Podcasts about matthias reinwarth

  • 2PODCASTS
  • 194EPISODES
  • 20mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Sep 8, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about matthias reinwarth

Latest podcast episodes about matthias reinwarth

KuppingerCole Analysts
Analyst Chat #268: Interoperability by Design - Making IAM Work Across Legacy, SaaS, and Multi-Cloud

KuppingerCole Analysts

Play Episode Listen Later Sep 8, 2025 27:52


Identity and Access Management (IAM) is no longer a one-off project—it’s an ongoing journey. In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Christopher (CISO & Lead Advisor) and Deniz Algin (Advisor) to explore how organizations can successfully apply the Identity Fabric concept. How to evolve from legacy systems to a future-proof IAM strategy without breaking existing operations? Why interoperability matters? What are the most common pitfalls organizations face when trying to modernize IAM? Find the answer to these questions and more in this episode! Key Topics Covered: Identity Fabric explained through a powerful “airport” analogy ✈️ How to design IAM programs in brownfield environments (no rip & replace) Capability-driven approach vs. tool-driven decisions Risk-based prioritization: quick wins, big wins & roadmaps Common pitfalls to avoid when modernizing IAM

KuppingerCole Analysts Videos
Analyst Chat #268: Interoperability by Design - Making IAM Work Across Legacy, SaaS, and Multi-Cloud

KuppingerCole Analysts Videos

Play Episode Listen Later Sep 8, 2025 27:52


Identity and Access Management (IAM) is no longer a one-off project—it’s an ongoing journey. In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Christopher (CISO & Lead Advisor) and Deniz Algin (Advisor) to explore how organizations can successfully apply the Identity Fabric concept. How to evolve from legacy systems to a future-proof IAM strategy without breaking existing operations? Why interoperability matters? What are the most common pitfalls organizations face when trying to modernize IAM? Find the answer to these questions and more in this episode! Key Topics Covered: Identity Fabric explained through a powerful “airport” analogy ✈️ How to design IAM programs in brownfield environments (no rip & replace) Capability-driven approach vs. tool-driven decisions Risk-based prioritization: quick wins, big wins & roadmaps Common pitfalls to avoid when modernizing IAM

KuppingerCole Analysts
Analyst Chat #267: ITDR & Machine Identities (NHIs) - Rethinking IAM for Security at Scale

KuppingerCole Analysts

Play Episode Listen Later Sep 1, 2025 66:12


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger and special guest Felix Gaehtgens to explore two of the hottest (and most debated) topics in identity today: Identity Threat Detection & Response (ITDR) and Non-Human / Machine Identities (NHI). Together, they gothrough the buzzwords to reveal what’s real, what’s hype, and how organizations should approach these fast-evolving areas of IAM. From visibility vs. observability, to governance challenges and the future of machine identity management, this episode delivers sharp insights and practical recommendations from three IAM veterans. So tell us — are ITDR and NHI just marketing buzzwords, or essential must-haves for modern identity security? Key topics covered: ITDR explained: buzzword or meaningful evolution in IAM? Why visibility and observability are not the same The missing “R” in detection & response IAM vs. SOC responsibilities for ITDR Machine identities: terminology, challenges, and governance Ephemeral vs. static machine identities How IAM teams can prepare for the future of identity security

KuppingerCole Analysts Videos
Analyst Chat #267: ITDR & Machine Identities (NHIs) - Rethinking IAM for Security at Scale

KuppingerCole Analysts Videos

Play Episode Listen Later Sep 1, 2025 66:12


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger and special guest Felix Gaehtgens to explore two of the hottest (and most debated) topics in identity today: Identity Threat Detection & Response (ITDR) and Non-Human / Machine Identities (NHI). Together, they gothrough the buzzwords to reveal what’s real, what’s hype, and how organizations should approach these fast-evolving areas of IAM. From visibility vs. observability, to governance challenges and the future of machine identity management, this episode delivers sharp insights and practical recommendations from three IAM veterans. So tell us — are ITDR and NHI just marketing buzzwords, or essential must-haves for modern identity security? Key topics covered: ITDR explained: buzzword or meaningful evolution in IAM? Why visibility and observability are not the same The missing “R” in detection & response IAM vs. SOC responsibilities for ITDR Machine identities: terminology, challenges, and governance Ephemeral vs. static machine identities How IAM teams can prepare for the future of identity security

KuppingerCole Analysts
Analyst Chat #265: Avoid Making IAM the Default Container for Unresolved Ownership

KuppingerCole Analysts

Play Episode Listen Later Aug 18, 2025 23:10


In this practical episode of the KuppingerCole Analyst Chat, Patrick Teichmann joins Matthias Reinwarth to address a surprisingly common organizational issue: IAM teams being tasked with solving everything. From HR data gaps to legacy tool cleanup and cross-department handovers — IAM teams often inherit work that isn’t truly their responsibility. This episode is a call to realign IAM strategy with clear ownership, realistic boundaries, and strong service delivery. In this conversation: Why not everything is an IAM problem Common traps: onboarding issues, ownership gaps, tool clutter How to set boundaries without damaging collaboration Using operating models and RACI matrices to define IAM’s real scope Why focusing your IAM team improves service quality and security How to justify saying “no” — with strategy to back it up Preparing for IAM scalability, sustainability, and new regulations Key takeaway: Sharpening your focus as an IAM team isn't about doing less — it’s about doing what matters most, better.

KuppingerCole Analysts Videos
Analyst Chat #265: Avoid Making IAM the Default Container for Unresolved Ownership

KuppingerCole Analysts Videos

Play Episode Listen Later Aug 18, 2025 23:10


In this practical episode of the KuppingerCole Analyst Chat, Patrick Teichmann joins Matthias Reinwarth to address a surprisingly common organizational issue: IAM teams being tasked with solving everything. From HR data gaps to legacy tool cleanup and cross-department handovers — IAM teams often inherit work that isn’t truly their responsibility. This episode is a call to realign IAM strategy with clear ownership, realistic boundaries, and strong service delivery. In this conversation: Why not everything is an IAM problem Common traps: onboarding issues, ownership gaps, tool clutter How to set boundaries without damaging collaboration Using operating models and RACI matrices to define IAM’s real scope Why focusing your IAM team improves service quality and security How to justify saying “no” — with strategy to back it up Preparing for IAM scalability, sustainability, and new regulations Key takeaway: Sharpening your focus as an IAM team isn't about doing less — it’s about doing what matters most, better.

KuppingerCole Analysts
Analyst Chat #264: Persistent Identity, Ephemeral Secrets - Workload Identities in the Age of AI

KuppingerCole Analysts

Play Episode Listen Later Aug 11, 2025 22:27


In this episode of the KuppingerCole Analyst Chat, Martin Kuppinger joins Matthias Reinwarth to dive deep into one of the most overlooked but critical areas in identity and security: non-human identities (NHI) and workload secrets. As cloud-native development and AI-driven workloads grow, so does the complexity of managing machine identities. With AWS now supporting long-lived API keys for generative AI, this episode explores why that's a risky move — and what a modern, secure, and developer-friendly alternative looks like. In this episode, you'll learn: Why workload identities must be treated as privileged How long-lived secrets expand your attack surface Why “balancing convenience vs. security” is a false choice How to apply ephemeral secrets and ITDR signals The role of SPIFFE/SPIRE, policy-as-code (OPA), and automation Why developers shouldn’t own security — and what IAM must do instead How attackers use AI to hunt your leaked secrets What organizations must do to secure NHI at scale Key takeaway: Security must be built around short-lived secrets, automation, and clear separation between identity, secrets, and entitlements — especially for workloads and AI agents.

KuppingerCole Analysts Videos
Analyst Chat #264: Persistent Identity, Ephemeral Secrets - Workload Identities in the Age of AI

KuppingerCole Analysts Videos

Play Episode Listen Later Aug 11, 2025 22:27


In this episode of the KuppingerCole Analyst Chat, Martin Kuppinger joins Matthias Reinwarth to dive deep into one of the most overlooked but critical areas in identity and security: non-human identities (NHI) and workload secrets. As cloud-native development and AI-driven workloads grow, so does the complexity of managing machine identities. With AWS now supporting long-lived API keys for generative AI, this episode explores why that's a risky move — and what a modern, secure, and developer-friendly alternative looks like. In this episode, you'll learn: Why workload identities must be treated as privileged How long-lived secrets expand your attack surface Why “balancing convenience vs. security” is a false choice How to apply ephemeral secrets and ITDR signals The role of SPIFFE/SPIRE, policy-as-code (OPA), and automation Why developers shouldn’t own security — and what IAM must do instead How attackers use AI to hunt your leaked secrets What organizations must do to secure NHI at scale Key takeaway: Security must be built around short-lived secrets, automation, and clear separation between identity, secrets, and entitlements — especially for workloads and AI agents.

