SlideShare a Scribd company logo
1 of 21
Multi Factor Authentication for Z
Steven Ringelberg
Vanguard Integrity Professionals
go2vanguard.com
About Vanguard
Founded: 1986
Business: Cybersecurity Experts for Large Enterprises
Software, Professional Services,
and Training
Customers: 1,000+ Worldwide
Over 20 distributors/resellers serving 50+ countries worldwide
3
Data Breaches
Number of breaches and
outside attacks increasing
Continuing problem of insiders -
malicious or by accident
4
“Target was certified as meeting the standard
for payment card industry (PCI DSS) in
September 2013. Nonetheless, we suffered a
data breach…”
now ex-chairman, ex-president, and ex-CEO of Target
Corporation, Gregg Steinhafel (http://buswk.co/1lT9j0X)
6
Data Breaches
Logica and Nordea Bank Mainframe
breached in April 2013
7
Data Breaches
Others:
Home Depot
Staples
Anthem Health Insurance
7
Data Breaches: Two Themes
Mandiant: 2014 Data Breach Report
100% of breaches examined included an
exploitation of a user id and password that was
compromised.
7
MULTI FACTOR AUTHENTICATION
• An Industry full of often
confused terms
– Multi-Factor Authentication is a
method of requiring factors from the
following three categories;
• Knowledge Factors
• Possession Factors
• Inherence Factors
MULTI FACTOR AUTHENTICATION
– Two-Factor Authentication
– Two-Step Verification
– Strong Authentication
MULTI FACTOR AUTHENTICATION
– Knowledge Factors
• Password
• PIN Number
• Mothers Maiden Name
• Favorite Potato Chip
MULTI FACTOR AUTHENTICATION
– Possession Factors
• Disconnected (RSA, ActivID, etc)
– Sequence-Based Tokens – Singular
button, multiple depresses
– Time-Based Tokens – Change Every ‘x’
Seconds typically
– Challenge-Based Tokens – Small keypad
to enter challenge code
– Mobile Phones
» Soft Token
» SMS one-time password
MULTI FACTOR AUTHENTICATION
– Possession Factors
• Connected
– Magnetic Strip – ATM Card, etc
– Contacts – SmartCard, EMV Credit
Cards,
– USB – zPDT Key, RSA SecureID800,
– Wireless – RFID, Bluetooth,
Proximity
– Other – Audio Port, iButtons, etc
MULTI FACTOR AUTHENTICATION
– Possession Factors
• Connected
– Magnetic Strip – ATM Card, etc
– Contacts – SmartCard, EMV Credit
Cards,
– USB – zPDT Key, RSA SecureID800,
– Wireless – RFID, Bluetooth,
Proximity
– Other – Audio Port, iButtons, etc
MULTI FACTOR AUTHENTICATION
–Inherence Factors
• Fingerprint
• Hand Topography
• Eye (Iris)
MULTI FACTOR AUTHENTICATION
Exposure Issues
– Phishing/Man-In-The-Middle
– Malware
– Session Hijacking
– Lost/Stolen
MULTI FACTOR AUTHENTICATION
Exposure Issues
• Coding Flaws – Exposures in the Code of the applications,
protocols, or other
Example: Attackers Exploit the Heartbleed OpenSSL
Vulnerability to Circumvent Multi-factor Authentication on
VPNs http://www.pcworld.com/article/2095860/cybercriminals-compromise-home-
routers-to-attack-online-banking-users.html
• http://www.darkreading.com/attacks-and-breaches/zeus-
botnet-eurograbber-steals-$47-million/d/d-id/1107673?
• http://www.technologyreview.com/news/415371/real-time-
hackers-foil-two-factor-security/
• http://www.scmagazine.com/yahoo-session-hijacking-likely-
culprit-of-android-spam/article/250454/
• https://www.mandiant.com/blog/attackers-exploit-heartbleed-
openssl-vulnerability-circumvent-multifactor-authentication-
vpns/
MULTI FACTOR AUTHENTICATION
• US based Regulation and Guidance
– NIST FIPS 201/HSPD-12
– HIPPA
– NERC CIP
– NIST SP 800-63-2
– PCI DSS
– FFIEC
Vendors – Multi Factor and Z
Vanguard Integrity Professionals.
• Physical Tokens – Vanguard ez/Token
• “soft” Tokens – Vanguard Tokenless
• “Smart Cards” a/k/a “PIV Cards” a/k/a “CAC
Cards”
33
Vanguard
Software
We provide you with the analytical tools that allows you to do an in-depth audit of
your z/OS systems against multiple standards
 Provides detailed explanation, risk analysis, user action to correct
Services
We will execute z/OS system audits against multiple standards
 We will also remediate
Training
 We will train you how to audit z/OS systems against multiple standards
 We will also train you to remediate
33
Questions?
35
For more information
Call 800-794-0014 or email us at info@go2vanguard.com
Grazie
Japanese
Thank You
English
Merci
French
Russian
Danke
German
Italian
Gracias
Spanish
Obrigado
Brazilian Portuguese
Arabic
Simplified Chinese
Traditional Chinese
Hindi
Thai
Korean
37

