Image ~1

Safeguard IT/OT Ecosystems: Phishing-Resistant Authentication, Hardware-Backed Security Using Zero Trust Principles

An IndustryWeek, Plant Services, and Smart Industry-hosted webinar sponsored by Yubico

This webinar was originally held on June 29, 2023, and is now available for on-demand viewing. Access it here!

Sponsor: Yubico

Already Registered? Please click here to log in.


Critical infrastructure industries are prime targets for cyberattacks, and more than 70% of breaches exploit stolen credentials. Multi-factor authentication (MFA) should be a first-line defense of any cybersecurity strategy to protect critical data, information technology (IT) and operational technology (OT) environments from ransomware and other cyberattacks. But not all forms of MFA are created equal.  

Join us to hear from thought leaders at Schneider Electric and Yubico as they discuss the role of phishing-resistant authentication and hardware backed security using Zero Trust principles across your company and supply chain.  

You will learn:  

  • Schneider Electric’s journey to using modern phishing-resistant FIDO protocols to secure users, IT and OT environments, such as SCADA systems  
  • How Schneider Electric is protecting critical infrastructure through their IEC-62443 certified solutions for users and hardware-backed security for devices, positioning them well to meet higher-level cybersecurity regulations in the future 
  • Best practices that can apply to your organization and how phishing-resistant MFA is a business differentiator and can even help drive revenue  


Chad Lloyd | Director, Security Engineering Team and Senior Fellow | Schneider Electric 

For more than 15 years, Chad Lloyd has served in a variety of roles at Schneider Electric,  a global leader in digital transformation of energy management and automation. Lloyd leads the Schneider Electric Cybersecurity Architecture Team involved with secure solution design and development (primarily for critical infrastructure). Lloyd holds numerous patents related to his work in cybersecurity, hardware, and software. 

Lloyd has earned multiple certifications including CISSP (Certified Information Systems Security Professional) and CEH (Certified Ethical Hacker). He obtained his M.S. in Computer Science and his M.S. in Computer Engineering from Middle Tennessee State University.  

David Treece | Vice President, Solutions Architecture and Integrations | Yubico 

David Treece focuses on enterprise solutions and partner integrations at Yubico, a global leader in modern phishing-resistant hardware authentication. Treece works with enterprise organizations to deploy strong authentication and the IT industry to provide phishing-resistant authentication solutions that are easy to use. He also works with the FIDO Alliance to define implementation patterns for the FIDO standards. He has over 20 years’ experience architecting and implementing Identity and Access Management systems for enterprises in the retail, manufacturing, IT and services industries.  

Treece is CISSP certified and has a Master’s of Science degree in Business Administration focused on Information Systems from San Diego State University. 

Sponsored by: