SlideShare a Scribd company logo
1 of 14
IAM and Cybersecurity
June 2016
2Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Capgemini’s vision and mission
 Cybersecurity Vision
As a Global leader in IT, Capgemini’s
vision on Cyber Security is to de-risk
the use of information technology by
making the right choices. We believe
that Cybersecurity delivers business
value and focuses upon things that
really matters. Cybersecurity is flexible
and enables the business to grow fast,
but securely. Prevention, Monitoring
and Detection are key, however only
effective if a security baseline has
been established and is defined what
good looks like.
 Cybersecurity Mission
Our mission is to deliver the most
convenient, invisible, cost effective,
pragmatic and reliable cybersecurity
services to run clients’ business. We
are committed to constantly adapt new
technologies and ways of work to
improve our services and ensure
continuous alignment with our clients
businesses.
3Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Strategic Focus Points
 It’s impossible to protect everything. Focus upon ‘things’ that really matters,
e.g. crown jewels.
 Constantly question the business value of security measures enabling an
effective balance between risk, costs and benefits
 Prevention without monitoring and detection is not effective and monitoring
and detection is only effective when is known how good looks like.
 Identity and Account lifecycle Management is the cornerstone for Cyber
Security.
 Cyber Security must transform from the fortress model into the airport model
and a transition plan must be in place.
 Outsourcing security is increasing the overall quality of security
 During the transition phase, a fallback plan must be in place
4Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Identity & Access Management Strategy
 IAM is highly ‘invisible’ for the business:
 Reviews or certifications will be replaced by rules and risk scores
 Compliance is an automated daily activity including remediation
(continuous assurance)
 Access Rights are provisioned (and de-provisioned) automatically
 It’s clear for every rule which risk is mitigated by that specific rule.
 Manual activities are kept to an absolute minimum (approvals etc.)
 IAM is the cornerstone of Cyber Security and is configured to enables the
effective use of prevention, monitoring and detection technology
 Dynamic risk management (attribute and context based) is integrated in
Access Management and analytics are used to dynamically determine risk
levels/scores
 Privileged (non personal) Accounts and managed separately.
 IAM actually need to be seen as EAM (Entity Access Management)
5Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
To increase the effectiveness of IAM, we add the intelligence
functionality to the more classic administrative and access functions
IAM Systems Risk policies determine
risk within each IAM function
User Entity Behaviour Analytics
Behaviour
Analytics
Engine
Risk
Analytic
s Engine
Context Risk score
People -> Devices -> Location ”Identity Context” Time -> Network -> Resource
SOC Asset Data ”User Behavior Context” Threat Intell Data in motion
Audit
Intelligence
Analytics
Authentication
Access
Authorizations
Identities
Administration
Entitlements
Identity & Entitlement Data
Roles
Risk Scores Context
Risk
Scores
Entitlements
6Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Capgemini Approach
Centralized
Identity Store
Self
service
Role
management
Compliance
reporting
Automated
provisioning Policy
management
Authorization
lifecycle
Risk
managementSecurity
User
experience
Single
Sign On
Access
management
Federation
Privileged
accounts
Identity
lifecycle
Review
attestation
7Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
IAM Operational KPI’s (Examples)
 # of password resets per month
 Average # of distinct accounts per user (and deviations)
 # of orphan accounts per system
 # of unknown identities (lacking info/ ‘ownership’)
 # of active identities already left the company
 # of active accounts of people left the company
 # of new accounts provisioned per time period
 Average lead time to (de-)provision users
 Average time to change user access rights
 Response % regarding attestation/certification
