{"id":194429,"date":"2024-07-10T11:00:00","date_gmt":"2024-07-10T11:02:33","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-56-time-as-attack-surface\/"},"modified":"2026-05-02T05:54:17","modified_gmt":"2026-05-02T09:54:17","slug":"ep-56-time-as-attack-surface","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/","title":{"rendered":"EP 56 &#8211; Time as Attack Surface"},"content":{"rendered":"<p>In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance. The episode emphasizes the strategies and technologies shaping the future of cybersecurity, particularly at the intersection of time management and identity protection.\u00a0<\/p>\n<p>Join us for a timely discussion that underscores the intersection of time management and identity protection.<\/p>\n","protected":false},"featured_media":213981,"template":"","class_list":["post-194429","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 56 - Time as Attack Surface | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 56 - Time as Attack Surface\" \/>\n<meta property=\"og:description\" content=\"In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T09:54:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/\",\"name\":\"EP 56 - Time as Attack Surface | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg\",\"datePublished\":\"2024-07-10T11:02:33+00:00\",\"dateModified\":\"2026-05-02T09:54:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 56 &#8211; Time as Attack Surface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 56 - Time as Attack Surface | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/","og_locale":"fr_FR","og_type":"article","og_title":"EP 56 - Time as Attack Surface","og_description":"In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at...","og_url":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-05-02T09:54:17+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/","url":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/","name":"EP 56 - Time as Attack Surface | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg","datePublished":"2024-07-10T11:02:33+00:00","dateModified":"2026-05-02T09:54:17+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/07\/YWExMy5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-56-time-as-attack-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"EP 56 &#8211; Time as Attack Surface"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast\/194429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media\/213981"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=194429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}