SlideShare a Scribd company logo
1 of 17
Turning Critical Regulatory
Findings Into Enterprise
Organizational Wins
Andrew Ames
Vice President, Identity & Access Management
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Agenda
 Regulatory Environment
 Data Explosion
 Shifting IT Landscape
 Risk Approach
 Enterprise Wins
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Meeting Today’s
Compliance Demands
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Information Explosion
• 50x… Growth in the Amount of
Enterprise Information Managed
Over the Next Decade
• 1.5X… Growth in the Number of IT
and Internal Audit Professionals,
over the same time period
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Yesterday…
Data
(applications)
Devices
People
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Yesterday…
Data
(applications)
Devices
People
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Today…
Applications
Devices
People
+ Legacy, + Cloud, + Custom
Data
(applications)
Devices
People
+ iPhone, + Android, + iPad
+ Remote, + Partners, + Customers
Identity
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
8x increase compliance mandates
Summary
50x explosion in managed data
Hybrid (disruptive) IT environment
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Still Need to Demonstrate Compliance
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Root of all Risk
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Risk Level Approach
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Wins
Improve visibility and reduce access risks
Strengthen audit controls
Spend less time/money demonstrating compliance
Improve decision making
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Win (Role Modeling)
Enterprise Roles
• Employee
• Consultant
• Student
• Vendor
Org Unit
• PO
• Surgery
• Acad. Affairs
• Pediatric
• Psych
• ITS
Fund Center
• Primary Care-East
• Accounting
• Payroll
• Infrastructure
• Security & IDM
Job Roles
• Physician
• Patient Coord.
• Payroll Clerk
• Engineer
Application Roles
• EPIC – MR Physician
• SAP – Time Administrator
• GECB – Billing Acct. Receivable
• AD – Surgery
Automation Review & Approve
• Data Driven
• Little Administration
• Little Certification
• Access Request Driven
• Potential Automation
• Periodic Certification
• Increased Approvals
• Partial Automation
• Rule Based Cert.
Goal: Move the “automation” line as far to the right as possible.
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Win (maturity for provisioning)
Average time to provision
access for new hires:
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Win - SSO
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Act Now…
© 2012 FishNet Security Inc. All rights reserved.
© 2012 FishNet Security Inc. All rights reserved.
Questions
Andrew Ames
Vice President, Identity & Access
Management
FishNet Security
andrew.ames@fishnetsecurity.com

More Related Content

What's hot

Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringEmma Kelly
 
A holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity ExcellenceA holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity ExcellenceKienbaum Consultants
 
CIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James DuthieCIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James DuthieAndrew Pryor
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyerTimmy Chou
 
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...Mediehuset Ingeniøren Live
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsPECB
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
Financial presentation
Financial presentationFinancial presentation
Financial presentation3DTechnology
 
Cts Overview 070109
Cts   Overview 070109Cts   Overview 070109
Cts Overview 070109Paula Gwyn
 
5 Biggest Risks to Effective Asset Management
5 Biggest Risks to Effective Asset Management5 Biggest Risks to Effective Asset Management
5 Biggest Risks to Effective Asset ManagementLife Cycle Engineering
 
Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...
Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...
Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...SophiaPalmira
 
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital WorkforceI Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital WorkforceRES
 
Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Jessica Legg
 

What's hot (17)

Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
A holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity ExcellenceA holistic approach to Safety and Asset Integrity Excellence
A holistic approach to Safety and Asset Integrity Excellence
 
CIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James DuthieCIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James Duthie
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyer
 
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
Sec4
Sec4Sec4
Sec4
 
)k
)k)k
)k
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and Rewards
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Financial presentation
Financial presentationFinancial presentation
Financial presentation
 
Cts Overview 070109
Cts   Overview 070109Cts   Overview 070109
Cts Overview 070109
 
5 Biggest Risks to Effective Asset Management
5 Biggest Risks to Effective Asset Management5 Biggest Risks to Effective Asset Management
5 Biggest Risks to Effective Asset Management
 
Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...
Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...
Moving Forward: Setting The Direction - A Findings Review of CTEK’s 2020 Annu...
 
