In January, 2022 the UK government announced its Cyber Security Strategy, outlining plans aimed at ensuring public sector resilience to cyber attacks. Acknowledging the level of incidents targeted on the public sector, it set out the government’s intention to work together to “defend as one” against potential future threats.
The recently published Government Cyber Security Strategy: 2022-2030 states that the government will adopt the Cyber Assessment Framework (CAF) as the assurance framework for UK government.
In this podcast, we discuss how CyberArk is positioned to support the Government Cyber Security Strategy with regards to managing security risk, in line with Cyber Assessment Framework – Objective A.
Recommended for You

Discover how CyberArk’s latest platform advancements empower organizations to secure every identity—human, machine, and AI.

Thomas Fikentscher, Area Vice President ANZ at CyberArk, kicks off the event and sets the stage for the day ahead. He highlights the central themes of identity security and innovation, and underscores

A flexible, roaming multi-factor authentication (MFA) solution designed for healthcare environments

CyberArk Chief Strategy Officer Clarence Hinton explores trends, market dynamics and other issues shaping the 2025 identity security landscape.

A guide to compliance, threat prevention, and resilience under Hong Kong’s Critical Infrastructure Bill.

In a bad dream, you open the closet. You think you know exactly what’s in there: a few SSH keys, a bunch of TLS certificates, and some secrets like API keys locked in what you...

This excerpt from the Identity Security Imperative explores how to secure rapidly growing machine identities with intelligent controls—without slowing innovation.

For years, separating day-to-day user activity from administrative tasks through secondary accounts was considered a security best practice. But as identity threats grow more sophisticated and...

See how CyberArk EPM delivers adaptive, identity-centric application controls to stop ransomware, insider threats, and APTs while boosting efficiency.

CyberArk completed an IRAP assessment at the Protected level, validating its Workforce Identity Security platform against Australia’s ISM and giving agencies the confidence to move sensitive workloads

AI agents are on the rise. They can spin up, act independently, use tools, and make decisions—often without real-time human oversight. They promise incredible productivity but also introduce new...

Cloud complexity is growing. So are the risks—and the opportunities. As organizations scale their infrastructure across hybrid environments to innovate quickly, security strategies must evolve...

Enterprise security teams commonly focus on controlling AI agent conversations through prompt filters and testing edge cases to prevent unauthorized information access. While these measures...

What is the ToolShell exploit? A newly discovered exploit, “ToolShell,” is fueling a wave of targeted attacks against on-premises Microsoft SharePoint servers. The zero-day exploit chains two...

The advantages of an identity security platform & how to maximize risk reduction by managing and securing identities with appropriate privilege controls.

When attackers gain access to a single endpoint—like a developer’s workstation or an HR system—it’s often game over. With some skill and patience, that foothold can escalate into full-blown...

Developers now chart courses through environments as dynamic and unpredictable as open skies, plotting efficient courses through shifting clouds of technology to reach ambitious goals....

The June 2025 disclosure that over 16 billion passwords were leaked has raised significant concerns in the digital community. Reports suggest that many of these credentials are recycled from...

This excerpt from The Identity Security Imperative explores how to secure IT users with intelligent controls—without slowing innovation.