Artwork

内容由Supply Chain Now提供。所有播客内容(包括剧集、图形和播客描述)均由 Supply Chain Now 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

4-Step Guide to Thwarting Cyber Threats in Critical Infrastructure featuring Jose Razo with Microsoft

29:11
 
分享
 

Manage episode 425258261 series 1532844
内容由Supply Chain Now提供。所有播客内容(包括剧集、图形和播客描述)均由 Supply Chain Now 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

In today's digital age, the threat of cyber attacks looms large over individuals, businesses, and critical infrastructure. The rapid advancement of technology has made our systems more interconnected and, consequently, more vulnerable to cyber threats. In this episode of Supply Chain Now, sponsored by Microsoft, hosts Scott Luton and Kevin L. Jackson highlight the dangers of cybersecurity threats and provide crucial insights into how leading organizations are navigating this perilous landscape with the help of special guest Jose Razo, Senior Technical Specialist with Microsoft.

Listen in as Scott, Kevin, and Jose share a detailed overview of the current cyber threat landscape, highlighting the increase in cyber attacks since the pandemic, and the significant costs associated with the breaches.

Learn more about the various types of cyber threats, critical infrastructure and its importance and inherent vulnerabilities, practical advice for businesses to strengthen their cybersecurity posture, and finally, Jose's four-step framework for protecting against cybersecurity risks.

Don't miss this episode, and begin engaging in proactive cybersecurity conversations, and stay informed! Because as Kevin says, it's not if you're attacked, or even when you're attacked, but how you respond to the attacks.

Additional Links & Resources:

Learn more at microsoft.com/security and microsoft.com/energy

Learn more about Supply Chain Now: https://supplychainnow.com

Subscribe to Supply Chain Now: https://supplychainnow.com/join

Check out Supply Chain Now’s NEW Media Kit: https://bit.ly/3XH6OVk

Check out Digital Transformers: https://supplychainnow.com/program/digital-transformers

WEBINAR- Automation ROI: Solving the Top 3 Operational Challenges: https://bit.ly/3VvxTvs

WEBINAR- Strategies for Aligning Business Planning with Supply Chain Design: https://bit.ly/3XvRHk7

This episode is hosted by Scott Luton and Kevin L. Jackson. For additional information, please visit our dedicated show page at: https://supplychainnow.com/4-step-guide-cyber-threats-critical-infrastructure-microsoft-1290

  continue reading

569集单集

Artwork
icon分享
 
Manage episode 425258261 series 1532844
内容由Supply Chain Now提供。所有播客内容(包括剧集、图形和播客描述)均由 Supply Chain Now 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

In today's digital age, the threat of cyber attacks looms large over individuals, businesses, and critical infrastructure. The rapid advancement of technology has made our systems more interconnected and, consequently, more vulnerable to cyber threats. In this episode of Supply Chain Now, sponsored by Microsoft, hosts Scott Luton and Kevin L. Jackson highlight the dangers of cybersecurity threats and provide crucial insights into how leading organizations are navigating this perilous landscape with the help of special guest Jose Razo, Senior Technical Specialist with Microsoft.

Listen in as Scott, Kevin, and Jose share a detailed overview of the current cyber threat landscape, highlighting the increase in cyber attacks since the pandemic, and the significant costs associated with the breaches.

Learn more about the various types of cyber threats, critical infrastructure and its importance and inherent vulnerabilities, practical advice for businesses to strengthen their cybersecurity posture, and finally, Jose's four-step framework for protecting against cybersecurity risks.

Don't miss this episode, and begin engaging in proactive cybersecurity conversations, and stay informed! Because as Kevin says, it's not if you're attacked, or even when you're attacked, but how you respond to the attacks.

Additional Links & Resources:

Learn more at microsoft.com/security and microsoft.com/energy

Learn more about Supply Chain Now: https://supplychainnow.com

Subscribe to Supply Chain Now: https://supplychainnow.com/join

Check out Supply Chain Now’s NEW Media Kit: https://bit.ly/3XH6OVk

Check out Digital Transformers: https://supplychainnow.com/program/digital-transformers

WEBINAR- Automation ROI: Solving the Top 3 Operational Challenges: https://bit.ly/3VvxTvs

WEBINAR- Strategies for Aligning Business Planning with Supply Chain Design: https://bit.ly/3XvRHk7

This episode is hosted by Scott Luton and Kevin L. Jackson. For additional information, please visit our dedicated show page at: https://supplychainnow.com/4-step-guide-cyber-threats-critical-infrastructure-microsoft-1290

  continue reading

569集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南