エピソード

  • The Keys 2 Your Digital Kingdom - Episode 13: "Mastering Privileged Access Management Strategies"
    2025/01/28

    In this episode of The Keys 2 Your Digital Kingdom, we’re joined by Aamir Khan, a seasoned consultant in the PAM field with vast experience in implementing and optimizing Privileged Access Management solutions. Together, we dive into the essential strategies for building a robust PAM framework.

    From foundational principles like the least privilege approach to advanced techniques such as Just-In-Time access and Zero Trust integration, we cover the tools and practices organizations need to secure their privileged accounts. Aamir shares insights on centralizing privileged account management, enforcing multi-factor authentication, and automating tasks like password rotation.

    We also discuss monitoring privileged activities, maintaining audit trails, and integrating PAM with broader security systems like SIEM. Aamir provides expert perspectives on leveraging AI for behavioral analytics and highlights the importance of user training in defending against targeted attacks.

    Tune in to learn from Aamir’s wealth of experience and discover how to secure critical assets, manage risks, and stay ahead in the evolving cybersecurity landscape.

    続きを読む 一部表示
    30 分
  • The Keys 2 Your Digital Kingdom - Episode 12: "Future-Proofing Security: Post-Quantum, Short-Lived Certificates, and Modern PKI"
    2024/11/26

    In this episode of The Keys 2 Your Digital Kingdom, we dive deeper into advanced machine identity management with Jens Sabitzer from Venafi, a CyberArk company. Jens shares insights on critical topics like preparing for post-quantum cryptography, managing short-lived certificates, and implementing modern PKI solutions tailored for DevOps environments. We also explore key regulatory requirements, including NIS-2, DORA, and the European Machinery Directive, and how they’re shaping cybersecurity practices across Europe. Finally, we discuss the role of automation in achieving agile, secure, and compliant identity management. Join us for an in-depth conversation on future-proofing machine identities in an evolving digital landscape.

    続きを読む 一部表示
    23 分
  • The Keys 2 Your Digital Kingdom - Episode 11: “CyberArk & Venafi: Navigating Machine Identities in a New Era of Security”
    2024/10/29

    In this episode of The Keys 2 Your Digital Kingdom, we dive into the acquisition of Venafi by CyberArk and what it means for the future of machine identity management. Our guest, Stefan Bartels, Sales Representative for DACH at Venafi, a CyberArk company, joins us to explain the basics of machine identities, why they matter, and the best practices for managing them securely. We explore how the integration of Venafi’s expertise into CyberArk’s platform strengthens security around machine identities and discuss the practical steps companies can take to protect their digital assets in a rapidly evolving landscape. Tune in for an in-depth conversation on machine identities and what this acquisition means for the cybersecurity industry.

    続きを読む 一部表示
    21 分
  • The Keys 2 Your Digital Kingdom - Episode 10: "Access Granted: Unlocking Cyber Recruiting Secrets"
    2024/10/02

    In this episode of The Keys 2 Your Digital Kingdom, we take a different look at the cybersecurity landscape, focusing on the most crucial element—people. While many believe the right technology is the key to security, we ask the essential question: who will configure, manage, and run those tools? Joining us is Victor Sell, a seasoned cybersecurity recruiting expert, to discuss the industry's growing skills and resource gap. Together, we explore the challenges of finding skilled talent, why human expertise remains indispensable, and how the cybersecurity community can address these pressing issues. Tune in to learn how we can empower the people behind the technology.

    続きを読む 一部表示
    33 分
  • The Keys 2 Your Digital Kingdom - Episode 9: "AI in Identity Management: Empowering Access Decisions and Unveiling New Risks"
    2024/08/27

    In this episode of The Keys 2 Your Digital Kingdom, we delve into the transformative impact of AI on Identity and Access Management (IAM). Our guest, Shaked Reiner from CyberArk Labs, an expert in AI security, discusses how AI is revolutionizing access decisions, automating identity management, and the significant risks these advancements pose. From enhancing efficiency in overloaded IT teams to the potential dangers of AI-driven decision-making, we explore both the promise and the peril of integrating AI into IAM systems. Tune in to learn how to navigate this new landscape while safeguarding your digital kingdom.

    続きを読む 一部表示
    20 分
  • The Keys 2 Your Digital Kingdom - Episode 8: "Least Privilege in OT: How do IT principles apply to the OT world"
    2024/07/30

    In Episode 8 of our Keys 2 Your Digital Kingdom, we dive into the application of least privilege principles in OT (Operational Technology) environments. Our special guest, Christian Götz, Director of Presales Success at CyberArk, shares his expertise on how foundational IT security principles can be effectively implemented in the OT realm.

    Discover the critical importance of least privilege in protecting OT systems from cyber threats and minimizing the risk of unauthorized access. Christian explains the unique challenges of applying IT security practices to OT and provides practical strategies for overcoming these hurdles.

    Tune in to learn how to enhance your OT security posture by adopting least privilege principles, ensuring that your operational infrastructure remains secure and resilient.

    続きを読む 一部表示
    23 分
  • The Keys 2 Your Digital Kingdom - Episode 7: "Guardians of Data: How Privacy and Security Affect OT"
    2024/06/25

    In the concluding episode of our OT mini-series on Keys 2 Your Digital Kingdom, we explore the critical interplay between privacy, security, and OT (Operational Technology). Join us one last time with Kevin Kumpf, OT Strategist at Cyolo, as we delve into the essential role of data protection in OT environments.

    Discover how privacy and security challenges uniquely impact OT systems and the broader implications for industries reliant on these technologies. Kevin shares expert insights into safeguarding sensitive data within OT infrastructures and discusses strategies for enhancing overall security and compliance.

    続きを読む 一部表示
    15 分
  • The Keys 2 Your Digital Kingdom - Episode 6: "Powering Up Security: How OT Protects Our Energy"
    2024/05/28

    In this episode of Keys 2 Your Digital Kingdom, we continue our exploration of OT security by focusing on the energy sector. Join us as we welcome back Kevin Kumpf, OT Strategist at Cyolo, to discuss the crucial role of OT in protecting our energy infrastructure.

    Discover how Operational Technology (OT) systems are essential for managing and securing energy production and distribution. Kevin shares insights into the unique cybersecurity challenges faced by the energy sector and explains how securing OT environments is vital to prevent disruptions and ensure reliable energy supply.

    Tune in to learn about the latest strategies and technologies for enhancing OT security in the energy industry, and understand the critical importance of protecting our energy infrastructure from cyber threats.

    続きを読む 一部表示
    24 分