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital WorkforceI Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
 
Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)
 

Similar to Turning Critical Regulatory Findings Into Enterprise Organizational Wins

Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareDelphix
 
Big data security
Big data securityBig data security
Big data securityCloudBees
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
It's Time the Data Center Gets the "Moneyball" Treatment
It's Time the Data Center Gets the "Moneyball" TreatmentIt's Time the Data Center Gets the "Moneyball" Treatment
It's Time the Data Center Gets the "Moneyball" TreatmentTeamQuest Corporation
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Amazon Web Services
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
Getting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationGetting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationPAREXEL International
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
can software eat your it problems - doug bourgeois
can software eat your it problems - doug bourgeois can software eat your it problems - doug bourgeois
can software eat your it problems - doug bourgeois scoopnewsgroup
 
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Godlan, Inc
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productivemarketingunitrends
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5techsuda
 
OneNeck Private Equity Solutions
OneNeck Private Equity SolutionsOneNeck Private Equity Solutions
OneNeck Private Equity SolutionsScott Fitzgerald
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 

Similar to Turning Critical Regulatory Findings Into Enterprise Organizational Wins (20)

Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
 
Big data security
Big data securityBig data security
Big data security
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
It's Time the Data Center Gets the "Moneyball" Treatment
It's Time the Data Center Gets the "Moneyball" TreatmentIt's Time the Data Center Gets the "Moneyball" Treatment
It's Time the Data Center Gets the "Moneyball" Treatment
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...
 
Asur 6262013
Asur 6262013Asur 6262013
Asur 6262013
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Getting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationGetting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology Innovation
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
can software eat your it problems - doug bourgeois
can software eat your it problems - doug bourgeois can software eat your it problems - doug bourgeois
can software eat your it problems - doug bourgeois
 
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5
 
OneNeck Private Equity Solutions
OneNeck Private Equity SolutionsOneNeck Private Equity Solutions
OneNeck Private Equity Solutions
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Turning Critical Regulatory Findings Into Enterprise Organizational Wins

  • 1. Turning Critical Regulatory Findings Into Enterprise Organizational Wins Andrew Ames Vice President, Identity & Access Management
  • 2. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Agenda  Regulatory Environment  Data Explosion  Shifting IT Landscape  Risk Approach  Enterprise Wins
  • 3. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Meeting Today’s Compliance Demands
  • 4. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Information Explosion • 50x… Growth in the Amount of Enterprise Information Managed Over the Next Decade • 1.5X… Growth in the Number of IT and Internal Audit Professionals, over the same time period
  • 5. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Yesterday… Data (applications) Devices People
  • 6. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Yesterday… Data (applications) Devices People
  • 7. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Today… Applications Devices People + Legacy, + Cloud, + Custom Data (applications) Devices People + iPhone, + Android, + iPad + Remote, + Partners, + Customers Identity
  • 8. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. 8x increase compliance mandates Summary 50x explosion in managed data Hybrid (disruptive) IT environment
  • 9. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Still Need to Demonstrate Compliance
  • 10. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Root of all Risk
  • 11. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Risk Level Approach
  • 12. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Enterprise Wins Improve visibility and reduce access risks Strengthen audit controls Spend less time/money demonstrating compliance Improve decision making
  • 13. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Enterprise Win (Role Modeling) Enterprise Roles • Employee • Consultant • Student • Vendor Org Unit • PO • Surgery • Acad. Affairs • Pediatric • Psych • ITS Fund Center • Primary Care-East • Accounting • Payroll • Infrastructure • Security & IDM Job Roles • Physician • Patient Coord. • Payroll Clerk • Engineer Application Roles • EPIC – MR Physician • SAP – Time Administrator • GECB – Billing Acct. Receivable • AD – Surgery Automation Review & Approve • Data Driven • Little Administration • Little Certification • Access Request Driven • Potential Automation • Periodic Certification • Increased Approvals • Partial Automation • Rule Based Cert. Goal: Move the “automation” line as far to the right as possible.
  • 14. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Enterprise Win (maturity for provisioning) Average time to provision access for new hires:
  • 15. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Enterprise Win - SSO
  • 16. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Act Now…
  • 17. © 2012 FishNet Security Inc. All rights reserved. © 2012 FishNet Security Inc. All rights reserved. Questions Andrew Ames Vice President, Identity & Access Management FishNet Security andrew.ames@fishnetsecurity.com