KuppingerCole Analysts
Analyst Chat #263: Third-Party Access - Securing the Weakest Link in Your Identity Strategy

KuppingerCole Analysts

Play Episode Listen Later Aug 4, 2025 18:55


In this episode of the KuppingerCole Analyst Chat, Warwick Ashford joins Matthias Reinwarth to explore a hidden but growing risk: third-party access to your systems. Third-party contractors, suppliers, and partners often have access to internal systems — but lack the same governance, oversight, and security controls as employees. This episode explores why Third-Party Access Governance (TPAG) is now a strategic security priority, not just a technical integration. What we cover:✅Why third-party identities now outnumber employees in many orgs✅The governance gap: no HR triggers, lifecycle oversight, or certifications✅How traditional IAM systems fail to manage external access✅The role of the Identity & Security Fabric in enabling TPAG✅Regulatory drivers (DORA, NIS2, CMMC) making this a board-level issue✅Core capabilities of modern TPAG solutions✅Practical first steps for building a third-party access governance strategy

KuppingerCole Analysts Videos
Analyst Chat #263: Third-Party Access - Securing the Weakest Link in Your Identity Strategy

KuppingerCole Analysts Videos

Play Episode Listen Later Aug 4, 2025 18:55


In this episode of the KuppingerCole Analyst Chat, Warwick Ashford joins Matthias Reinwarth to explore a hidden but growing risk: third-party access to your systems. Third-party contractors, suppliers, and partners often have access to internal systems — but lack the same governance, oversight, and security controls as employees. This episode explores why Third-Party Access Governance (TPAG) is now a strategic security priority, not just a technical integration. What we cover:✅Why third-party identities now outnumber employees in many orgs✅The governance gap: no HR triggers, lifecycle oversight, or certifications✅How traditional IAM systems fail to manage external access✅The role of the Identity & Security Fabric in enabling TPAG✅Regulatory drivers (DORA, NIS2, CMMC) making this a board-level issue✅Core capabilities of modern TPAG solutions✅Practical first steps for building a third-party access governance strategy

KuppingerCole Analysts
Analyst Chat #262: Using Identity Fabric to Align Stakeholders and Strategy

KuppingerCole Analysts

Play Episode Listen Later Jul 28, 2025 15:10


In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, to discuss the evolution of the Identity Fabric. Originally introduced as a visual tool in 2017–2018, the Identity Fabric has matured into a foundational framework for modern identity and access management. The conversation covers the motivations behind its creation, its flexibility in addressing various identity types, and its role in simplifying complex IAM architectures. Martin also explains the rationale for a leaner version of the model, aimed at executive stakeholders, and offers a glimpse into the forward-looking Identity Fabric for the 2040s. In this episode, you’ll learn:✅Where the Identity Fabric concept began✅Why a leaner version is needed — and who it’s for✅How to pitch Identity Fabric to C-level decision makers✅What the 2040s might look like for IAM✅How organizations and vendors alike are using this model today Whether you're deep in IAM or just starting to align your strategy, this episode breaks down how to communicate complex identity concepts more clearly.

KuppingerCole Analysts Videos
Analyst Chat #262: Using Identity Fabric to Align Stakeholders and Strategy

KuppingerCole Analysts Videos

Play Episode Listen Later Jul 28, 2025 15:10


In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, to discuss the evolution of the Identity Fabric. Originally introduced as a visual tool in 2017–2018, the Identity Fabric has matured into a foundational framework for modern identity and access management. The conversation covers the motivations behind its creation, its flexibility in addressing various identity types, and its role in simplifying complex IAM architectures. Martin also explains the rationale for a leaner version of the model, aimed at executive stakeholders, and offers a glimpse into the forward-looking Identity Fabric for the 2040s. In this episode, you’ll learn:✅Where the Identity Fabric concept began✅Why a leaner version is needed — and who it’s for✅How to pitch Identity Fabric to C-level decision makers✅What the 2040s might look like for IAM✅How organizations and vendors alike are using this model today Whether you're deep in IAM or just starting to align your strategy, this episode breaks down how to communicate complex identity concepts more clearly.

KuppingerCole Analysts
Analyst Chat #261: From Silos to Strategy - Building Modern Identity Fabrics

KuppingerCole Analysts

Play Episode Listen Later Jul 21, 2025 19:25


In this episode, Matthias Reinwarth is joined by Alejandro Leal, Senior Analyst at KuppingerCole Analysts, to discuss the strategic shift toward Identity Fabrics in modern IAM. Alejandro outlines the challenges posed by fragmented IAM architectures and the growing diversity of digital identities. The conversation explores how the Identity Fabric model enables organizations to build cohesive, adaptive identity infrastructures that integrate existing tools while providing observability and actionable insights. They also examine the importance of integration, modularity, and policy enforcement across identity silos. The episode concludes with practical steps for building a future-proof IAM strategy. We dive into: Why traditional IAM is failing What Identity Fabric really means (and what it’s not) How it supports every identity type — human or machine The critical role of observability & actionable insights How to balance legacy tools with agile innovation Where to start your implementation — without a big bang Identity is now a strategic business function — and Identity Fabric is how to operationalize it.

KuppingerCole Analysts Videos
Analyst Chat #261: From Silos to Strategy - Building Modern Identity Fabrics

KuppingerCole Analysts Videos

Play Episode Listen Later Jul 21, 2025 19:25


In this episode, Matthias Reinwarth is joined by Alejandro Leal, Senior Analyst at KuppingerCole Analysts, to discuss the strategic shift toward Identity Fabrics in modern IAM. Alejandro outlines the challenges posed by fragmented IAM architectures and the growing diversity of digital identities. The conversation explores how the Identity Fabric model enables organizations to build cohesive, adaptive identity infrastructures that integrate existing tools while providing observability and actionable insights. They also examine the importance of integration, modularity, and policy enforcement across identity silos. The episode concludes with practical steps for building a future-proof IAM strategy. We dive into: Why traditional IAM is failing What Identity Fabric really means (and what it’s not) How it supports every identity type — human or machine The critical role of observability & actionable insights How to balance legacy tools with agile innovation Where to start your implementation — without a big bang Identity is now a strategic business function — and Identity Fabric is how to operationalize it.

KuppingerCole Analysts
Analyst Chat #260: Servant Leadership for CISOs - Better Security & Business Outcomes

KuppingerCole Analysts

Play Episode Listen Later Jul 14, 2025 44:22


In this must-listen episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Jonathan Care to explore a groundbreaking shift in cybersecurity leadership. Discover how CISOs are transforming from traditional gatekeepers, the infamous "Dr. No", into strategic business enablers through the principles of Servant Leadership. We dive deep into: Why the CISO role is evolving beyond technology and policy The pitfalls of autocratic security leadership and rising burnout How empowering teams builds trust, reduces shadow IT, and accelerates projects Real-world examples from global organizations proving this approach works Practical first steps for CISOs to start leading through influence, not fear Key Takeaway: Security isn’t just about tech, it’s about people and culture. Servant leadership helps build stronger security and stronger businesses.

KuppingerCole Analysts Videos
Analyst Chat #260: Servant Leadership for CISOs - Better Security & Business Outcomes

KuppingerCole Analysts Videos

Play Episode Listen Later Jul 14, 2025 44:22


In this must-listen episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Jonathan Care to explore a groundbreaking shift in cybersecurity leadership. Discover how CISOs are transforming from traditional gatekeepers, the infamous "Dr. No", into strategic business enablers through the principles of Servant Leadership. We dive deep into: Why the CISO role is evolving beyond technology and policy The pitfalls of autocratic security leadership and rising burnout How empowering teams builds trust, reduces shadow IT, and accelerates projects Real-world examples from global organizations proving this approach works Practical first steps for CISOs to start leading through influence, not fear Key Takeaway: Security isn’t just about tech, it’s about people and culture. Servant leadership helps build stronger security and stronger businesses.

KuppingerCole Analysts
Analyst Chat #259: Why API Security is the New Cybersecurity Imperative

KuppingerCole Analysts

Play Episode Listen Later Jul 7, 2025 24:51


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth sits down with cybersecurity CTO & analyst Alexei Balaganski to explore the dramatic evolution of API management and security. They unpack: Why APIs are now the backbone of AI agents and how MCP (Model Context Protocol) is driving a new decentralized ecosystem. The explosion of shadow APIs & hidden interfaces from your printer to your coffee machine and why they pose serious risks. How edge computing & WebAssembly are decentralizing everything, making old API gateway models obsolete. The critical need for API posture management, identity & access controls for non-human identities, and full lifecycle security even before you write a line of code. Learn why API security isn’t just a tech problem, it’s the next big business risk, how the market is consolidating, and what’s coming in the new Leadership Compass on API Management & Security.