 # of exceptions generated per attestation/certification
 # of reconciliation issues (for offline systems)
 # of SoD conflicts
 Specific Identity quality KPI’s:
• E-mail lacking
• No line manager
• No department
• Etc. etc
 Risk Management KPI’s:
• % of people with High Risk access level
• Etc.
 User Behaviour KPI.s:
• Logon attemps
• Last Logon’s
• Out of office hours logons
• Etc.etc.
8Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
IAM FastTrack
 Do you recognize this?
 Why Capgemini FastTrack?
 Transforming IAM implementations
 FastTrack USP’s
9Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Do you recognize this?
 There’s a need for IAM, but due to complexity and lack of proper
approach it is delayed.
 No clear view on End User licenses.
 Audit, regulatory and compliance is important and a huge mostly
manual job.
 End users are complaining about the access management processes.
 On, off and through boarding processes are causing problems.
 Risk Management controls must be improved.
 Insight in who has got what is lacking and (thus) money is not being
spend efficiently.
 Responsibilities are complex to enforce because overviews are
lacking.
 Various Identity Sources or Directory environments are present and not
synchronized
10Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Why Capgemini FastTrack?
IAM projects are notorious when it comes to delivering on time, within budget and
delivering what is required.
At Capgemini, we have decided that it’s time to change! Therefore the FastTrack
concept has been developed.
FastTrack is about getting an overview of the ‘As-Is’ situation as soon as possible and
using the actual data (facts) to determine the strategy, roadmap, business case etc.
 Avoiding high costs on feasibility studies etc.
 Enabling ‘in control’ rapidly and managing security risks
 Determine possible cost reductions
11Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Transforming IAM implementations
Traditional IAM program
6 weeks
Engagement Policies Design
Vision Validation
Strategy
&
Roadma
p
Business benefits Implementation
FastTrack Insight FastTrack Implementation
IDaaS – Identity Governance & Administration as a Service
Implementation
12Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
IAM FastTrack USP’s
 Results in days instead of months
 Delivering an IAM Business Case, Strategy and Roadmap based upon facts.
 Harvesting low hanging fruit within days
 Providing insight in actual access rights and active identities
 Head start for any IAM project and unique opportunity to test one of the best IAM
tools available
 Business facing functionalities available right from the start. IAM tool is pre-
configured by Capgemini.
 Fixed price for 6 weeks and concrete deliverables
 Unique option to use the IAM tool in the ‘As a Service’ model (pay per use)
 Focusing upon the business and not upon tooling
13Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Unique Selling Points
 IDaaS by Capgemini is unique! There are no other vendors who can deliver the entire
Identity & Access Control stack in the as a Service model!
 IAM FastTrack is unique! An agile IAM project approach, delivering results in days
instead of months/years.
 Avoiding high costs on feasibility studies, workshops etc.
 Leveraging the experience and expertise of Capgemini
 Business benefits are delivered within weeks! i.e. Cost Savings, end user experience
etc.
 Compliance reports and mitigation plans to be executed in weeks.
The information contained in this presentation is proprietary.
© 2016 Capgemini. All rights reserved.
www.capgemini.com
About Capgemini
With more than 180,000 people in over 40 countries, Capgemini is
one of the world's foremost providers of consulting, technology and
outsourcing services. The Group reported 2015 global revenues of
EUR 11.9 billion. Together with its clients, Capgemini creates and
delivers business, technology and digital solutions that fit their
needs, enabling them to achieve innovation and competitiveness.
A deeply multicultural organization, Capgemini has developed its
own way of working, the Collaborative Business ExperienceTM, and
draws on Rightshore®, its worldwide delivery model.
Rightshore® is a trademark belonging to Capgemini