Editor's Notes

  1. Globalization of your business… new privacy laws you have understand and address. New federal regulations like iTAR Healthcare… HIPAA has teeth. ePHI -- Up to $1.5M in penalties per violation Insurance… many public entities but those not targeted with SOX were captured with the Model Audit Rule SAS 70 has been replaced by SSAE 16… IT Control Attestation, that also include Subservice Organization (Business Associates) INTRO THEME -- Three big challenges to today’s compliance efforts: Ever growing number of rules and regulations Explosion in data Shifting / Hybrid IT Environments
  2. Member, Customer and Partner Data Operational and Business Data Big Data… The challenge to IT Organization and specially IT Audit, is the lack of understanding of this data
  3. Shifts / fracturing of IT What IT used to be… within your 4 walls, controlled, simple desktop access, etc
  4. IT Controls… Auditors still want you to prove you have proper controls (Detective… and Preventative) The Blanket Approach 5000 employee company requiring an annual certification of user access. Each review (cert) takes 5 min. 416 hours… 10 person weeks If quarterly reviews… 1200 hours (30 person weeks)
  5. It’s typical in our customers’ environments that the high risk is represented by only 5% of the population. And addressing that 5% can actually eliminate 85% of the risk. If you just start somewhere you’re more likely to complete 85% of the work and address 5% of the risk. 5000 employee company, annual reviews -- 416 hours or 10 person weeks If quarterly reviews… 1200 hours (30 person weeks) Leveraging the Risk model, certify ONLY the high risk users (~250)… 20 hours… 3 days. Reduce the amount of “rubber stamping” and get more valid and accurate reviews
  6. Fast Forward… BI for Identity Management Where the level of risk for every user and every application is visible. Where the entire approach allows you to focus your efforts on eliminating the highest levels of risk Backup Info: If you have Gartner or Forrester subscriptions, they can help you validate this approach Our partners (auditors) also confirmed that they consider a risk-based approach superior/preferred to a blanket approach – it’s significant that the people auditing the customers are not only recommending this approach, they’re also telling us to demonstrate more use cases that further the impact of risk as a differentiator
  7. Improve visibility and reduce access risks Know who has access to what Flag high-risk users and access Align access to job responsibilities Strengthen audit controls Establish repeatable processes for reviewing access and scanning for policy violations Prioritize controls for high risk users and applications Demonstrate compliance with easy-to-use audit dashboards and reports Spend less time and money demonstrating compliance Reduce compliance costs by automating controls Maximize business user productivity by focusing on high-risk Minimize time spent generating and distributing audit reports Improve decision making Leverage business-friendly interfaces and terminology Eliminate rubber-stamping
  8. There are three goals with an Enterprise Role Model: Business Language, Visibility and Alignment (IT & Business) Usability (End User – Access Request) User Management Automation
  9. Enhance security and proactively address security threats Automatically enforce identity governance policies Dynamically assess risk impact of access changes Ensure provisioning actions are compliant Flag and prevent policy-violating requests Assign access based on job function Reduce cost of provisioning access across enterprise and cloud apps Automate access delivery for users based on HR triggers Eliminate help desk calls and improve day-one productivity Choose the best option for driving change fulfillment Empower business users with self-service Leverage e-commerce based request experience Simplify password reset and change activities