Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
March 10
Americas: 2PM ET | EMEA: 3PM CET | APAC: 11AM SGT
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
DORA, NIS2, and the UK's CAF v4.0 are all converging on the same uncomfortable question: "Can you prove which machines accessed what resources, when, and why?" For most organizations, the answer is no.
From hands-on work with customers across EMEA, our security services team has identified four practices that put organizations most at risk when facing regulatory scrutiny under DORA, NIS2, and the UK Cyber Assessment Framework:
- Asset inventories that overlook machine identities – ICT registers list servers and applications but can't account for the 82:1 ratio of machine identities authenticating across them.
- Access controls that stop at the human perimeter – MFA and SSO protect workforce access while service accounts and API keys operate with static, long-lived credentials and excessive privilege.
- Vault sprawl with no unified governance – Different teams adopt different secret stores across AWS, Azure, GCP, and on-premises, each with inconsistent rotation, retention, and audit practices.
- Third-party credentials no one owns – External integrations use static tokens created years ago with no visibility into which vendors have access to what.
For each, our EMEA security services team will share real-world stories of how these gaps become audit findings—and the field-tested solutions leading organizations are adopting to close them. You'll learn why regulators across frameworks are converging on the same questions about non-human access, and how centralized discovery and governance satisfies multiple compliance requirements without disrupting how developers work.
- Why machine identity gaps create immediate compliance exposure under DORA, NIS2, and CAF
- Four real-world pitfalls we see in customer environments—and proven ways to fix them
- How centralized secrets governance helps organizations satisfy multiple regulatory frameworks from a single approach
Presenters:
Joe Garcia
Principal Product Marketing Manager, CyberArk
Andrea Cappuccinello
Senior Manager, Security Services – DevSecOps, CyberArk
Robin Bria
Senior Security Consultant (DevSecOps), CyberArk