

Security Matters
CyberArk
Security Matters is your go-to podcast for cutting-edge insights on navigating today’s rapidly evolving digital threat landscape. Featuring expert insights from frontline practitioners, each episode gives you a deep dive into today’s most critical issues, from securing identities to protecting hybrid, multi-cloud and emerging environments to staying ahead of new attack methods and beyond. Because in this increasingly complex world, how you approach security matters.
Episodes
Mentioned books

Mar 21, 2024 • 34min
EP 48 - What's Driving the Future of Automotive Security
In this episode of the Trust Issues podcast, Kaivan Karimi, Global Partner Strategy and OT Cybersecurity Lead – Automotive Mobility and Transportation at Microsoft, discusses with host David Puner the complexities of the automotive cybersecurity ecosystem, and they explore the challenges and considerations facing the industry. Karimi shares his insights on the role of identity security in automotive cybersecurity and how it helps ensure that only authenticated entities have the privilege to engage in the high-speed exchange of information. He also talks about the importance of data sovereignty, data privacy and compliance in the automotive industry. This episode provides a fascinating look into the present and future world of automotive cybersecurity and the measures being taken to protect against cyber threats. Take the audio ride!

9 snips
Mar 5, 2024 • 38min
EP 47 - Digital Trust and the Identity Cornerstone
Global Digital Identity Leader at Deloitte Belgium, Jan Vanhaecht, discusses digital trust and risk management with host David Puner. Topics range from the impact of regulations on cybersecurity to the role of identity in security culture. They explore passwordless authentication and Zero Trust principles in safeguarding digital landscapes.

Feb 15, 2024 • 32min
EP 46 - Behind the Data Breach: Dissecting Cozy Bear's Microsoft Attack
Andy Thompson, CyberArk Labs Offensive Security Research Evangelist returns to Trust Issues for a deep dive into the recent APT29 breach of Microsoft. In conversation with host David Puner, Thompson explores the intricate details of the January 2024 attack, dissecting the tactics employed by the APT29 threat actor, also known as Cozy Bear, Cozy Car, The Dukes – or, as Microsoft refers to the group: Midnight Blizzard. From the initial password spray technique to the exploitation of OAuth applications, listeners are taken on a journey through the breach's timeline – and learn how, ultimately, it all boils down to identity. The discussion touches upon the nuances of threat actor nomenclature, the significance of various bear-themed aliases and the professional nature of state-sponsored cyber espionage groups. Throughout the episode, practical insights and cybersecurity best practices are shared, offering organizations valuable strategies to bolster their defenses against evolving cyber threats. For a comprehensive analysis of the APT29 Microsoft data breach and detailed recommendations for improving cybersecurity posture, check out the accompanying blog post written by Andy Thompson.

Feb 6, 2024 • 42min
EP 45 - OT Security's Digital Makeover
In this episode of Trust Issues, the conversation revolves around the challenges and transformations in operational technology (OT) security. Guest Mike Holcomb, the Fellow of Cybersecurity and the ICS/OT Cybersecurity Lead at Fluor shares insights with host David Puner on securing legacy systems, the impact of generative AI – and the evolving threat landscape. From addressing security challenges in manufacturing plants to the skills gap in OT cybersecurity, the episode provides an overview of the current state and future prospects of securing critical infrastructure. Holcomb also emphasizes the importance of identity in OT security and offers practical advice for organizations looking to enhance their cybersecurity posture. Check out the episode to explore the dynamic intersection of IT and OT – and how it spotlights the urgent need for robust cybersecurity measures in an evolving digital landscape.

Jan 25, 2024 • 33min
EP 44 - The Rise of Prompt Engineering: How AI Fuels Script Kiddies
In this episode of Trust Issues, CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of Zero Trust, identity security and multi-layered defense. All this and a dollop of transhumanism … Don’t be a bot – check it out!

Jan 12, 2024 • 45min
EP 43 - Breaking Things in the Name of Cyber Resilience
Guest Dr. Magda Chelly, Managing Director and CISO of Responsible Cyber, joins Trust Issues host David Puner for a conversation about third-party risk management and cyber resilience. Dr. Chelly underscores the imperative of prioritizing identity management, particularly as decentralized work environments are becoming the norm in today’s evolving digital landscape. She also explains how breaking things played a critical role in propelling her into a career in cybersecurity – and then in fostering and advancing it. The interview unfolds against the backdrop of Dr. Chelly’s extensive experience and recently authored book, "Building a Cyber Resilient Business," which serves as a handbook for executives and boards navigating the complexities of cybersecurity. If you’re seeking insights on how to gain stronger visibility and control over your organization’s digital identities, this episode is for you.Join us to learn how build resiliency against today’s ever-growing array of cyber threats – and what’s to come in 2024 and beyond.

6 snips
Dec 27, 2023 • 35min
EP 42 - Year in Review 2023: Unleashing AI, Securing Identities
The podcast discusses insights from cybersecurity experts on AI impact on cyber threats, synthetic identity fraud, remote hiring best practices, cloud security, and a unique career path from bear wrestling to offensive security.

Dec 14, 2023 • 38min
EP 41 - Cyber Hygiene and the Identity Imperative
Rita Gurevich, CEO of SPHERE, discusses the evolving cyber controls and identity hygiene requirements in cybersecurity. Topics include the impact of cloud environments, cyber insurance trends, and challenges in mergers and acquisitions. Emphasis on the need for comprehensive cybersecurity measures across all platforms.

Nov 28, 2023 • 41min
EP 40 - The Identity of Things
Today’s Trust Issues guest is Brian Contos, Chief Strategy Officer at Sevco Security. With host David Puner, Contos discusses the intricacies of securing the Internet of Things (IoT) and the challenges posed by the expanding IoT landscape – emphasizing the need for robust identity management. In a broader context, IoT encompasses identity management, cybersecurity and the evolving role of AI in safeguarding digital assets. Contos delves into the pressing issues surrounding IoT, Extended IoT (xIoT) and OT devices' security vulnerabilities – and explores how these vulnerabilities pose threats to consumer privacy, sensitive data and public safety. The conversation also touches on the intersections of identity security with asset intelligence and the importance of understanding the complete asset landscape in cybersecurity. We’re calling this one “The Identity of Things” … Check it out!

Nov 2, 2023 • 33min
EP 39 - Analyzing the MGM and Okta Breaches: the Identity Connection
In this Trust Issues episode, host David Puner welcomes back Andy Thompson, CyberArk Labs' Offensive Security Research Evangelist for a discussion focused on two recent high-profile breaches: one targeting MGM Resorts International and the other involving Okta's support unit. The conversation delves into the details of the attacks – who’s behind them, how identity plays a pivotal role in both – and the larger implications of this new breed of supply chain attack amid the evolving threat landscape. Thompson also shares insights into how organizations can better protect themselves and their customers. Check out the CyberArk blog for further insights into the MGM and Okta breaches. And, watch Andy Thompson in the CyberArk Labs' webinar, "Anatomy of the MGM Hack."