Artwork

Innhold levert av Supply Chain Now. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Supply Chain Now eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

4-Step Guide to Thwarting Cyber Threats in Critical Infrastructure featuring Jose Razo with Microsoft

29:11
 
Del
 

Manage episode 425259447 series 2824527
Innhold levert av Supply Chain Now. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Supply Chain Now eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In today's digital age, the threat of cyber attacks looms large over individuals, businesses, and critical infrastructure. The rapid advancement of technology has made our systems more interconnected and, consequently, more vulnerable to cyber threats. In this episode of Supply Chain Now, sponsored by Microsoft, hosts Scott Luton and Kevin L. Jackson highlight the dangers of cybersecurity threats and provide crucial insights into how leading organizations are navigating this perilous landscape with the help of special guest Jose Razo, Senior Technical Specialist with Microsoft.

Listen in as Scott, Kevin, and Jose share a detailed overview of the current cyber threat landscape, highlighting the increase in cyber attacks since the pandemic, and the significant costs associated with the breaches.

Learn more about the various types of cyber threats, critical infrastructure and its importance and inherent vulnerabilities, practical advice for businesses to strengthen their cybersecurity posture, and finally, Jose's four-step framework for protecting against cybersecurity risks.

Don't miss this episode, and begin engaging in proactive cybersecurity conversations, and stay informed! Because as Kevin says, it's not if you're attacked, or even when you're attacked, but how you respond to the attacks.

Additional Links & Resources:

Learn more at microsoft.com/security and microsoft.com/energy

Learn more about Supply Chain Now: https://supplychainnow.com

Subscribe to Supply Chain Now: https://supplychainnow.com/join

Check out Supply Chain Now’s NEW Media Kit: https://bit.ly/3XH6OVk

Check out Digital Transformers: https://supplychainnow.com/program/digital-transformers

WEBINAR- Automation ROI: Solving the Top 3 Operational Challenges: https://bit.ly/3VvxTvs

WEBINAR- Strategies for Aligning Business Planning with Supply Chain Design: https://bit.ly/3XvRHk7

This episode is hosted by Scott Luton and Kevin L. Jackson. For additional information, please visit our dedicated show page at: https://supplychainnow.com/4-step-guide-cyber-threats-critical-infrastructure-microsoft-1290

  continue reading

450 episoder

Artwork
iconDel
 
Manage episode 425259447 series 2824527
Innhold levert av Supply Chain Now. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Supply Chain Now eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In today's digital age, the threat of cyber attacks looms large over individuals, businesses, and critical infrastructure. The rapid advancement of technology has made our systems more interconnected and, consequently, more vulnerable to cyber threats. In this episode of Supply Chain Now, sponsored by Microsoft, hosts Scott Luton and Kevin L. Jackson highlight the dangers of cybersecurity threats and provide crucial insights into how leading organizations are navigating this perilous landscape with the help of special guest Jose Razo, Senior Technical Specialist with Microsoft.

Listen in as Scott, Kevin, and Jose share a detailed overview of the current cyber threat landscape, highlighting the increase in cyber attacks since the pandemic, and the significant costs associated with the breaches.

Learn more about the various types of cyber threats, critical infrastructure and its importance and inherent vulnerabilities, practical advice for businesses to strengthen their cybersecurity posture, and finally, Jose's four-step framework for protecting against cybersecurity risks.

Don't miss this episode, and begin engaging in proactive cybersecurity conversations, and stay informed! Because as Kevin says, it's not if you're attacked, or even when you're attacked, but how you respond to the attacks.

Additional Links & Resources:

Learn more at microsoft.com/security and microsoft.com/energy

Learn more about Supply Chain Now: https://supplychainnow.com

Subscribe to Supply Chain Now: https://supplychainnow.com/join

Check out Supply Chain Now’s NEW Media Kit: https://bit.ly/3XH6OVk

Check out Digital Transformers: https://supplychainnow.com/program/digital-transformers

WEBINAR- Automation ROI: Solving the Top 3 Operational Challenges: https://bit.ly/3VvxTvs

WEBINAR- Strategies for Aligning Business Planning with Supply Chain Design: https://bit.ly/3XvRHk7

This episode is hosted by Scott Luton and Kevin L. Jackson. For additional information, please visit our dedicated show page at: https://supplychainnow.com/4-step-guide-cyber-threats-critical-infrastructure-microsoft-1290

  continue reading

450 episoder

همه قسمت ها

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett