#1732197: Webinar: 13 Ways To Break “Secure” OT Remote Access Systems
| Description: |
How much security do “secure” remote access solutions really provide? We’re laying all the cards on the table. In this webinar, we’ll explore 13 ways attackers can break OT remote access systems, show which SRAs are most vulnerable & which are most deserving of the “secure” title. We’ll finish with the questions you should be asking vendors to understand how exposed their solutions are. Understanding attacks is essential to designing robust defenses. One way to compare the strength of competing OT SRA solutions is to compare the attacks those solutions defeat reliably, vs the attacks they do not defeat. In this webinar, we cover a lucky 13 ways to break “secure” remote access systems, and look at which kinds of systems are vulnerable to each kind of attack. We finish with questions to ask “secure” OT remote access vendors to understand how exposed their solutions are to these kinds of attacks. In this session we cover VPNs, jump hosts and DMZ’s, and we look at the more modern cloud / broker / rendezvous architectures, as well as more deterministic, hardware-enforced solutions. The 13 Attacks We’ll Be Covering: 1) Shoulder surfing attacks – how attackers capture credentials without hacking 2) Social engineering users – exploiting human behavior to gain access 3) Password guessing & brute-force attacks – why weak credentials still succeed 4) Help desk social engineering – bypassing security through support teams 5) Rogue OT remote access (SRA) – unauthorized remote connections into OT networks 6) Exploiting outdated encryption – breaking legacy crypto protocols still supported 7) Malware passing through VPNs – how threats propagate inside trusted remote connections 8) Malware hiding in file transfer & clipboards – hidden risks in everyday remote workflows 9) Session hijacking & stealing logged-in cell phones – taking over active authenticated sessions 10) Exploiting known vulnerabilities – patching gaps and N-days lead to breaches 11) Stealing cookies to hijack browser sessions – compromising web-based remote access and password vaults 12) Zero-day exploitation in OT remote access – how unknown vulnerabilities are weaponized 13) Bypassing remote access entirely – when attackers go straight through the firewall |
|---|---|
| More info: | https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/webinar-13-ways-to-break-secure-ot-remote-access-systems |
| Date added | April 9, 2026, 12:09 a.m. |
|---|---|
| Source | waterfall-security |
| Subjects | |
| Venue | April 23, 2026, midnight - April 23, 2026, midnight |