More Related Content

What's hot

Journey to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinarJourney to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinarcontinohq
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Precisely
 
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...SlideTeam
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCAmazon Web Services
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesDavid Castro
 
Digital Transformational Trends in Insurance
Digital Transformational Trends in InsuranceDigital Transformational Trends in Insurance
Digital Transformational Trends in InsuranceChristopher King
 
Optimizing XaaS
Optimizing XaaSOptimizing XaaS
Optimizing XaaSCognizant
 
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...Amazon Web Services
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseKristof Breesch
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things MicroservicesCapgemini
 
IT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for ITIT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for ITScott Bils
 
CA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change ManagementCA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change ManagementCA Technologies
 
Technical Due Diligence with AWS
Technical Due Diligence with AWSTechnical Due Diligence with AWS
Technical Due Diligence with AWSTom Laszewski
 
BusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaSBusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaSBusinessIntelligenze
 
AWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and EnterprisesAWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and EnterprisesAWS Summits
 
Optimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMOptimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMAldo Pietropaolo
 
Take the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud PlatformTake the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud PlatformCapgemini
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS OnboardingJerry Jermann
 

What's hot (20)

Journey to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinarJourney to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinar
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
 
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSC
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
 
Digital Transformational Trends in Insurance
Digital Transformational Trends in InsuranceDigital Transformational Trends in Insurance
Digital Transformational Trends in Insurance
 
Optimizing XaaS
Optimizing XaaSOptimizing XaaS
Optimizing XaaS
 
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital Enterprise
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things Microservices
 
IT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for ITIT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for IT
 
CA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change ManagementCA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change Management
 
Technical Due Diligence with AWS
Technical Due Diligence with AWSTechnical Due Diligence with AWS
Technical Due Diligence with AWS
 
BusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaSBusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaS
 
AWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and EnterprisesAWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
 
Optimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMOptimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAM
 
Take the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud PlatformTake the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud Platform
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS Onboarding
 

Similar to IAM and cybersecurity - June 15

CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...Capgemini
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...happiestmindstech
 
Cyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment reportCyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment reportChristian Nyakanyanga
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Capgemini
 
artificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdfartificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdfduribotak
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Laurent Pacalin
 
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...Amazon Web Services
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115Andrew Smart
 
Leading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech TalksLeading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech TalksAmazon Web Services
 
Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335John Enoch
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...Amazon Web Services
 
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdfCloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdfAmazon Web Services
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SVVishwas Manral
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...Amazon Web Services
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 

Similar to IAM and cybersecurity - June 15 (20)

CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Cyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment reportCyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment report
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
 
artificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdfartificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdf
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
 
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
 
Leading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech TalksLeading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech Talks
 
Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
 
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdfCloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SV
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 

More from Capgemini

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022Capgemini
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Capgemini
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Capgemini
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022Capgemini
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Capgemini
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022Capgemini
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Capgemini
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですCapgemini
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Capgemini
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Capgemini
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Capgemini
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Capgemini
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021Capgemini
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Capgemini
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Capgemini
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Capgemini
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Capgemini
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Capgemini
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020Capgemini
 

More from Capgemini (20)

