Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Tetris and your IAM
Program
April 12th, 2015
Steve Tout @stevetout
Forte Advisory @forteadvisory
@ s t e v e t o u t @ f o r t e a d v i s o r y
About Me…
 Entrepreneur, analyst, investor,
troublemaker and introvert
 ...
@ s t e v e t o u t @ f o r t e a d v i s o r y
The Game
Boundaries
Current move
Current circumstances
Competitor Competit...
# c o r p o r a t i s m @ s t e v e t o u t @ f o r t e a d v i s o r y
“The Game” Explained
Tetris
• Boundaries
• Current...
My dad was right all along.
It’s how you hold your mouth.
# S h i t M y D a d S a y s @ s t e v e t o u t @ f o r t e a d ...
# B e a s t M o d e @ s t e v e t o u t @ f o r t e a d v i s o r y
Reinvent Yourself
Should I A: Go back to slangin' dope...
Invest In Yourself
• Your philosophy
• Your relationships
• Your attitude
• Your family
• Your priorities
• Your character...
Rethink Your Strategy
@ s t e v e t o u t @ f o r t e a d v i s o r y
Your Business
• Data breach costs
jumped 23% in two years
• Productivity l...
@ s t e v e t o u t @ f o r t e a d v i s o r y
Challenges with Managing IAM
• A hodgepodge of identity provisioning syste...
Economic Impact on User Productivity
KPI Description Pre Transformation Post Transformation Impact
Total time spent loggin...
Identity Coherence
# I d e n t i t y C o h e r e n c e @ s t e v e t o u t @ f o r t e a d v i s o r y
A logical framework...
Transform The Business
The Cloud Is Secure – Half of IT 100 Will Disappear
# w e h a v e w o r k d t o d o @ s t e v e t o u t @ f o r t e a d v ...
Try Purchase Use Engage
Customer Journey - The effects of IAM transformation
Acting
Doing
Thinking
Feeling
Overall
Downloa...
Cloud IAM Components
IdP (ID Bridge)
• Identity provisioning
• Bi-Directional Sync
• Protocol translation (STS)
• Social i...
Your SOC In The Cloud
Cloud Access
Security Broker
• Policy enforcement point
• On-prem or cloud-based proxy
• Data encryp...
The Identity Defined Security Alliance
Achieving the scale, security & governance
of identity and accelerating the vision ...
We need more alliances!
# S t e v e T o u t M a t c h m a k e r @ s t e v e t o u t @ f o r t e a d v i s o r y
Call to action…
• Create the G-Child
• Expand your Identity
Coherence canvas
• Form new alliances
• Above all, have fun!
@...
Tetris and your IAM Program
Tetris and your IAM Program
Tetris and your IAM Program
Upcoming SlideShare
Loading in …5
×

Tetris and your IAM Program

408 views

Published on

IAM through the lens of game theory. Is your IAM game over or is it stuck on infinite loop?

Rethinking your strategy.

