Azure Defender for IoT: Defending IT and OT for DoD and Defense Industrial Base from CMMC to JADC2

%3CLINGO-SUB%20id%3D%22lingo-sub-2369977%22%20slang%3D%22en-US%22%3EAzure%20Defender%20for%20IoT%3A%20Defending%20IT%20and%20OT%20for%20DoD%20and%20Defense%20Industrial%20Base%20from%20CMMC%20to%20JADC2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2369977%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1621457574693.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F281938iF7BFC09F6E757A9A%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1621457574693.png%22%20alt%3D%22JasonCohen1892_0-1621457574693.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZgyIpL3Lug8%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E(10)%20Azure%20Defender%20for%20IoT%3A%20Defending%26nbsp%3BIT%20and%20OT%26nbsp%3Bfor%20DoD%20and%20Defense%20Industrial%20Base%20from%20CMMC%20to%20JADC2%20-%20YouTube%3C%2FA%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22meta%22%20class%3D%22style-scope%20ytd-watch-flexy%22%3E%0A%3CDIV%20id%3D%22meta-contents%22%20class%3D%22style-scope%20ytd-watch-flexy%22%3E%0A%3CDIV%20id%3D%22container%22%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%0A%3CDIV%20id%3D%22content%22%20class%3D%22style-scope%20ytd-expander%22%3E%0A%3CDIV%20id%3D%22description%22%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EMay%2013%2C%202021%2C%2011%3A00%20AM%20ET%20%2F%208%3A00%20AM%20PT%20(webinar%20recording%20date)%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EPresenter(s)%3A%20Joe%20DiPietro%2C%20Chris%20Cleary%2C%20Josh%20O'Sullivan.%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3E%20Please%20join%20Microsoft%2C%20Ardalyst%2C%20and%20featured%20defense%20expert%20where%20we%20will%E2%80%AFdiscuss%20the%20critical%20components%20of%20a%20mature%20cyber%20defense%20program%20from%20the%20cradle%20to%20the%20grave%20of%20DoD%E2%80%AFsystems.%E2%80%AFAs%20most%20DoD%20warfighting%20capabilities%20are%20born%20and%20die%20in%20the%20DIB%2C%20we%20will%20explore%20the%E2%80%AFcurrent%20art%20and%20science%20of%20IT%E2%80%AFand%E2%80%AFOT%20cyber%20defense%E2%80%AFand%20its%20implications%E2%80%AFfrom%20a%E2%80%AFfull%20lifecycle%E2%80%AFperspective%E2%80%AFthrough%20a%20combined%20government%20and%20industry%20panel.%E2%80%AF%20%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EDefending%E2%80%AFcommercial%20industry%20and%E2%80%AFDefense%20Industrial%20Base%E2%80%AF(DIB)%E2%80%AFfrom%20an%E2%80%AFInformation%E2%80%AFand%E2%80%AFOperational%20Technologies%20(IT%20and%20OT)%E2%80%AFperspectives%E2%80%AFunderpins%E2%80%AFthe%E2%80%AFchallenges%20we%20have%20in%20a%E2%80%AFJoint%20fight.%E2%80%AFAs%20the%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20comes%20online%2C%20it%20parallels%20the%20need%20for%20the%20DoD%20to%E2%80%AFmature%E2%80%AFinternal%20cyber%20defense%20requirements%E2%80%AFand%20the%20resilient%20supply%20chain%20necessary%20to%20support%20it.%E2%80%AF%E2%80%AF%20%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EDuring%20the%20webinar%2C%20we%20will%20help%20you%20better%20understand%3A%20%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CUL%3E%0A%3CLI%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EWhy%20can%E2%80%99t%20we%20fix%20the%20vulnerabilities%20in%20technologies%2C%20specifically%20OT%3F%E2%80%AF%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3E%20What%20is%20the%20best%20way%20to%20effectively%20sensor%20a%20system%3F%E2%80%AF%20%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EHow%20do%20we%20leverage%20threat%20intelligence%20to%20understand%20and%20adapt%20against%20adversaries%3F%E2%80%AF%20%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EHow%20can%20OT%20sensors%20deter%20adversaries%3F%E2%80%AF%20%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20class%3D%22style-scope%20ytd-video-secondary-info-renderer%22%3E%3CSPAN%20class%3D%22style-scope%20yt-formatted-string%22%3EWhat%20is%20the%20right%E2%80%AFworkforce%E2%80%AFto%20deter%2C%20detect%2C%20and%20engage%20adversaries%3F%E2%80%AF%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3CDIV%20id%3D%22ticket-shelf%22%20class%3D%22style-scope%20ytd-watch-flexy%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20id%3D%22merch-shelf%22%20class%3D%22style-scope%20ytd-watch-flexy%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20id%3D%22header%22%20class%3D%22style-scope%20ytd-item-section-renderer%22%3E%0A%3CDIV%20id%3D%22title%22%20class%3D%22style-scope%20ytd-comments-header-renderer%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2369977%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1621457574693.png

(10) Azure Defender for IoT: Defending IT and OT for DoD and Defense Industrial Base from CMMC to JA...

 
Presenter(s): Joe DiPietro, Chris Cleary, Josh O'Sullivan.
 
Please join Microsoft, Ardalyst, and featured defense expert where we will discuss the critical components of a mature cyber defense program from the cradle to the grave of DoD systems. As most DoD warfighting capabilities are born and die in the DIB, we will explore the current art and science of IT and OT cyber defense and its implications from a full lifecycle perspective through a combined government and industry panel. 
 
Defending commercial industry and Defense Industrial Base (DIB) from an Information and Operational Technologies (IT and OT) perspectives underpins the challenges we have in a Joint fight. As the Cybersecurity Maturity Model Certification (CMMC) comes online, it parallels the need for the DoD to mature internal cyber defense requirements and the resilient supply chain necessary to support it.  
 
During the webinar, we will help you better understand:
  • Why can’t we fix the vulnerabilities in technologies, specifically OT? 
  • What is the best way to effectively sensor a system? 
  • How do we leverage threat intelligence to understand and adapt against adversaries? 
  • How can OT sensors deter adversaries? 
  • What is the right workforce to deter, detect, and engage adversaries?  
 
 
0 Replies