BlogVulnerability Assessment for an Operational Technology Environment (High Level)by CybersecurityOT Team