Critical infrastructure industries are prime targets for cyberattacks, and more than 70% of breaches exploit stolen credentials. Multi-factor authentication (MFA) should be a first-line defense of any cybersecurity strategy to protect critical data, information technology (IT) and operational technology (OT) environments from ransomware and other cyberattacks. But not all forms of MFA are created equal.  
 
Join us to hear from thought leaders at Schneider Electric and Yubico as they discuss the role of phishing-resistant authentication and hardware backed security using Zero Trust principles across your company and supply chain.  
 
You will learn:  
 
              - Schneider Electric’s journey to using modern phishing-resistant FIDO protocols to secure users, IT and OT environments, such as SCADA systems  
              - How Schneider Electric is protecting critical infrastructure through their IEC-62443 certified solutions for users and hardware-backed security for devices, positioning them well to meet higher-level cybersecurity regulations in the future 
             - Best practices that can apply to your organization and how phishing-resistant MFA is a business differentiator and can even help drive revenue  
Speakers
 
Chad Lloyd | Director, Security Engineering Team and Senior Fellow | Schneider Electric 
For more than 15 years, Chad Lloyd has served in a variety of roles at Schneider Electric,  a global leader in digital transformation of energy management and automation. Lloyd leads the Schneider Electric Cybersecurity Architecture Team involved with secure solution design and development (primarily for critical infrastructure). Lloyd holds numerous patents related to his work in cybersecurity, hardware, and software. 
 
Lloyd has earned multiple certifications including CISSP (Certified Information Systems Security Professional) and CEH (Certified Ethical Hacker). He obtained his M.S. in Computer Science and his M.S. in Computer Engineering from Middle Tennessee State University.  
 
David Treece | Vice President, Solutions Architecture and Integrations | Yubico 
 
David Treece focuses on enterprise solutions and partner integrations at Yubico, a global leader in modern phishing-resistant hardware authentication. Treece works with enterprise organizations to deploy strong authentication and the IT industry to provide phishing-resistant authentication solutions that are easy to use. He also works with the FIDO Alliance to define implementation patterns for the FIDO standards. He has over 20 years’ experience architecting and implementing Identity and Access Management systems for enterprises in the retail, manufacturing, IT and services industries.  
 
Treece is CISSP certified and has a Master’s of Science degree in Business Administration focused on Information Systems from San Diego State University. 
 

 

Hora

20:00 - 21:00 hs GMT+1

Organizador

industry week
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Mayo / 2025 314 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 28 de Mayo de 2025
Mar 29 de Mayo de 2025
Mié 30 de Mayo de 2025
Jue 01 de Mayo de 2025
Vie 02 de Mayo de 2025
Sáb 03 de Mayo de 2025
Dom 04 de Mayo de 2025
Lun 05 de Mayo de 2025
Mar 06 de Mayo de 2025
Mié 07 de Mayo de 2025
Jue 08 de Mayo de 2025
Vie 09 de Mayo de 2025
Sáb 10 de Mayo de 2025
Dom 11 de Mayo de 2025
Lun 12 de Mayo de 2025
Mar 13 de Mayo de 2025
Mié 14 de Mayo de 2025
Jue 15 de Mayo de 2025
Vie 16 de Mayo de 2025
Sáb 17 de Mayo de 2025
Dom 18 de Mayo de 2025
Lun 19 de Mayo de 2025
Mar 20 de Mayo de 2025
Mié 21 de Mayo de 2025
Jue 22 de Mayo de 2025
Vie 23 de Mayo de 2025
Sáb 24 de Mayo de 2025
Dom 25 de Mayo de 2025
Lun 26 de Mayo de 2025
Mar 27 de Mayo de 2025
Mié 28 de Mayo de 2025
Jue 29 de Mayo de 2025
Vie 30 de Mayo de 2025
Sáb 31 de Mayo de 2025
Dom 01 de Mayo de 2025

.

  • Comparativas de Software

    ¿No te salen las cuentas en la nube?

    La nube tiene importantes ventajas: ahorros de costes, facilidad para trabajar en equipos remotos, menor necesidad de administración de la infraestructura, mejoras de seguridad, etc. Sin embargo, al comentar con algunos clientes la posibilidad de migrar las licencias de Atlassian a cloud, me comentaron que habían hecho alguna experiencia de migración y no le salían tan bien las cuentas. Estos comentarios me hicieron reflexionar sobre cuáles podían ser las causas de que no salieran las cuentas y permitirme ofrecer algunas recomendaciones y consejos. ... Leer más

    Publicado el 22-Dic-2021 • 14.40hs

    0 comentarios

  • TODOS Comparativas de Software PDF

    Comparativas de software ERP para todos los sectores

    Publicado el 27-Set-2021 • 12.50hs

  • TODOS Comparativas de Software PDF

    Comparativas de software ERP para Fabricación

    Publicado el 27-Set-2021 • 09.51hs

.

.

.

.

.

Más Secciones »

Hola Invitado