LAN design, process design, systems programming, and protocol stack software.  Ray is responsible for building and integrating the integrated IT / OT lab at TDi Technologies and is instrumental in working with our Energy customers in implementing the ConsoleWorks software to address their compliance needs. Ray received his BSEE from Oklahoma State University and is currently involved in research in the area of Industrial Control Systems Security.

 

This presentation is brought to you by Archer’s Partner: