SlideShare a Scribd company logo
1 of 20
Download to read offline
How to Address GDPR, Phishing and
Shadow IT with a Robust IAM Strategy
Michael Newman
CEO, My1Login
Adrian Romano
Information Security Manager, Betsson Group
“Global Leader in
Identity Management”
IAM Award International Contribution
to Cyber Security
IAM Solution
of The Year
Best Identity
Management Solution
Best Cloud Computing
Security Solution
Identity & Access Management
for Web, Mobile & Thick-Client Apps
Eliminate GDPR fines, Phishing and Shadow IT – With One Move!
Agenda
1. Enterprise IAM Challenges
2. Case Study: Betsson Group - Key IAM Challenges
Adrian Romano, Info Security Manager, Betsson Group
3. Critical Considerations for your IAM
4. Case Study: Betsson Group - Business Benefits
Adrian Romano, Info Security Manager, Betsson Group
5. 6 Take-Away Actions
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Nobody Wants a Data Breach on Their Watch
65% of Corporate Data Breaches
are Due to Passwords*
*Source : Verizon Corporate Data Breach Report
Most Identity & Access Management Solutions Don’t Work with All Apps
If a User Needs More than one Business Password then they don’t have Single Sign-On
Hacking & Phishing Breaches are
Growing Rapidly
GDPR & Invalidation of ”Safe
Harbour” compliance issues
Source : Identity Theft Resource Centre
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Expenses
Active Directory Training
Appraisals
Unknown Apps
Unknown Apps
Thick Client Apps ie. RDP
ie. mainframe
Shadow IT
Unknown Apps
Unknown Apps
Identity Sprawl due to Disparate Application Types
Web Apps, Mobile Apps, Thick-client Apps, Flash Apps, Virtualised Apps, I-Frame, Bespoke In-House Apps
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
The Causes of Data Breaches
65% 40%
Weak Passwords &
Weak Practices
25%
Phishing
of data breaches are
caused by employee
passwords
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Insecure User Password Practices
• Storing in spreadsheets
• On mobile phone
• Dropbox
• Using personal password managers
• Choosing weak passwords
• Using personal passwords for business apps
• Sharing passwords via email and live chat
Productivity Decrease
Security Risks:-
Insider Threat
Phishing Attacks
Shadow IT
Compliance Failure
PCI, ICO, FCA, ISO
GDPR – fines of up to 4% of T/O
Betsson Group’s Business Challenge
Business Impact
!
Adrian Romano,
Information Security Manager
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Key Areas to Consider in Your IAM Strategy
•Minimising Implementation Effort
•Simplifying Set-up & On-boarding
•Integrating Non-Standard Applications (e.g. thick-client executables)
•Simplifying User Experience to Maximise Adoption
•Understanding the Importance of Encryption Architecture (Client vs
Server)
•Addressing GDPR
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
IAM Considerations
• Detects ”Shadow IT” and puts IT back in control of cloud apps
• Automatically links Identities for cloud apps to the corresponding AD User
• Make simple policy decisions to integrate or exclude these from the IAM i.e. for
included apps, User will benefit from SSO next time they access they app.
Use an IAM that can “Auto-Discover” the Apps Being Accessed by Users
and Automatically Integrate these with Single Sign-On
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
IAM Considerations
• Ensure your IAM covers all applications – even Mainframes, Terminal &
RDP etc.
• Uniform, seamless login for all apps linked to users AD profile
• Puts the organisation in control of all corporate identities
Don’t Forget the Legacy and Thick-Client Desktop
Executables
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
IAM Considerations
• Takes password management out of the hands of
users –places the business in control
• Pro-actively protects cloud apps with random, high-
entropy passwords
• Users no longer need to know their passwords –
they are linked to the IAM and their AD profile.
Ensure your IAM can ELIMINATE PHISHING risks – How?
By Enabling Policies to be set that Auto-update Passwords on Target Apps
(and hide these passwords from users)
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
User Experience Options
• Choose between seamless UX, portal UX or hybrid UX for IAM based on preferences
• Roll out IAM company-wide using AD Group Policies
Seamless User Experience
No Portal, User Launches Apps As Usual – IAM
Authenticates
Portal User Experience
Offer Users An App Portal for Web and Thick Client Apps
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
IAM Considerations
AES Encryption – The Maths
The Maths
THAT’S = 3.7 billion, billion, billion, billion, billion, billion YEARS
Data is impossible to access without the encryption key
Encryption Key is 32 Bytes Long
Each Byte could be one of 256 values
Try to Brute Force?
= 25632 = approximately 116 x 1075 tries to attempt all combinations
Use a Super-computer?
Super-computer (i.e. Tianhe-2 running at 33 petaflops) tries
approx 1015 guesses per second
= 116x1075 = 116 x 1060 seconds
1015
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
IAM Considerations
Encryption Architecture is Paramount – AES 256 is great but it MUST be Client-Side
IAM/IDaaS Vendor (Cloud) Enterprise Environment/ Active Directory
IAM Using Server-Side Encryption
(Most Vendor’s Approach)
On-Premise IAM & Encryption
(Customer Hosted Approach)
IAM Using Client-Side Encryption
(My1Login’s Approach)
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Reference GDPR Requirement How My1Login Addresses
Chapter 2
Principles
Article 5
Clause 2
The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1
(‘accountability’).
My1Login provides an audit trail of who has access to what and when, and
enables organisations to identify which users accessed which systems, providing
accountability for actions.
Chapter 2
Principles
Article 5
Clause 1 (f)
Personal data shall be:
processed in a manner that ensures appropriate security of the personal data, including protection
against unauthorised or unlawful processing and against accidental loss, destruction or damage,
using appropriate technical or organisational measures (‘integrity and confidentiality’).
My1Login ensures access to data is protected by strong authentication. Only
permitted employees have access.
Chapter 4
Controller &
Processor
Article 25
Clause 2
The controller shall implement appropriate technical and organisational measures for ensuring
that, by default, only personal data which are necessary for each specific purpose of the
processing are processed. That obligation applies to the amount of personal data collected, the
extent of their processing, the period of their storage and their accessibility. In particular, such
measures shall ensure that by default personal data are not made accessible without the
individual’s intervention to an indefinite number of natural persons.
My1Login ensures data is only accessible by permitted employees.
Chapter 4
Controller &
Processor
Article 32
Clause 1a
“the controller and the processor shall implement appropriate technical and organisational
measures to ensure”….
The pseudonymisation and encryption of personal data;
My1Login’s client-side encryption ensures that encryption keys are kept
separately from the pseudonymised (i.e. encrypted) data.
Chapter 4
Controller &
Processor
Article 32
Clause 1b
The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing
systems and services;
Access to personal data must be restricted to a defined purpose and with IAM,
organisations can limit the access on to people who are serving this purpose.
Chapter 4
Controller &
Processor
Article 32
Clause 4
The controller and processor shall take steps to ensure that any natural person acting under the
authority of the controller or the processor who has access to personal data does not process
them except on instructions from the controller, unless he or she is required to do so by Union or
Member State law.
While My1Login can give only permitted users access to systems, it can’t judge
that users’ intention when executing their access right. However, the
implementation of My1Login can help address the challenges by restricting the
number of users entitled to access the personal data and provide an audit trail of
that access, enabling the controller and processer to much more capable of
ensuring that users are only processing the data on instruction.
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Wholly-European Based Identity Provider
Integrates with Legacy Apps (i.e. Mainframes)
Auto-Detects and Integrates Any Web App
Seamless Integration with AD
CLIENT-SIDE 256-bit AES Encryption
Rapid Deployment (i.e. 10,000 Users in 1 Day)
How My1Login Solves the Problem
UK’s leading IAM Provider and Computing
Security’s IAM Solution of The Year
Identity as a Service
The Ideal SSO Solution
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
17
Some of Our Customers
Public Sector Utilities Financial Retail
Broadcasting Gaming Construction
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
18
Award Winning
Multi-award Winning Solution
Most Secure
Client-side Encryption
Most Widely-Compatible
Single Sign-on that integrates with Web Apps, Mobile Apps, Legacy Thick-client Apps, Virtualised Apps, Flash Apps
Best User Experience
Can be Deployed in Background – Seamless UX for Users
Why My1Login?
#1
#1
#1
#1
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Business Benefits of My1Login’s IAM
• Saves up to 1hr Per Week Per User
• Significant reduction in admin effort
• Easy to use – no training required.
• Audit trail of user access to applications
• AES-256 encryption satisfies PCI
• Evidence role-based access control for
applications.
PRODUCTIVITY COMPLIANCE
• Eliminated weak passwords
• Eliminated insecure password sharing
• Context-based user access
• SSO without revealing credentials
• Instantly revoke application access
from one place.
SECURITY
Migrating Identity Architecture to the Cloud
Adrian Romano,
Information Security Manager
Eliminate GDPR fines, Phishing and Shadow IT – With One Move!
Take-away Actions
1. Data must be encrypted at rest – not good enough anymore!! MUST USE CLIENT-SIDE ENCRYPTION
2. Ensure your vendor can integrate ALL apps – legacy, thick-client, virtualised, web, mobile
3. ELIMINATE SHADOW-IT by Auto-Detecting Apps – puts the Business Back in Control of Cloud Apps
4. Use an IAM or IDaaS that can pro-actively update target app passwords and hide these from users to
ELIMINATE PHISHING RISKS
5. Consider IAM vendor sovereignty AS WELL AS data residency
If a User Needs More than one Business Password then they don’t have Single Sign-
On
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
© My1Login Ltd 2007 - 2018
Visit us at Stand W742 or Stand N324
Looking for more advice?
Speak to our Identity Experts on W742
0800 0443091 IAMadvice@my1login.com
Thank You and Questions
“Global Leader in
Identity Management”
IAM Award International Contribution
to Cyber Security
IAM Solution
of The Year
Best Identity
Management Solution
Best Cloud Computing
Security Solution

More Related Content

What's hot

Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enBalázs Antók
 
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...Jürgen Ambrosi
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1Anne Starr
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 

What's hot (20)

Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Topic11
Topic11Topic11
Topic11
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 

Similar to How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy

LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021Bruce Ma
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerDigital Transformation EXPO Event Series
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxBluechipComputerSyst
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_referencesMaarten Werff
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentationJason Newell
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfHajeJanKamps
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 

Similar to How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy (20)

LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptx
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentation
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 

More from Digital Transformation EXPO Event Series

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingDigital Transformation EXPO Event Series
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Digital Transformation EXPO Event Series
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Digital Transformation EXPO Event Series
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningDigital Transformation EXPO Event Series
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Digital Transformation EXPO Event Series
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryDigital Transformation EXPO Event Series
 

More from Digital Transformation EXPO Event Series (20)

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
 
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile EraThe Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
 
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
 
Lean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science teamLean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science team
 
Top 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real WorldTop 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real World
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
 
Data Science Is More Than Just Statistics
Data Science Is More Than Just StatisticsData Science Is More Than Just Statistics
Data Science Is More Than Just Statistics
 
Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform
 
The convergence of Data Science and Software Development
The convergence of Data Science and Software DevelopmentThe convergence of Data Science and Software Development
The convergence of Data Science and Software Development
 
The future impact of AI in cybercrime
The future impact of AI in cybercrimeThe future impact of AI in cybercrime
The future impact of AI in cybercrime
 
Digital Innovation in Medical Gases
Digital Innovation in Medical GasesDigital Innovation in Medical Gases
Digital Innovation in Medical Gases
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industry
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy

  • 1. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy Michael Newman CEO, My1Login Adrian Romano Information Security Manager, Betsson Group “Global Leader in Identity Management” IAM Award International Contribution to Cyber Security IAM Solution of The Year Best Identity Management Solution Best Cloud Computing Security Solution Identity & Access Management for Web, Mobile & Thick-Client Apps
  • 2. Eliminate GDPR fines, Phishing and Shadow IT – With One Move! Agenda 1. Enterprise IAM Challenges 2. Case Study: Betsson Group - Key IAM Challenges Adrian Romano, Info Security Manager, Betsson Group 3. Critical Considerations for your IAM 4. Case Study: Betsson Group - Business Benefits Adrian Romano, Info Security Manager, Betsson Group 5. 6 Take-Away Actions
  • 3. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Nobody Wants a Data Breach on Their Watch 65% of Corporate Data Breaches are Due to Passwords* *Source : Verizon Corporate Data Breach Report Most Identity & Access Management Solutions Don’t Work with All Apps If a User Needs More than one Business Password then they don’t have Single Sign-On Hacking & Phishing Breaches are Growing Rapidly GDPR & Invalidation of ”Safe Harbour” compliance issues Source : Identity Theft Resource Centre
  • 4. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Expenses Active Directory Training Appraisals Unknown Apps Unknown Apps Thick Client Apps ie. RDP ie. mainframe Shadow IT Unknown Apps Unknown Apps Identity Sprawl due to Disparate Application Types Web Apps, Mobile Apps, Thick-client Apps, Flash Apps, Virtualised Apps, I-Frame, Bespoke In-House Apps
  • 5. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 The Causes of Data Breaches 65% 40% Weak Passwords & Weak Practices 25% Phishing of data breaches are caused by employee passwords
  • 6. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Insecure User Password Practices • Storing in spreadsheets • On mobile phone • Dropbox • Using personal password managers • Choosing weak passwords • Using personal passwords for business apps • Sharing passwords via email and live chat Productivity Decrease Security Risks:- Insider Threat Phishing Attacks Shadow IT Compliance Failure PCI, ICO, FCA, ISO GDPR – fines of up to 4% of T/O Betsson Group’s Business Challenge Business Impact ! Adrian Romano, Information Security Manager
  • 7. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Key Areas to Consider in Your IAM Strategy •Minimising Implementation Effort •Simplifying Set-up & On-boarding •Integrating Non-Standard Applications (e.g. thick-client executables) •Simplifying User Experience to Maximise Adoption •Understanding the Importance of Encryption Architecture (Client vs Server) •Addressing GDPR
  • 8. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 IAM Considerations • Detects ”Shadow IT” and puts IT back in control of cloud apps • Automatically links Identities for cloud apps to the corresponding AD User • Make simple policy decisions to integrate or exclude these from the IAM i.e. for included apps, User will benefit from SSO next time they access they app. Use an IAM that can “Auto-Discover” the Apps Being Accessed by Users and Automatically Integrate these with Single Sign-On
  • 9. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 IAM Considerations • Ensure your IAM covers all applications – even Mainframes, Terminal & RDP etc. • Uniform, seamless login for all apps linked to users AD profile • Puts the organisation in control of all corporate identities Don’t Forget the Legacy and Thick-Client Desktop Executables
  • 10. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 IAM Considerations • Takes password management out of the hands of users –places the business in control • Pro-actively protects cloud apps with random, high- entropy passwords • Users no longer need to know their passwords – they are linked to the IAM and their AD profile. Ensure your IAM can ELIMINATE PHISHING risks – How? By Enabling Policies to be set that Auto-update Passwords on Target Apps (and hide these passwords from users)
  • 11. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 User Experience Options • Choose between seamless UX, portal UX or hybrid UX for IAM based on preferences • Roll out IAM company-wide using AD Group Policies Seamless User Experience No Portal, User Launches Apps As Usual – IAM Authenticates Portal User Experience Offer Users An App Portal for Web and Thick Client Apps
  • 12. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 IAM Considerations AES Encryption – The Maths The Maths THAT’S = 3.7 billion, billion, billion, billion, billion, billion YEARS Data is impossible to access without the encryption key Encryption Key is 32 Bytes Long Each Byte could be one of 256 values Try to Brute Force? = 25632 = approximately 116 x 1075 tries to attempt all combinations Use a Super-computer? Super-computer (i.e. Tianhe-2 running at 33 petaflops) tries approx 1015 guesses per second = 116x1075 = 116 x 1060 seconds 1015
