{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiglicnfeboqhyiu4k6mcq6wdokbgeh7vk7ua663vp3z7prelcyuzy",
    "uri": "at://did:plc:klkgxrhct7epqznuvf6tawoy/app.bsky.feed.post/3mfqmfujc6mt2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiftbjcrbzs3j7hcxiq7eghgjiftloqmkjsz5jxgkkhakkooslmoti"
    },
    "mimeType": "image/jpeg",
    "size": 95112
  },
  "path": "/commentary/2026/02/five-stages-to-secure-military-operational-technology-using-zero-trust-and-risk-operations-centers/",
  "publishedAt": "2026-02-25T20:02:03.000Z",
  "site": "https://federalnewsnetwork.com",
  "tags": [
    "Commentary",
    "Cybersecurity",
    "Defense",
    "Defense Industry",
    "IT Modernization",
    "Technology",
    "Agentic AI",
    "Billington Cybersecurity Summit",
    "Defense Department",
    "Jonathan Trull",
    "operational technology",
    "Qualys",
    "zero trust"
  ],
  "textContent": "As adversaries continue targeting critical U.S. infrastructure, DoD officials must continue to drive a proactive approach to zero trust and OT security.",
  "title": "Five stages to secure military operational technology using zero trust and risk operations centers"
}