KuppingerCole Analysts Videos
Analyst Chat #259: Why API Security is the New Cybersecurity Imperative

KuppingerCole Analysts Videos

Play Episode Listen Later Jul 7, 2025 24:51


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth sits down with cybersecurity CTO & analyst Alexei Balaganski to explore the dramatic evolution of API management and security. They unpack: Why APIs are now the backbone of AI agents and how MCP (Model Context Protocol) is driving a new decentralized ecosystem. The explosion of shadow APIs & hidden interfaces from your printer to your coffee machine and why they pose serious risks. How edge computing & WebAssembly are decentralizing everything, making old API gateway models obsolete. The critical need for API posture management, identity & access controls for non-human identities, and full lifecycle security even before you write a line of code. Learn why API security isn’t just a tech problem, it’s the next big business risk, how the market is consolidating, and what’s coming in the new Leadership Compass on API Management & Security.

KuppingerCole Analysts
Analyst Chat #258: Defining Identity - Beyond Secrets, Credentials, and Accounts

KuppingerCole Analysts

Play Episode Listen Later Jun 30, 2025 17:52


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger to untangle one of the most complex—and increasingly urgent—topics in digital identity: non-human identities (NHIs). With AI agents, workloads, service accounts, and API keys exploding in number, it’s no longer enough to rely on traditional IAM structures. But what is an NHI, exactly? And how can organizations secure them without collapsing under the weight of siloed systems and unmanaged identities? Martin and Matthias explore: The blurry boundaries between identities, accounts, secrets, and credentials Why "non-human" is a problematic but useful term Agentic AI vs. API keys: where identity management really changes Practical starting points for managing NHIs in real-world environments

KuppingerCole Analysts Videos
Analyst Chat #258: Defining Identity - Beyond Secrets, Credentials, and Accounts

KuppingerCole Analysts Videos

Play Episode Listen Later Jun 30, 2025 17:52


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger to untangle one of the most complex—and increasingly urgent—topics in digital identity: non-human identities (NHIs). With AI agents, workloads, service accounts, and API keys exploding in number, it’s no longer enough to rely on traditional IAM structures. But what is an NHI, exactly? And how can organizations secure them without collapsing under the weight of siloed systems and unmanaged identities? Martin and Matthias explore: The blurry boundaries between identities, accounts, secrets, and credentials Why "non-human" is a problematic but useful term Agentic AI vs. API keys: where identity management really changes Practical starting points for managing NHIs in real-world environments

KuppingerCole Analysts
Analyst Chat #257: Detecting Deception - A CISO's Guide to Modern Threat Detection

KuppingerCole Analysts

Play Episode Listen Later Jun 24, 2025 41:48


In this essential episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes cybersecurity strategist Jonathan Care to explore one of the most pressing challenges CISOs face in 2025: detecting deception in an age of AI-powered attacks. From deepfakes and behavioral manipulation to vendor impersonation and adversarial AI, attackers are no longer relying on simple phishing emails. They're launching highly personalized, deeply technical, and psychologically crafted deceptions. Jonathan presents a structured four-part taxonomy of deception and offers actionable insights for CISOs—from implementing callback verification protocols to deploying behavioral analytics and deception detection technologies. Topics Covered: AI-powered social engineering Digital identity deception & deepfakes Vendor/supply chain impersonation Technical deception & adversarial machine learning Practical steps CISOs can take this week

KuppingerCole Analysts Videos
Analyst Chat #257: Detecting Deception - A CISO's Guide to Modern Threat Detection

KuppingerCole Analysts Videos

Play Episode Listen Later Jun 24, 2025 41:48


In this essential episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes cybersecurity strategist Jonathan Care to explore one of the most pressing challenges CISOs face in 2025: detecting deception in an age of AI-powered attacks. From deepfakes and behavioral manipulation to vendor impersonation and adversarial AI, attackers are no longer relying on simple phishing emails. They're launching highly personalized, deeply technical, and psychologically crafted deceptions. Jonathan presents a structured four-part taxonomy of deception and offers actionable insights for CISOs—from implementing callback verification protocols to deploying behavioral analytics and deception detection technologies. Topics Covered: AI-powered social engineering Digital identity deception & deepfakes Vendor/supply chain impersonation Technical deception & adversarial machine learning Practical steps CISOs can take this week

KuppingerCole Analysts
Analyst Chat #256: Organizational Identity & B2B Fraud - Rogue Merchants, PPP Scams, Digital Trust

KuppingerCole Analysts

Play Episode Listen Later Jun 16, 2025 27:22


Organizational identity is no longer optional In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by cybersecurity research director John Tolbert to talk about the rising threats of organizational fraud, rogue merchants, and the growing need for robust identity verification at the business level. Topics covered: What are rogue merchants, and how do they operate? The staggering fraud numbers behind the Paycheck Protection Program (PPP) The importance of Know Your Business (KYB) vs. Know Your Customer (KYC) Why legacy business verification methods are no longer enough How APIs, LEIs, and verifiable digital identities can help The role of CIEM and B2B CIAM in detecting and preventing organizational fraud Whether you're in cybersecurity, compliance, finance, or e-commerce, this episode unpacks how fraud at the organizational level is growing—and what tools and frameworks can stop it.

