New Blog Post | Understanding the threat landscape and risks of OT environments

%3CLINGO-SUB%20id%3D%22lingo-sub-2405182%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Understanding%20the%20threat%20landscape%20and%20risks%20of%20OT%20environments%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2405182%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1622568261370.jpeg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F285403iBCCD3966EAD6762C%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1622568261370.jpeg%22%20alt%3D%22JasonCohen1892_0-1622568261370.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F06%2F01%2Funderstanding-the-threat-landscape-and-risks-of-ot-environments%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUnderstanding%20the%20threat%20landscape%20and%20risks%20of%20OT%20environments%20-%20Microsoft%20Security%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20security%20community%20is%20continuously%20changing%2C%20growing%2C%20and%20learning%20from%20each%20other%20to%20better%20position%20the%20world%20against%20cyber%20threats.%20In%20the%20latest%20Voice%20of%20the%20Community%20blog%20series%20post%2C%20Microsoft%20Product%20Marketing%20Manager%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fnataliagodyla%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ENatalia%20Godyla%3C%2FA%3E%26nbsp%3Btalks%20with%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fchrissistrunk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EChris%20Sistrunk%3C%2FA%3E%2C%20Technical%20Manager%20in%20Mandiant%E2%80%99s%20ICS%2FOT%20Consulting%20practice%20and%20former%20engineer%20at%20Entergy%2C%20where%20he%20was%20a%20subject%20matter%20expert%20on%20transmission%20and%20distribution%20of%26nbsp%3Bsupervisory%20control%20and%20data%20acquisition%20(SCADA)%20systems.%20In%20this%20blog%2C%20Chris%20introduces%20operational%20technology%20(OT)%20security%20and%20shares%20the%20unique%20challenges%20and%20security%20risks%20to%20OT.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2405182%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1622568261370.jpeg

Understanding the threat landscape and risks of OT environments - Microsoft Security

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical Manager in Mandiant’s ICS/OT Consulting practice and former engineer at Entergy, where he was a subject matter expert on transmission and distribution of supervisory control and data acquisition (SCADA) systems. In this blog, Chris introduces operational technology (OT) security and shares the unique challenges and security risks to OT.

0 Replies
www.000webhost.com