In this episode of The Keys 2 Your Digital Kingdom, we dive deeper into advanced machine identity management with Jens Sabitzer from Venafi, a CyberArk company. Jens shares insights on critical topics like preparing for post-quantum cryptography, managing short-lived certificates, and implementing modern PKI solutions tailored for DevOps environments. We also explore key regulatory requirements, including NIS-2, DORA, and the European Machinery Directive, and how they’re shaping cybersecurity practices across Europe. Finally, we discuss the role of automation in achieving agile, secure, and compliant identity management. Join us for an in-depth conversation on future-proofing machine identities in an evolving digital landscape.
In this episode of The Keys 2 Your Digital Kingdom, we dive into the acquisition of Venafi by CyberArk and what it means for the future of machine identity management. Our guest, Stefan Bartels, Sales Representative for DACH at Venafi, a CyberArk company, joins us to explain the basics of machine identities, why they matter, and the best practices for managing them securely. We explore how the integration of Venafi’s expertise into CyberArk’s platform strengthens security around machine identities and discuss the practical steps companies can take to protect their digital assets in a rapidly evolving landscape. Tune in for an in-depth conversation on machine identities and what this acquisition means for the cybersecurity industry.
In this episode of The Keys 2 Your Digital Kingdom, we take a different look at the cybersecurity landscape, focusing on the most crucial element—people. While many believe the right technology is the key to security, we ask the essential question: who will configure, manage, and run those tools? Joining us is Victor Sell, a seasoned cybersecurity recruiting expert, to discuss the industry's growing skills and resource gap. Together, we explore the challenges of finding skilled talent, why human expertise remains indispensable, and how the cybersecurity community can address these pressing issues. Tune in to learn how we can empower the people behind the technology.
In this episode of The Keys 2 Your Digital Kingdom, we delve into the transformative impact of AI on Identity and Access Management (IAM). Our guest, Shaked Reiner from CyberArk Labs, an expert in AI security, discusses how AI is revolutionizing access decisions, automating identity management, and the significant risks these advancements pose. From enhancing efficiency in overloaded IT teams to the potential dangers of AI-driven decision-making, we explore both the promise and the peril of integrating AI into IAM systems. Tune in to learn how to navigate this new landscape while safeguarding your digital kingdom.
In Episode 8 of our Keys 2 Your Digital Kingdom, we dive into the application of least privilege principles in OT (Operational Technology) environments. Our special guest, Christian Götz, Director of Presales Success at CyberArk, shares his expertise on how foundational IT security principles can be effectively implemented in the OT realm.
Discover the critical importance of least privilege in protecting OT systems from cyber threats and minimizing the risk of unauthorized access. Christian explains the unique challenges of applying IT security practices to OT and provides practical strategies for overcoming these hurdles.
Tune in to learn how to enhance your OT security posture by adopting least privilege principles, ensuring that your operational infrastructure remains secure and resilient.
In the concluding episode of our OT mini-series on Keys 2 Your Digital Kingdom, we explore the critical interplay between privacy, security, and OT (Operational Technology). Join us one last time with Kevin Kumpf, OT Strategist at Cyolo, as we delve into the essential role of data protection in OT environments.
Discover how privacy and security challenges uniquely impact OT systems and the broader implications for industries reliant on these technologies. Kevin shares expert insights into safeguarding sensitive data within OT infrastructures and discusses strategies for enhancing overall security and compliance.
In this episode of Keys 2 Your Digital Kingdom, we continue our exploration of OT security by focusing on the energy sector. Join us as we welcome back Kevin Kumpf, OT Strategist at Cyolo, to discuss the crucial role of OT in protecting our energy infrastructure.
Discover how Operational Technology (OT) systems are essential for managing and securing energy production and distribution. Kevin shares insights into the unique cybersecurity challenges faced by the energy sector and explains how securing OT environments is vital to prevent disruptions and ensure reliable energy supply.
Tune in to learn about the latest strategies and technologies for enhancing OT security in the energy industry, and understand the critical importance of protecting our energy infrastructure from cyber threats.
Join us for the next episode of our OT mini-series on The Keys 2 Your Digital Kingdom, where we delve deep into the world of OT security and its impact on travel, logistics, and supply chains. In this episode, we welcome back Kevin Kumpf, OT Strategist at Cyolo, to explore the critical importance of securing OT systems in these industries.
Discover the intricate web of OT security challenges faced by organizations in travel, logistics, and supply chain management, and learn how vulnerabilities in OT environments can disrupt operations and threaten business continuity. Kevin shares invaluable insights into effective strategies for mitigating risks and fortifying OT infrastructure against cyber threats.
Tune in to gain a comprehensive understanding of the role of OT security in safeguarding the backbone of travel, logistics, and supply chains, and learn actionable steps to protect your organization's critical assets.
In this episode of Keys 2 Your Digital Kingdom, we delve into the critical intersection of cybersecurity and machinery safety in industrial settings. Join us as we welcome back Kevin Kumpf, Chief OT Strategist at Cyolo, to explore the challenges and implications of securing industrial assets.
Discover how cyber threats are converging with machinery safety concerns, posing significant risks to industrial operations. Kevin shares insights into the evolving threat landscape facing industrial assets and discusses strategies for safeguarding machinery against cyber attacks.
Tune in to gain a deeper understanding of the importance of securing industrial assets and learn actionable steps to protect your organization's machinery and ensure operational resilience.
In Episode 3 of our Keys 2 Your Digital Kingdom, we shift our focus to the critical importance of securing OT (Operational Technology) environments in cybersecurity. Join us as we welcome Kevin Kumpf, OT Strategist at Cyolo, to explore why securing OT systems is crucial in today's digital landscape.
Discover the unique challenges and risks associated with OT security and learn why bridging the gap between IT and OT is essential for comprehensive cybersecurity. Kevin shares insights on navigating the complexities of securing OT environments, highlighting strategies for mitigating threats and enhancing resilience.
Tune in to learn why securing your OT environment is more important than ever, and gain valuable insights from Cyolo's OT Strategist on how to protect your digital kingdom effectively.
Are your identity assessments thorough enough? Join the experts at Infosec K2K as we discuss steps to carrying out identity assessments that truly leave no stone unturned. Learn the essential techniques to ensure comprehensive evaluations, giving you peace of mind that your security measures are airtight.
In the inaugural episode of "The Keys 2 Your Digital Kingdom," hosts Stephan Zimmermann and Philippe Palm explore the realm of Managed Security Services (MSS). They dissect the evolving threat landscape and the proactive measures required to fortify against cyber adversaries.
The hosts discuss the benefits and challenges of MSS, shedding light on how it enhances security, streamlines operations, and defends against emerging threats. Practical considerations for selecting an MSS provider are outlined, emphasizing features, customization, and alignment with organizational needs.
Join Episode 1 for a captivating exploration of considerations around Managed Security Services—essential for securing your digital kingdom.