Look for any podcast host, guest or anyone
Showing episodes and shows of

Infosec K2K Ltd.

Shows

The Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 13: "Mastering Privileged Access Management Strategies"In this episode of The Keys 2 Your Digital Kingdom, we’re joined by Aamir Khan, a seasoned consultant in the PAM field with vast experience in implementing and optimizing Privileged Access Management solutions. Together, we dive into the essential strategies for building a robust PAM framework.From foundational principles like the least privilege approach to advanced techniques such as Just-In-Time access and Zero Trust integration, we cover the tools and practices organizations need to secure their privileged accounts. Aamir shares insights on centralizing privileged account management, enforcing multi-factor authentication, and automating tasks like password rotation.We...2025-01-2829 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 12: "Future-Proofing Security: Post-Quantum, Short-Lived Certificates, and Modern PKI"In this episode of The Keys 2 Your Digital Kingdom, we dive deeper into advanced machine identity management with Jens Sabitzer from Venafi, a CyberArk company. Jens shares insights on critical topics like preparing for post-quantum cryptography, managing short-lived certificates, and implementing modern PKI solutions tailored for DevOps environments. We also explore key regulatory requirements, including NIS-2, DORA, and the European Machinery Directive, and how they’re shaping cybersecurity practices across Europe. Finally, we discuss the role of automation in achieving agile, secure, and compliant identity management. Join us for an in-depth conversation on future-proofing machine identities in an evolving di...2024-11-2623 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 11: “CyberArk & Venafi: Navigating Machine Identities in a New Era of Security”In this episode of The Keys 2 Your Digital Kingdom, we dive into the acquisition of Venafi by CyberArk and what it means for the future of machine identity management. Our guest, Stefan Bartels, Sales Representative for DACH at Venafi, a CyberArk company, joins us to explain the basics of machine identities, why they matter, and the best practices for managing them securely. We explore how the integration of Venafi’s expertise into CyberArk’s platform strengthens security around machine identities and discuss the practical steps companies can take to protect their digital assets in a rapidly evolving landscape. Tune in f...2024-10-2921 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 10: "Access Granted: Unlocking Cyber Recruiting Secrets"In this episode of The Keys 2 Your Digital Kingdom, we take a different look at the cybersecurity landscape, focusing on the most crucial element—people. While many believe the right technology is the key to security, we ask the essential question: who will configure, manage, and run those tools? Joining us is Victor Sell, a seasoned cybersecurity recruiting expert, to discuss the industry's growing skills and resource gap. Together, we explore the challenges of finding skilled talent, why human expertise remains indispensable, and how the cybersecurity community can address these pressing issues. Tune in to learn how we can em...2024-10-0232 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 9: "AI in Identity Management: Empowering Access Decisions and Unveiling New Risks"In this episode of The Keys 2 Your Digital Kingdom, we delve into the transformative impact of AI on Identity and Access Management (IAM). Our guest, Shaked Reiner from CyberArk Labs, an expert in AI security, discusses how AI is revolutionizing access decisions, automating identity management, and the significant risks these advancements pose. From enhancing efficiency in overloaded IT teams to the potential dangers of AI-driven decision-making, we explore both the promise and the peril of integrating AI into IAM systems. Tune in to learn how to navigate this new landscape while safeguarding your digital kingdom.2024-08-2720 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 8: "Least Privilege in OT: How do IT principles apply to the OT world"In Episode 8 of our Keys 2 Your Digital Kingdom, we dive into the application of least privilege principles in OT (Operational Technology) environments. Our special guest, Christian Götz, Director of Presales Success at CyberArk, shares his expertise on how foundational IT security principles can be effectively implemented in the OT realm.Discover the critical importance of least privilege in protecting OT systems from cyber threats and minimizing the risk of unauthorized access. Christian explains the unique challenges of applying IT security practices to OT and provides practical strategies for overcoming these hurdles.Tune in to l...2024-07-3022 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 7: "Guardians of Data: How Privacy and Security Affect OT"In the