Webinar: 13 Ways To Break “Secure” OT Remote Access Systems
and the questions you should be asking your OT SRA vendor...
Join us on April 23, 2026, 11am NY Time
How much security do “secure” remote access solutions really provide? We’re laying all the cards on the table.
In this webinar, we’ll explore 13 ways attackers can break OT remote access systems, show which SRAs are most vulnerable & which are most deserving of the “secure” title.
We’ll finish with the questions you should be asking vendors to understand how exposed their solutions are.
Understanding attacks is essential to designing robust defenses. One way to compare the strength of competing OT SRA solutions is to compare the attacks those solutions defeat reliably, vs the attacks they do not defeat.
In this webinar, we cover a lucky 13 ways to break “secure” remote access systems, and look at which kinds of systems are vulnerable to each kind of attack.
We finish with questions to ask “secure” OT remote access vendors to understand how exposed their solutions are to these kinds of attacks.
In this session we cover VPNs, jump hosts and DMZ’s, and we look at the more modern cloud / broker / rendezvous architectures, as well as more deterministic, hardware-enforced solutions.
13 Attacks we cover:
1) Shoulder surfing,
2) Social engineering users,
3) Password guessing,
4) Social engineering help-desks,
5) Rogue OT SRA,
6) Breaking old crypto versions,
7) Malware hopping the VPN,
8) File transfers & cut/paste
9) Stealing active sessions & devices,
10) Exploiting known vulnerabilities
11) Hijacking web-based SRA & password vaults
12) Exploiting zero-days
13) Ignore remote access – just break the firewall