  • 13. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 IAM Considerations Encryption Architecture is Paramount – AES 256 is great but it MUST be Client-Side IAM/IDaaS Vendor (Cloud) Enterprise Environment/ Active Directory IAM Using Server-Side Encryption (Most Vendor’s Approach) On-Premise IAM & Encryption (Customer Hosted Approach) IAM Using Client-Side Encryption (My1Login’s Approach)
  • 14. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Reference GDPR Requirement How My1Login Addresses Chapter 2 Principles Article 5 Clause 2 The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’). My1Login provides an audit trail of who has access to what and when, and enables organisations to identify which users accessed which systems, providing accountability for actions. Chapter 2 Principles Article 5 Clause 1 (f) Personal data shall be: processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’). My1Login ensures access to data is protected by strong authentication. Only permitted employees have access. Chapter 4 Controller & Processor Article 25 Clause 2 The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual’s intervention to an indefinite number of natural persons. My1Login ensures data is only accessible by permitted employees. Chapter 4 Controller & Processor Article 32 Clause 1a “the controller and the processor shall implement appropriate technical and organisational measures to ensure”…. The pseudonymisation and encryption of personal data; My1Login’s client-side encryption ensures that encryption keys are kept separately from the pseudonymised (i.e. encrypted) data. Chapter 4 Controller & Processor Article 32 Clause 1b The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; Access to personal data must be restricted to a defined purpose and with IAM, organisations can limit the access on to people who are serving this purpose. Chapter 4 Controller & Processor Article 32 Clause 4 The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law. While My1Login can give only permitted users access to systems, it can’t judge that users’ intention when executing their access right. However, the implementation of My1Login can help address the challenges by restricting the number of users entitled to access the personal data and provide an audit trail of that access, enabling the controller and processer to much more capable of ensuring that users are only processing the data on instruction.
  • 15. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Wholly-European Based Identity Provider Integrates with Legacy Apps (i.e. Mainframes) Auto-Detects and Integrates Any Web App Seamless Integration with AD CLIENT-SIDE 256-bit AES Encryption Rapid Deployment (i.e. 10,000 Users in 1 Day) How My1Login Solves the Problem UK’s leading IAM Provider and Computing Security’s IAM Solution of The Year Identity as a Service The Ideal SSO Solution
  • 16. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 17 Some of Our Customers Public Sector Utilities Financial Retail Broadcasting Gaming Construction
  • 17. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 18 Award Winning Multi-award Winning Solution Most Secure Client-side Encryption Most Widely-Compatible Single Sign-on that integrates with Web Apps, Mobile Apps, Legacy Thick-client Apps, Virtualised Apps, Flash Apps Best User Experience Can be Deployed in Background – Seamless UX for Users Why My1Login? #1 #1 #1 #1
  • 18. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Business Benefits of My1Login’s IAM • Saves up to 1hr Per Week Per User • Significant reduction in admin effort • Easy to use – no training required. • Audit trail of user access to applications • AES-256 encryption satisfies PCI • Evidence role-based access control for applications. PRODUCTIVITY COMPLIANCE • Eliminated weak passwords • Eliminated insecure password sharing • Context-based user access • SSO without revealing credentials • Instantly revoke application access from one place. SECURITY Migrating Identity Architecture to the Cloud Adrian Romano, Information Security Manager
  • 19. Eliminate GDPR fines, Phishing and Shadow IT – With One Move! Take-away Actions 1. Data must be encrypted at rest – not good enough anymore!! MUST USE CLIENT-SIDE ENCRYPTION 2. Ensure your vendor can integrate ALL apps – legacy, thick-client, virtualised, web, mobile 3. ELIMINATE SHADOW-IT by Auto-Detecting Apps – puts the Business Back in Control of Cloud Apps 4. Use an IAM or IDaaS that can pro-actively update target app passwords and hide these from users to ELIMINATE PHISHING RISKS 5. Consider IAM vendor sovereignty AS WELL AS data residency If a User Needs More than one Business Password then they don’t have Single Sign- On
  • 20. How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy © My1Login Ltd 2007 - 2018 Visit us at Stand W742 or Stand N324 Looking for more advice? Speak to our Identity Experts on W742 0800 0443091 IAMadvice@my1login.com Thank You and Questions “Global Leader in Identity Management” IAM Award International Contribution to Cyber Security IAM Solution of The Year Best Identity Management Solution Best Cloud Computing Security Solution