03.01.2020 Views

Cyber Defense eMagazine January 2020 Edition

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

56<br />

Getting PKI Right<br />

Program Failures and How to Avoid Them<br />

By Chris Hickman, chief security officer, Keyfactor<br />

Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view PKI<br />

as a vital layer within the security framework, helping to authenticate and encrypt sensitive endpoints,<br />

software and applications. Historically, managing PKI has been a manual, on-premises process. Despite<br />

its critical role within the cybersecurity framework, PKI has struggled to find a clear owner within the<br />

organization. Add to that, results from a recent survey where just 36% of respondents said their<br />

organizations have enough IT security staff members dedicated to PKI deployment.<br />

With the industry’s skill shortage, shifting compliance requirements and competing budget priorities, how<br />

can you sidestep deployment landmines and manage a program that’s right for your enterprise and its<br />

budget?<br />

CISOs tackling their organization’s PKI program have two options: build or buy. Deploying DIY PKI onpremises<br />

requires significant investment while keeping the program running takes a dedicated team.<br />

Without appropriate resourcing and continuous care and feeding, PKI can degrade, leading to vulnerable<br />

keys, certificates, system outages or worse – a significant breach event. In addition to the added costs<br />

of network downtime, PKI events can create preventable network vulnerabilities.<br />

56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!