KuppingerCole Analysts Videos
Analyst Chat #256: Organizational Identity & B2B Fraud - Rogue Merchants, PPP Scams, Digital Trust

KuppingerCole Analysts Videos

Play Episode Listen Later Jun 16, 2025 27:22


Organizational identity is no longer optional In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by cybersecurity research director John Tolbert to talk about the rising threats of organizational fraud, rogue merchants, and the growing need for robust identity verification at the business level. Topics covered: What are rogue merchants, and how do they operate? The staggering fraud numbers behind the Paycheck Protection Program (PPP) The importance of Know Your Business (KYB) vs. Know Your Customer (KYC) Why legacy business verification methods are no longer enough How APIs, LEIs, and verifiable digital identities can help The role of CIEM and B2B CIAM in detecting and preventing organizational fraud Whether you're in cybersecurity, compliance, finance, or e-commerce, this episode unpacks how fraud at the organizational level is growing—and what tools and frameworks can stop it.

KuppingerCole Analysts
Analyst Chat #255: Looking back at EIC 2025 with Christie Pugh

KuppingerCole Analysts

Play Episode Listen Later Jun 10, 2025 19:24


In this episode, Matthias Reinwarth welcomes KuppingerCole Membership Product Owner Christie Pugh to share her unique perspective on the European Identity and Cloud Conference (EIC) 2025.

KuppingerCole Analysts Videos
Analyst Chat #255: Looking back at EIC 2025 with Christie Pugh

KuppingerCole Analysts Videos

Play Episode Listen Later Jun 10, 2025 19:24


In this episode, Matthias Reinwarth welcomes KuppingerCole Membership Product Owner Christie Pugh to share her unique perspective on the European Identity and Cloud Conference (EIC) 2025.

KuppingerCole Analysts
Analyst Chat #254: Operationalizing the Identity Fabrics and Reference Architecture

KuppingerCole Analysts

Play Episode Listen Later Jun 2, 2025 50:33


KuppingerCole Analysts Videos
Analyst Chat #254: Operationalizing the Identity Fabrics and Reference Architecture

KuppingerCole Analysts Videos

Play Episode Listen Later Jun 2, 2025 50:33


KuppingerCole Analysts
Analyst Chat #253: Looking back at EIC 2025 with Patrick Teichmann

KuppingerCole Analysts

Play Episode Listen Later May 26, 2025 12:56


In this episode, Matthias Reinwarth welcomes KuppingerCole Lead Advisor Patrick Teichmann to share his highlights from attending the European Identity and Cloud Conference (EIC) for the first time.

KuppingerCole Analysts Videos
Analyst Chat #253: Looking back at EIC 2025 with Patrick Teichmann

KuppingerCole Analysts Videos

Play Episode Listen Later May 26, 2025 12:56


In this episode, Matthias Reinwarth welcomes KuppingerCole Lead Advisor Patrick Teichmann to share his highlights from attending the European Identity and Cloud Conference (EIC) for the first time.

KuppingerCole Analysts
Analyst Chat #252: Looking back at EIC 2025 with Dr. Phillip Messerschmidt

KuppingerCole Analysts

Play Episode Listen Later May 19, 2025 16:53


What were the key takeaways from EIC 2025? This week, Matthias Reinwarth speaks with Dr. Phillip Messerschmidt, IAM expert and advisor at KuppingerCole Analysts, to get a personal review of the European Identity and Cloud Conference 2025 and its highlights.

KuppingerCole Analysts Videos
Analyst Chat #252: Looking back at EIC 2025 with Dr. Phillip Messerschmidt

KuppingerCole Analysts Videos

Play Episode Listen Later May 19, 2025 16:53


What were the key takeaways from EIC 2025? This week, Matthias Reinwarth speaks with Dr. Phillip Messerschmidt, IAM expert and advisor at KuppingerCole Analysts, to get a personal review of the European Identity and Cloud Conference 2025 and its highlights.