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

IAM and cybersecurity - June 15

  • 2. 2Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Capgemini’s vision and mission  Cybersecurity Vision As a Global leader in IT, Capgemini’s vision on Cyber Security is to de-risk the use of information technology by making the right choices. We believe that Cybersecurity delivers business value and focuses upon things that really matters. Cybersecurity is flexible and enables the business to grow fast, but securely. Prevention, Monitoring and Detection are key, however only effective if a security baseline has been established and is defined what good looks like.  Cybersecurity Mission Our mission is to deliver the most convenient, invisible, cost effective, pragmatic and reliable cybersecurity services to run clients’ business. We are committed to constantly adapt new technologies and ways of work to improve our services and ensure continuous alignment with our clients businesses.
  • 3. 3Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Strategic Focus Points  It’s impossible to protect everything. Focus upon ‘things’ that really matters, e.g. crown jewels.  Constantly question the business value of security measures enabling an effective balance between risk, costs and benefits  Prevention without monitoring and detection is not effective and monitoring and detection is only effective when is known how good looks like.  Identity and Account lifecycle Management is the cornerstone for Cyber Security.  Cyber Security must transform from the fortress model into the airport model and a transition plan must be in place.  Outsourcing security is increasing the overall quality of security  During the transition phase, a fallback plan must be in place
  • 4. 4Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Identity & Access Management Strategy  IAM is highly ‘invisible’ for the business:  Reviews or certifications will be replaced by rules and risk scores  Compliance is an automated daily activity including remediation (continuous assurance)  Access Rights are provisioned (and de-provisioned) automatically  It’s clear for every rule which risk is mitigated by that specific rule.  Manual activities are kept to an absolute minimum (approvals etc.)  IAM is the cornerstone of Cyber Security and is configured to enables the effective use of prevention, monitoring and detection technology  Dynamic risk management (attribute and context based) is integrated in Access Management and analytics are used to dynamically determine risk levels/scores  Privileged (non personal) Accounts and managed separately.  IAM actually need to be seen as EAM (Entity Access Management)
  • 5. 5Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration To increase the effectiveness of IAM, we add the intelligence functionality to the more classic administrative and access functions IAM Systems Risk policies determine risk within each IAM function User Entity Behaviour Analytics Behaviour Analytics Engine Risk Analytic s Engine Context Risk score People -> Devices -> Location ”Identity Context” Time -> Network -> Resource SOC Asset Data ”User Behavior Context” Threat Intell Data in motion Audit Intelligence Analytics Authentication Access Authorizations Identities Administration Entitlements Identity & Entitlement Data Roles Risk Scores Context Risk Scores Entitlements
  • 6. 6Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Capgemini Approach Centralized Identity Store Self service Role management Compliance reporting Automated provisioning Policy management Authorization lifecycle Risk managementSecurity User experience Single Sign On Access management Federation Privileged accounts Identity lifecycle Review attestation
  • 7. 7Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration IAM Operational KPI’s (Examples)  # of password resets per month  Average # of distinct accounts per user (and deviations)  # of orphan accounts per system  # of unknown identities (lacking info/ ‘ownership’)  # of active identities already left the company  # of active accounts of people left the company  # of new accounts provisioned per time period  Average lead time to (de-)provision users  Average time to change user access rights  Response % regarding attestation/certification  # of exceptions generated per attestation/certification  # of reconciliation issues (for offline systems)  # of SoD conflicts  Specific Identity quality KPI’s: • E-mail lacking • No line manager • No department • Etc. etc  Risk Management KPI’s: • % of people with High Risk access level • Etc.  User Behaviour KPI.s: • Logon attemps • Last Logon’s • Out of office hours logons • Etc.etc.
  • 8. 8Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration IAM FastTrack  Do you recognize this?  Why Capgemini FastTrack?  Transforming IAM implementations  FastTrack USP’s
  • 9. 9Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Do you recognize this?  There’s a need for IAM, but due to complexity and lack of proper approach it is delayed.  No clear view on End User licenses.  Audit, regulatory and compliance is important and a huge mostly manual job.  End users are complaining about the access management processes.  On, off and through boarding processes are causing problems.  Risk Management controls must be improved.  Insight in who has got what is lacking and (thus) money is not being spend efficiently.  Responsibilities are complex to enforce because overviews are lacking.  Various Identity Sources or Directory environments are present and not synchronized
  • 10. 10Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Why Capgemini FastTrack? IAM projects are notorious when it comes to delivering on time, within budget and delivering what is required. At Capgemini, we have decided that it’s time to change! Therefore the FastTrack concept has been developed. FastTrack is about getting an overview of the ‘As-Is’ situation as soon as possible and using the actual data (facts) to determine the strategy, roadmap, business case etc.  Avoiding high costs on feasibility studies etc.  Enabling ‘in control’ rapidly and managing security risks  Determine possible cost reductions
  • 11. 11Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Transforming IAM implementations Traditional IAM program 6 weeks Engagement Policies Design Vision Validation Strategy & Roadma p Business benefits Implementation FastTrack Insight FastTrack Implementation IDaaS – Identity Governance & Administration as a Service Implementation
  • 12. 12Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration IAM FastTrack USP’s  Results in days instead of months  Delivering an IAM Business Case, Strategy and Roadmap based upon facts.  Harvesting low hanging fruit within days  Providing insight in actual access rights and active identities  Head start for any IAM project and unique opportunity to test one of the best IAM tools available  Business facing functionalities available right from the start. IAM tool is pre- configured by Capgemini.  Fixed price for 6 weeks and concrete deliverables  Unique option to use the IAM tool in the ‘As a Service’ model (pay per use)  Focusing upon the business and not upon tooling
  • 13. 13Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Unique Selling Points  IDaaS by Capgemini is unique! There are no other vendors who can deliver the entire Identity & Access Control stack in the as a Service model!  IAM FastTrack is unique! An agile IAM project approach, delivering results in days instead of months/years.  Avoiding high costs on feasibility studies, workshops etc.  Leveraging the experience and expertise of Capgemini  Business benefits are delivered within weeks! i.e. Cost Savings, end user experience etc.  Compliance reports and mitigation plans to be executed in weeks.
  • 14. The information contained in this presentation is proprietary. © 2016 Capgemini. All rights reserved. www.capgemini.com About Capgemini With more than 180,000 people in over 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2015 global revenues of EUR 11.9 billion. Together with its clients, Capgemini creates and delivers business, technology and digital solutions that fit their needs, enabling them to achieve innovation and competitiveness. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore®, its worldwide delivery model. Rightshore® is a trademark belonging to Capgemini