У нас вы можете посмотреть бесплатно Zero Trust Meets OT: Securing Critical Infrastructure with Jori VanAntwerp Part 2 | JHTI или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
We’re back with Part 2, and the conversation is getting even more real. John Martinez continues to sit down with Jori VanAntwerp, CEO of EmberOT, to explore the evolving cyber threat landscape facing Operational Technology (OT) environments today. Jori breaks down the most common attack techniques, the role of plenty of breaches, and why traditional IT security playbooks don’t fully work in OT environments. In this video, they discuss: Applying Zero Trust in OT OT attacker’s first move and what to do about it Lessons from real incidents How EmberOT’s Ignite Onsite is arming responders with game-changing tools Jori’s personal reflections and career advice If you care about keeping critical infrastructure safe or just want to understand how OT, IT, and cybersecurity collide, you want to be here! Spoiler alert: he said to first start a career in IT… 😜 🧑🏻💻Follow and talk to Jori VanAntwerp: / jvanantwerp - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 📓Learn more at https://www.strongdm.com/ 🔔Subscribe to our channel for more videos: / strongdm 📱💻 SOCIALS - Let’s connect! - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 📳LinkedIn: / strongdm 🦋Bluesky: • Analytics Dashboards | StrongDM - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Knock knock.. Who’s there? Strong. Strong who???? StrongDM!!! Hi there 👋 (We know… that was a bit of a corny entrance), We’re StrongDM - Your Partner in Zero Trust Privileged Access. We’re a Zero Trust privileged access management (PAM) solution that provides policy-based action control for any type of infrastructure. We help security teams stop unsanctioned actions while ensuring continuous compliance. What are we proud to share? 👉Strong Policy Engine 👉Frustration-Free Access Management 👉Complete Visibility in your Environment 👉Workflows for Just-In-Time Access 👉Dad Jokes 🧑💼… like actually Explore, get to know us, enjoy a laugh, and we’ll chat soon. True Zero Trust = Never Trust. Always Authorize. 🙏🚀