Cyber Defense eMagazine January 2020 Edition
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
56<br />
Getting PKI Right<br />
Program Failures and How to Avoid Them<br />
By Chris Hickman, chief security officer, Keyfactor<br />
Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view PKI<br />
as a vital layer within the security framework, helping to authenticate and encrypt sensitive endpoints,<br />
software and applications. Historically, managing PKI has been a manual, on-premises process. Despite<br />
its critical role within the cybersecurity framework, PKI has struggled to find a clear owner within the<br />
organization. Add to that, results from a recent survey where just 36% of respondents said their<br />
organizations have enough IT security staff members dedicated to PKI deployment.<br />
With the industry’s skill shortage, shifting compliance requirements and competing budget priorities, how<br />
can you sidestep deployment landmines and manage a program that’s right for your enterprise and its<br />
budget?<br />
CISOs tackling their organization’s PKI program have two options: build or buy. Deploying DIY PKI onpremises<br />
requires significant investment while keeping the program running takes a dedicated team.<br />
Without appropriate resourcing and continuous care and feeding, PKI can degrade, leading to vulnerable<br />
keys, certificates, system outages or worse – a significant breach event. In addition to the added costs<br />
of network downtime, PKI events can create preventable network vulnerabilities.<br />
56