{"version":"1.0","provider_name":"Industrial Security Conference Copenhagen","provider_url":"https:\/\/insightevents.dk\/isc-cph","author_name":"Line","author_url":"https:\/\/insightevents.dk\/isc-cph\/author\/line\/","title":"New Technology: Hardware-Enforced OT Remote Access - Industrial Security Conference Copenhagen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jBiKbfUxT8\"><a href=\"https:\/\/insightevents.dk\/isc-cph\/2024\/10\/10\/new-technology-hardware-enforced-ot-remote-access\/\">New Technology: Hardware-Enforced OT Remote Access<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/insightevents.dk\/isc-cph\/2024\/10\/10\/new-technology-hardware-enforced-ot-remote-access\/embed\/#?secret=jBiKbfUxT8\" width=\"600\" height=\"338\" title=\"&#8220;New Technology: Hardware-Enforced OT Remote Access&#8221; &#8212; Industrial Security Conference Copenhagen\" data-secret=\"jBiKbfUxT8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/10\/Design-uden-navn-2024-10-10T155225.743.png","thumbnail_width":1200,"thumbnail_height":630,"description":"By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions The recent CISA \/ FBI \/ CertNZ \/ CCCS Guidance Modern Approaches to Network Access Security talks about securing OT systems and mentions some newer technology that not all practitioners may be familiar with. In this article we introduce OT-centric hardware-enforced remote access technology and look [&hellip;]"}