{"version":"1.0","provider_name":"ICsec","provider_url":"https:\/\/icsec.pl\/en\/","author_name":"Karolina","author_url":"https:\/\/icsec.pl\/en\/author\/karolina\/","title":"IT departments' approach to cyber protection of OT networks - ICsec","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NxEfREYfps\"><a href=\"https:\/\/icsec.pl\/en\/podejscie-dzialow-it-do-cyberochrony-sieci-ot\/\">IT departments&#8217; approach to cyber protection of OT networks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/icsec.pl\/en\/podejscie-dzialow-it-do-cyberochrony-sieci-ot\/embed\/#?secret=NxEfREYfps\" width=\"600\" height=\"338\" title=\"&#8220;IT departments&#8217; approach to cyber protection of OT networks&#8221; &#8212; ICsec\" data-secret=\"NxEfREYfps\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/icsec.pl\/content\/uploads\/2021\/08\/MicrosoftTeams-image-7.jpg","thumbnail_width":610,"thumbnail_height":343,"description":"In principle, much can be said about cyber security, but one thing cannot be predicted: whether it will ever be fully and forever guaranteed in our infrastructure. In this peculiar arms race against various cyber threats and the consequences of potential attacks, the most important aspect is a thorough risk analysis and an optimal selection [&hellip;]"}