KuppingerCole Analysts
Analyst Chat #251: EIC 2025 - Navigating the Future of Digital Identity and Cybersecurity

KuppingerCole Analysts

Play Episode Listen Later Apr 28, 2025 24:41


KuppingerCole Analysts Videos
Analyst Chat #251: EIC 2025 - Navigating the Future of Digital Identity and Cybersecurity

KuppingerCole Analysts Videos

Play Episode Listen Later Apr 28, 2025 24:41


KuppingerCole Analysts
Analyst Chat #250: Introducing the KuppingerCole Cybersecurity Fabric

KuppingerCole Analysts

Play Episode Listen Later Apr 22, 2025 15:15


One does not simply secure an enterprise without integration. In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth sits down with cybersecurity expert Jonathan Care to explore the Cybersecurity Fabric — an emerging architectural concept designed to unify existing security tools, improve visibility, and enable automation and orchestration across your entire IT environment. Discover how this approach complements frameworks like Zero Trust and NIST, what benefits it brings to your organization, and how it can evolve alongside your security maturity.

KuppingerCole Analysts Videos
Analyst Chat #250: Introducing the KuppingerCole Cybersecurity Fabric

KuppingerCole Analysts Videos

Play Episode Listen Later Apr 22, 2025 15:15


One does not simply secure an enterprise without integration. In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth sits down with cybersecurity expert Jonathan Care to explore the Cybersecurity Fabric — an emerging architectural concept designed to unify existing security tools, improve visibility, and enable automation and orchestration across your entire IT environment. Discover how this approach complements frameworks like Zero Trust and NIST, what benefits it brings to your organization, and how it can evolve alongside your security maturity.

KuppingerCole Analysts
Analyst Chat #249: Hacking Burnout in Cybersecurity with AI-Induced Flow State

KuppingerCole Analysts

Play Episode Listen Later Apr 14, 2025 38:02


In this eye-opening episode of the KuppingerCole Analyst Chat, Dr. Kashyap Thimmaraju, postdoc researcher at TU Berlin and founder of FlowGuard Institute, joins Matthias Reinwarth to discuss his groundbreaking research into burnout, well-being, and flow state in Security Operations Centers (SOCs).

KuppingerCole Analysts Videos
Analyst Chat #249: Hacking Burnout in Cybersecurity with AI-Induced Flow State

KuppingerCole Analysts Videos

Play Episode Listen Later Apr 14, 2025 38:02


In this eye-opening episode of the KuppingerCole Analyst Chat, Dr. Kashyap Thimmaraju, postdoc researcher at TU Berlin and founder of FlowGuard Institute, joins Matthias Reinwarth to discuss his groundbreaking research into burnout, well-being, and flow state in Security Operations Centers (SOCs).

KuppingerCole Analysts
Analyst Chat #247: Identity in the Age of AI - Agentic AI, RAG & The Future of IAM

KuppingerCole Analysts

Play Episode Listen Later Mar 31, 2025 21:22


KuppingerCole Analysts Videos
Analyst Chat #247: Identity in the Age of AI - Agentic AI, RAG & The Future of IAM

KuppingerCole Analysts Videos

Play Episode Listen Later Mar 31, 2025 21:22


KuppingerCole Analysts
Analyst Chat #246: The Dark Side of Generative AI - Cyberattacks, Phishing, and Fraud

KuppingerCole Analysts

Play Episode Listen Later Mar 24, 2025 26:41


KuppingerCole Analysts Videos
Analyst Chat #246: The Dark Side of Generative AI - Cyberattacks, Phishing, and Fraud

KuppingerCole Analysts Videos

Play Episode Listen Later Mar 24, 2025 26:41


KuppingerCole Analysts
Analyst Chat #245: Managing Cyber Risks - The Role of Cybersecurity Insurance

KuppingerCole Analysts

Play Episode Listen Later Mar 17, 2025 26:02


KuppingerCole Analysts
Analyst Chat #244: Post-Quantum Authentication - Preparing for the Next Security Challenge

KuppingerCole Analysts

Play Episode Listen Later Mar 10, 2025 23:47


In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes back Alexei Balaganski, Lead Analyst at KuppingerCole Analysts, to continue their deep dive into quantum computing and its impact on authentication security. They discuss the increasing risks posed by quantum threats, the vulnerabilities of current encryption standards, and the critical role of crypto agility in ensuring long-term security. The conversation explores how organizations can prepare for the post-quantum era, highlighting strategies such as hybrid cryptography, quantum-resistant algorithms, and zero-trust authentication models. Alexei shares insights into the latest advancements in quantum-safe security, regulatory considerations, and practical steps businesses can take to mitigate future risks. The episode wraps up with a look at emerging trends in quantum security and what the future holds for authentication in a rapidly evolving digital landscape.

