{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Introduction to Securing Operational Technology","description":"You have Operational Technology in your environment and probably need to think about it a little bit.&amp;nbsp; I was lucky to chat with Kunle who is an expert not just in cybersecurity but also in OT Security.&amp;nbsp; In this episode he give great information on the differences between IT and OT and what you need to consider when protecting it. Connect with Kunle: https:\/\/www.linkedin.com\/in\/kunle-adetoro\/ Connect with Robert: https:\/\/www.linkedin.com\/in\/robertrounsavall\/ Some of the standards and trainings mentioned in the episode: NERC: https:\/\/www.nerc.com\/pa\/Stand\/Pages\/default.aspx IEC 62443: https:\/\/en.wikipedia.org\/wiki\/Cybersecurity_standards#IEC_62443 SANS ICS Training: https:\/\/ics.sans.org\/ Fortinet ICS Solutions:  https:\/\/www.fortinet.com\/solutions\/industries\/scada-industrial-control-systems &amp;nbsp; ","author_name":"The SynAckFinAck Podcast","author_url":"http:\/\/synackfinack.libsyn.com\/website","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/18282914\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/item\/18282914"}