concluding episode of our OT mini-series on Keys 2 Your Digital Kingdom, we explore the critical interplay between privacy, security, and OT (Operational Technology). Join us one last time with Kevin Kumpf, OT Strategist at Cyolo, as we delve into the essential role of data protection in OT environments.Discover how privacy and security challenges uniquely impact OT systems and the broader implications for industries reliant on these technologies. Kevin shares expert insights into safeguarding sensitive data within OT infrastructures and discusses strategies for enhancing overall security and compliance.2024-06-2514 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 6: "Powering Up Security: How OT Protects Our Energy"In this episode of Keys 2 Your Digital Kingdom, we continue our exploration of OT security by focusing on the energy sector. Join us as we welcome back Kevin Kumpf, OT Strategist at Cyolo, to discuss the crucial role of OT in protecting our energy infrastructure.Discover how Operational Technology (OT) systems are essential for managing and securing energy production and distribution. Kevin shares insights into the unique cybersecurity challenges faced by the energy sector and explains how securing OT environments is vital to prevent disruptions and ensure reliable energy supply.Tune in to learn about...2024-05-2823 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 5: "OT in Action: Impact on Travel, Logistics, and Supply Chains"Join us for the next episode of our OT mini-series on The Keys 2 Your Digital Kingdom, where we delve deep into the world of OT security and its impact on travel, logistics, and supply chains. In this episode, we welcome back Kevin Kumpf, OT Strategist at Cyolo, to explore the critical importance of securing OT systems in these industries.Discover the intricate web of OT security challenges faced by organizations in travel, logistics, and supply chain management, and learn how vulnerabilities in OT environments can disrupt operations and threaten business continuity. Kevin shares invaluable insights into effective...2024-04-3027 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 4: "Securing Industrial Assets: The Convergence of Cyber Threats and Machinery Safety"In this episode of Keys 2 Your Digital Kingdom, we delve into the critical intersection of cybersecurity and machinery safety in industrial settings. Join us as we welcome back Kevin Kumpf, Chief OT Strategist at Cyolo, to explore the challenges and implications of securing industrial assets.Discover how cyber threats are converging with machinery safety concerns, posing significant risks to industrial operations. Kevin shares insights into the evolving threat landscape facing industrial assets and discusses strategies for safeguarding machinery against cyber attacks.Tune in to gain a deeper understanding of the importance of securing industrial assets...2024-03-2620 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 3: "Connecting IT and OT: Navigating the Digital Divide"In Episode 3 of our Keys 2 Your Digital Kingdom, we shift our focus to the critical importance of securing OT (Operational Technology) environments in cybersecurity. Join us as we welcome Kevin Kumpf, OT Strategist at Cyolo, to explore why securing OT systems is crucial in today's digital landscape.Discover the unique challenges and risks associated with OT security and learn why bridging the gap between IT and OT is essential for comprehensive cybersecurity. Kevin shares insights on navigating the complexities of securing OT environments, highlighting strategies for mitigating threats and enhancing resilience.Tune in to learn...2024-03-0124 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 2: "You missed a bit! - How to ensure your Identity Assessments leave no stone unturned"Are your identity assessments thorough enough? Join the experts at Infosec K2K as we discuss steps to carrying out identity assessments that truly leave no stone unturned. Learn the essential techniques to ensure comprehensive evaluations, giving you peace of mind that your security measures are airtight.2024-01-2915 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 1: "Outsourcing Your Cyber Security: Are Managed Services Right For You?"In the inaugural episode of "The Keys 2 Your Digital Kingdom," hosts Stephan Zimmermann and Philippe Palm explore the realm of Managed Security Services (MSS). They dissect the evolving threat landscape and the proactive measures required to fortify against cyber adversaries.The hosts discuss the benefits and challenges of MSS, shedding light on how it enhances security, streamlines operations, and defends against emerging threats. Practical considerations for selecting an MSS provider are outlined, emphasizing features, customization, and alignment with organizational needs.Join Episode 1 for a captivating exploration of considerations around Managed Security Services—essential for securing yo...2023-12-2722 min