You Think You Know Me

Security Breach

Security Breach
You Think You Know Me
Jul 02, 2025
Eric Sorensen

Who are you?

This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. 

My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessing your systems and networks. The second, equally as challenging, but potentially more complex, focused on machine or asset identities and understanding how to keep this sprawling attack landscape more secure. 

Perhaps most interestingly, Brandon also offers some insight on cookies-based attacks and how, like so many cybersecurity challenges, the answers doesn’t lie in the tech stack.

Watch/listen as we also discuss:

  • Solving identify management strategies by finding baseline controls.
  • The unique dynamics of manufacturing when it comes to risk analysis and establishing these baselines.
  • The role of asset visibility when it comes to identity management strategies.
  • How to prevent those age-old turf battles between IT and OT.
  • Why machine identities might pose the greatest cybersecurity risk.
  • The importance of empathy in getting people to buy in to cybersecurity strategies and training.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Digital Disruption with Geoff Nielson
Discover how technology is reshaping our lives and livelihoods.

Listen on: Apple Podcasts   Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork You Think You Know Me 35:43 Episode Artwork Avoiding the Ostrich Approach 51:57 Episode Artwork 'We've Made Our Own Prison' 43:29 Episode Artwork Dark AI Speeding Hacker Evolution 36:48 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 40:32 Episode Artwork Insecure Webcam Was All a Ransomware Group Needed 32:00 Episode Artwork IABs, Dark Web Fueling Ransomware Surge 39:52 Episode Artwork Manufacturing’s Internal Cyber Struggles 27:55 Episode Artwork Observations of an Ethical Hacking Researcher 36:13 Episode Artwork The Evolution of OT Vulnerabilities 37:25 Episode Artwork The Legacy of AI in Cybersecurity 27:23 Episode Artwork A Happy Ending to the Latest ICS Hack 30:02 Episode Artwork The Biggest Hacks of 2024 41:11 Episode Artwork Looking Back to Move Forward 42:39 Episode Artwork AI Is Exposing Your Most Vulnerable Attack Surface 35:55 Episode Artwork Minimizing Hacks by Focusing on Uptime 39:45 Episode Artwork What Cybersecurity Can Learn from Tom Brady 54:36 Episode Artwork Threat Landscape Update 39:26 Episode Artwork The Little Things That Kill 39:14 Episode Artwork Phishing Attack Defense 'Not Rocket Science' 22:22 Episode Artwork Legacy Mindsets Are Helping Hackers Weaponize Networks 43:20 Episode Artwork Using Force Multipliers to Protect Against Next-Gen Stuxnet 40:53 Episode Artwork Never Let a Good Hack Go to Waste 33:36 Episode Artwork Finding Your 'Creative Maliciousness' 39:48 Episode Artwork Getting Past the Whack-A-Mole Approach 36:08