<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>90</height>
  <width>600</width>
  <title>Introduction to Securing Operational Technology</title>
  <description>You have Operational Technology in your environment and probably need to think about it a little bit.&amp;amp;nbsp; I was lucky to chat with Kunle who is an expert not just in cybersecurity but also in OT Security.&amp;amp;nbsp; In this episode he give great information on the differences between IT and OT and what you need to consider when protecting it. Connect with Kunle: https://www.linkedin.com/in/kunle-adetoro/ Connect with Robert: https://www.linkedin.com/in/robertrounsavall/ Some of the standards and trainings mentioned in the episode: NERC: https://www.nerc.com/pa/Stand/Pages/default.aspx IEC 62443: https://en.wikipedia.org/wiki/Cybersecurity_standards#IEC_62443 SANS ICS Training: https://ics.sans.org/ Fortinet ICS Solutions:  https://www.fortinet.com/solutions/industries/scada-industrial-control-systems &amp;amp;nbsp; </description>
  <author_name>The SynAckFinAck Podcast</author_name>
  <author_url>http://synackfinack.libsyn.com/website</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/18282914/height/90/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="90" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/item/18282914</thumbnail_url>
</oembed>