More Related Content

Similar to Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Professionals).pptx

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...Andris Soroka
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access ControlAdrian Young
 

Similar to Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Professionals).pptx (20)

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Loqr
LoqrLoqr
Loqr
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access Control
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Professionals).pptx

  • 1. Multi Factor Authentication for Z Steven Ringelberg Vanguard Integrity Professionals go2vanguard.com
  • 2. About Vanguard Founded: 1986 Business: Cybersecurity Experts for Large Enterprises Software, Professional Services, and Training Customers: 1,000+ Worldwide Over 20 distributors/resellers serving 50+ countries worldwide 3
  • 3. Data Breaches Number of breaches and outside attacks increasing Continuing problem of insiders - malicious or by accident 4
  • 4. “Target was certified as meeting the standard for payment card industry (PCI DSS) in September 2013. Nonetheless, we suffered a data breach…” now ex-chairman, ex-president, and ex-CEO of Target Corporation, Gregg Steinhafel (http://buswk.co/1lT9j0X) 6
  • 5. Data Breaches Logica and Nordea Bank Mainframe breached in April 2013 7
  • 7. Data Breaches: Two Themes Mandiant: 2014 Data Breach Report 100% of breaches examined included an exploitation of a user id and password that was compromised. 7
  • 8. MULTI FACTOR AUTHENTICATION • An Industry full of often confused terms – Multi-Factor Authentication is a method of requiring factors from the following three categories; • Knowledge Factors • Possession Factors • Inherence Factors
  • 9. MULTI FACTOR AUTHENTICATION – Two-Factor Authentication – Two-Step Verification – Strong Authentication
  • 10. MULTI FACTOR AUTHENTICATION – Knowledge Factors • Password • PIN Number • Mothers Maiden Name • Favorite Potato Chip
  • 11. MULTI FACTOR AUTHENTICATION – Possession Factors • Disconnected (RSA, ActivID, etc) – Sequence-Based Tokens – Singular button, multiple depresses – Time-Based Tokens – Change Every ‘x’ Seconds typically – Challenge-Based Tokens – Small keypad to enter challenge code – Mobile Phones » Soft Token » SMS one-time password
  • 12. MULTI FACTOR AUTHENTICATION – Possession Factors • Connected – Magnetic Strip – ATM Card, etc – Contacts – SmartCard, EMV Credit Cards, – USB – zPDT Key, RSA SecureID800, – Wireless – RFID, Bluetooth, Proximity – Other – Audio Port, iButtons, etc
  • 13. MULTI FACTOR AUTHENTICATION – Possession Factors • Connected – Magnetic Strip – ATM Card, etc – Contacts – SmartCard, EMV Credit Cards, – USB – zPDT Key, RSA SecureID800, – Wireless – RFID, Bluetooth, Proximity – Other – Audio Port, iButtons, etc
  • 14. MULTI FACTOR AUTHENTICATION –Inherence Factors • Fingerprint • Hand Topography • Eye (Iris)
  • 15. MULTI FACTOR AUTHENTICATION Exposure Issues – Phishing/Man-In-The-Middle – Malware – Session Hijacking – Lost/Stolen
  • 16. MULTI FACTOR AUTHENTICATION Exposure Issues • Coding Flaws – Exposures in the Code of the applications, protocols, or other Example: Attackers Exploit the Heartbleed OpenSSL Vulnerability to Circumvent Multi-factor Authentication on VPNs http://www.pcworld.com/article/2095860/cybercriminals-compromise-home- routers-to-attack-online-banking-users.html • http://www.darkreading.com/attacks-and-breaches/zeus- botnet-eurograbber-steals-$47-million/d/d-id/1107673? • http://www.technologyreview.com/news/415371/real-time- hackers-foil-two-factor-security/ • http://www.scmagazine.com/yahoo-session-hijacking-likely- culprit-of-android-spam/article/250454/ • https://www.mandiant.com/blog/attackers-exploit-heartbleed- openssl-vulnerability-circumvent-multifactor-authentication- vpns/
  • 17. MULTI FACTOR AUTHENTICATION • US based Regulation and Guidance – NIST FIPS 201/HSPD-12 – HIPPA – NERC CIP – NIST SP 800-63-2 – PCI DSS – FFIEC
  • 18. Vendors – Multi Factor and Z Vanguard Integrity Professionals. • Physical Tokens – Vanguard ez/Token • “soft” Tokens – Vanguard Tokenless • “Smart Cards” a/k/a “PIV Cards” a/k/a “CAC Cards” 33
  • 19. Vanguard Software We provide you with the analytical tools that allows you to do an in-depth audit of your z/OS systems against multiple standards  Provides detailed explanation, risk analysis, user action to correct Services We will execute z/OS system audits against multiple standards  We will also remediate Training  We will train you how to audit z/OS systems against multiple standards  We will also train you to remediate 33
  • 21. For more information Call 800-794-0014 or email us at info@go2vanguard.com Grazie Japanese Thank You English Merci French Russian Danke German Italian Gracias Spanish Obrigado Brazilian Portuguese Arabic Simplified Chinese Traditional Chinese Hindi Thai Korean 37