Transform the business

Cloud IAM components

SOC in the cloud

Identity defined security alliance

Data breaches in 2015

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Tetris and your IAM Program

  1. 1. Tetris and your IAM Program April 12th, 2015 Steve Tout @stevetout Forte Advisory @forteadvisory
  2. 2. @ s t e v e t o u t @ f o r t e a d v i s o r y About Me…  Entrepreneur, analyst, investor, troublemaker and introvert  15+ years in enterprise IAM: PwC, VMware, Oracle, US Bank, AT&T Wireless  Advisor to high tech startups  Founder & Principal of Forte Advisory Mostly well adjusted California boy living in the Northwest by way of wedlock Beatrice
  3. 3. @ s t e v e t o u t @ f o r t e a d v i s o r y The Game Boundaries Current move Current circumstances Competitor Competitor Competitor Clock Score Your next move Position Garbage
  4. 4. # c o r p o r a t i s m @ s t e v e t o u t @ f o r t e a d v i s o r y “The Game” Explained Tetris • Boundaries • Current circumstances • Current move • Next move • Competitors • Position • Score • Clock • Garbage You • Cubicles • Politics • Damned if you do • Damned if you don’t • Colleagues • Org chart • Pay check • Is it 5:00 yet? • Performance reviews
  5. 5. My dad was right all along. It’s how you hold your mouth. # S h i t M y D a d S a y s @ s t e v e t o u t @ f o r t e a d v i s o r y
  6. 6. # B e a s t M o d e @ s t e v e t o u t @ f o r t e a d v i s o r y Reinvent Yourself Should I A: Go back to slangin' dope? Or should I B: Maintain and try to cope? Or should I C: Just get crazy and wild? But no I chose D: Create the G-Child Do You See, by Warren G
  7. 7. Invest In Yourself • Your philosophy • Your relationships • Your attitude • Your family • Your priorities • Your character • Your skills • Your knowledge • Your communication • Your brand # i n v e s t i n y o u r s e l f @ s t e v e t o u t @ f o r t e a d v i s o r y For economic safety in the future, you must invest in developing and enhancing the following: Learn to work harder on yourself than you do on your job. If you work hard on your job you’ll make a living, if you work hard on yourself you can make a fortune. – Jim Rohn, Living An Exceptional Life
  8. 8. Rethink Your Strategy
  9. 9. @ s t e v e t o u t @ f o r t e a d v i s o r y Your Business • Data breach costs jumped 23% in two years • Productivity loss in $10s of millions annually • Customer attrition • Fines & litigation • Loss of IP • Customer & employee expectation of privacy • Brand damage • Susceptible to phishing and social engineering • Lack of skilled professionals • Politics undermine success • Legacy systems increases risk • Interoperability often lacking • Shadow IT • Emerging technologies coming at accelerated pace o IoT o Micro-services o Big data • Complexity still a problem Economic Social Technological
  10. 10. @ s t e v e t o u t @ f o r t e a d v i s o r y Challenges with Managing IAM • A hodgepodge of identity provisioning systems and processes • End-of-life systems that need to be retired • Provisioning that is embedded into applications • Dependency on expensive legacy SOA frameworks • Lack of a uniform and efficient way to audit provisioning systems • Inconsistent policy enforcement across a disparate provisioning landscape • A lack of executive sponsorship
  11. 11. Economic Impact on User Productivity KPI Description Pre Transformation Post Transformation Impact Total time spent logging into various enterprise applications each day 30 seconds 10 seconds Reduce time spent on login by 66% Total time spent logging into various applications per year (using 230 working days) 115 hours 38 hours Reduce time spent on login by 77 hours annually per user Average hourly rate $75/hr $75/hr Number of users affected 16000 16000 @ s t e v e t o u t @ f o r t e a d v i s o r y ($75 x 39 hours) x 16000 employees = $92.5M redirected through productivity enhancements alone
  12. 12. Identity Coherence # I d e n t i t y C o h e r e n c e @ s t e v e t o u t @ f o r t e a d v i s o r y A logical framework for composing holistic and integrated… • IAM solutions that identify and authorize users within the right context • Integrated GRC solutions that reduce risk and automates compliance • Approaches for automating common administrative tasks for operational efficiency • Plans for organizational alignment and business transformation through innovation in IAM architecture, strategy, integrations and program management How wide is your canvas?
  13. 13. Transform The Business
  14. 14. The Cloud Is Secure – Half of IT 100 Will Disappear # w e h a v e w o r k d t o d o @ s t e v e t o u t @ f o r t e a d v i s o r y http://bit.ly/1HAzpCE http://bit.ly/1HAzmGS
  15. 15. Try Purchase Use Engage Customer Journey - The effects of IAM transformation Acting Doing Thinking Feeling Overall Downloading trial software Register contact profile Activate account with 2-Step registration Online checkout Contact Sales Click to chat Buy more licenses Activate a new service subscription Become a enterprise customer Install & register software Manage On-prem to cloud Migrate AD to cloud/SaaS portal Delegate administration Promote user to Admin role Register for Support Forums Contact Support Register for Conference Become a partner Do I have to register to download this? Does my login ID from 2 years ago still work? Does my cloud login work for this? Is this a global ID? Do I login in order to obtain a license or activate my subscription? Will tenant cloud know who I am or do I have to register again? How will I sync or migrate my users to tenant cloud? Do I use my local account or my enterprise credentials to login to cloud? How will I login to tenant cloud? How can I assign access to others within my organization? Can I audit who has access to my tenant? Does my enterprise login ID work for support? Do I have to register a new account for conference attendance? How do I access my Partner content? Consistent messaging & UI and central Login builds confidence and trust Enterprise respected my privacy and did not ask for too much information My authentication experience is the same now as it was during Trial Eval I have visibility into new products and services that my identity is allowed to see and purchase Happy that Enterprise recognizes my global ID and credentials across all of its products and services Enterprise provides me with the tools I need to monitor and manage my users Excited that the enterprise really knows me and correctly identifies me in every context of interaction I will recommend to my colleagues based on my experiences Trust Helpfulness Trust Helpfulness Trust Helpfulness Trust Helpfulness @ s t e v e t o u t @ f o r t e a d v i s o r y
  16. 16. Cloud IAM Components IdP (ID Bridge) • Identity provisioning • Bi-Directional Sync • Protocol translation (STS) • Social identity integration • Identity correlation & aggregation • A secure proxy layer for AD IDaaS • Identity as a service (SaaS) • Pre-integrated with popular SaaS vendors • Cloud directory service • Authoritative source of identity • Policy enforcement point @ s t e v e t o u t @ f o r t e a d v i s o r y
  17. 17. Your SOC In The Cloud Cloud Access Security Broker • Policy enforcement point • On-prem or cloud-based proxy • Data encryption & tokenization • Enforce DLP policies • User behavior analytics Risk & Threat Services • Behavioral & threat analytics • Machine learning • Security configuration management • Predictive analytics • Automated incident response @ s t e v e t o u t @ f o r t e a d v i s o r y
  18. 18. The Identity Defined Security Alliance Achieving the scale, security & governance of identity and accelerating the vision of the digitally transformed enterprise through alliances and pre-integrated solutions # I d D e f S e c u r i t y @ s t e v e t o u t @ f o r t e a d v i s o r y https://www.pingidentity.com/en/lp/ids-alliance.html
  19. 19. We need more alliances! # S t e v e T o u t M a t c h m a k e r @ s t e v e t o u t @ f o r t e a d v i s o r y
  20. 20. Call to action… • Create the G-Child • Expand your Identity Coherence canvas • Form new alliances • Above all, have fun! @ s t e v e t o u t @ f o r t e a d v i s o r y Join me in January at the Seattle Cloud Security MeetUp http://www.meetup.com/Seattle-Cloud- Security-Meetup

×