KuppingerCole Analysts
Analyst Chat #243: Securing Non-Human Identities - The Role of ITDR in Cybersecurity

KuppingerCole Analysts

Play Episode Listen Later Mar 3, 2025 18:11


In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, to explore the intersection of Non-Human Identities (NHI) and Identity Threat Detection and Response (ITDR). They discuss the growing importance of securing machine identities, service accounts, APIs, and automation processes, as well as the security risks associated with overprivileged accounts and mismanaged credentials. The conversation highlights how ITDR enhances traditional IAM and PAM solutions by providing real-time monitoring, anomaly detection, and automated threat response. Martin shares insights into AI-driven threat detection, zero-trust principles, and best practices for organizations looking to mitigate identity-based threats. The episode concludes with a look at emerging trends in ITDR and the future of machine identity security.

KuppingerCole Analysts
Analyst Chat #241: Cyber Hygiene for Your Personal Life

KuppingerCole Analysts

Play Episode Listen Later Dec 9, 2024 24:48


In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by cybersecurity expert John Tolbert to talk about essential tips for personal cyber hygiene. Together, they discuss practical advice for keeping your devices secure, avoiding common threats, and implementing best practices for online safety. Whether you're a tech-savvy professional or just starting to think about your digital security, this episode offers actionable insights to protect yourself and your loved ones in an increasingly connected world.

KuppingerCole Analysts
Analyst Chat #240: From SolarWinds to Zero Trust - Rethinking Supply Chain Security

KuppingerCole Analysts

Play Episode Listen Later Dec 2, 2024 28:04


Matthias Reinwarth and Dr. Phillip Messerschmidt delve into the complexities of Cyber Supply Chain Risk Management (C-SCRM). They discuss the importance of understanding and mitigating risks that arise from external suppliers and the interconnected nature of modern supply chains. The conversation highlights the critical role of Identity and Access Management (IAM) in managing these risks, particularly in the context of federated identities and the challenges that arise from relying on third-party controls. The speakers emphasize the need for organizations to actively assess and manage risks, implement robust onboarding processes, and continuously improve their cybersecurity practices to protect against potential threats.

KuppingerCole Analysts
Analyst Chat #230: Flexibility and Adaptability are Key - Identity Fabric 2025

KuppingerCole Analysts

Play Episode Listen Later Sep 23, 2024 21:48


In this episode, Matthias Reinwarth discusses the updates to the Identity Fabric and IAM reference architecture with Dr. Philipp Messerschmidt and Martin Kuppinger. The Identity Fabric is a holistic concept that provides seamless yet secure access to every type of identity for every type of service. The update to the Identity Fabric is necessary to reflect the developments in the IAM world, such as new trends in authorization and authentication. The IAM reference architecture provides more detail and functional capabilities for each pillar of IAM. The update also includes the addition of new identity types and the inclusion of architectural concepts like microservice architectures and identity API layers. The Identity Fabric 2025 will be flexible and adaptable to future trends and challenges in IAM.

KuppingerCole Analysts
Analyst Chat #226: WAF, WAAP, What? The Evolution of Web Application Firewalls

KuppingerCole Analysts

Play Episode Listen Later Aug 26, 2024 21:47


What makes a Web Application Firewall (WAF) a Web Application and API Protection (WAAP) solution? How is the landscape of the market changing and does every organization need a WAAP solution? Tune in to this episode of the Analyst Chat with guest Osman Celik and host Matthias Reinwarth to learn more. Dive deeper into the topic: https://www.kuppingercole.com/research/lc80921/web-application-firewalls

KuppingerCole Analysts
Analyst Chat #225: Eight Recommendations for CISOs in 2025

KuppingerCole Analysts

Play Episode Listen Later Aug 19, 2024 27:23


In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Annie Bailey, Research Strategy Director at KuppingerCole Analysts, to discuss the key trends that will shape the cybersecurity landscape through 2025. The conversation explores the increasing complexity of the attack surface, the growing importance of resilience and recovery in cybersecurity strategies, and the dual role of AI as both a threat and a defensive tool. In addition, the discussion covers the impact of emerging regulations, the need for advanced cybersecurity infrastructure, and how organizations can prepare for the anticipated challenges ahead.