SlideShare a Scribd company logo
1 of 20
Download to read offline
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
Your partner
in secure digital
transformation
CLOUD MATURITY WORKSHOP
Dan Thormodsgaard, CTO
2
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
2
AGENDA
• CLOUD MATURITY WORKSHOP
• BUILDING BLOCKS
• CLOUD STRATEGY
• GOVERNANCE
• ARCHITECTURE
• VALIDATION
• OPERATIONALIZE
• USE CASE
• SHORT TERM OBJECTIVES
• LONG TERM OBJECTIVES
3
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
3
FISHTECH APPROACH
STRATEGY
OPERATIONS
ARCHITECTURE
GOVERNANCE
IMPLEMENTATION
VALIDATION
Cloud Strategy – Collaborate with our
customer to develop a comprehensive
strategy
Cloud Governance – Map
Organizational Governance
Program to Cloud Strategy
Cloud Architecture – Provide
Multi Cloud Architecture based on
Governance Objectives
Validation – Utilize lab to ensure interoperability, right solution
Implementation – Develop a
execution strategy with short
term and long term objectives
Operations – CYDERES
solutions help Operationalize
Cloud Strategy and Governance
4
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
4
CLOUD DISCOVERY METHODOLOGY
Methodology
- Service definition
• Automation and provisioning
- Discovery
• Detail of current state
- Develop target state
• Gaps analysis of people, process and technology
- Feasibility study
• Tool cost, skill set gaps and process refinement
- Execution strategy
• Execute Plan
5
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
5BUILDING BLOCKS
SERVICE MODEL
SPONSORSHIP/EXECUTIVE
SUPPORT
CLOUD
VISIBILITY
DATA SECURITY BUSINESS CRITICAL
APPLICATIONS
THREAT
PROTECTION
COMPLIANCE
OBJECTIVES
OPERATING MODEL
PEOPLE PROCESS TECHNOLOGY
Executives Management
Human Resources Legal
SOC Analysts Security Architecture
Network Architecture Application Architecture
Security Operations Network Operations
Application Operations Compliance
RACI Model Incident Management
POC/Deployment Operational
Procurement Access Controls
Data Lifecycle Change Management
Monitoring SLAs
Metrics BC/DR
AWS Ticketing
CMDB SIEM
CASB APIs
Visibility Security Controls
Infrastructure Encryption/Tokenization
Application Security Monitoring Tools
CLOUD
6
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
6
CLOUD STRATEGY
Problem Statements:
- We have 800 SaaS Applications (that we know of)
- CEO/CIO/CTO "Cloud First”
- Data Center Migration to IaaS (Lift & Shift)
- No Defined Cloud Strategy
- Lack of Cost Control
- Gaps in Cloud IAM Strategy
- Visibility Challenges
- DevOps Teams
- Where do we start
- We need training
7
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
7
CLOUD STRATEGY
Target Capabilities:
- Business enablement
- Cost governance
- Configuration management
- Competitive advantage
- Application Onboarding Process
- Maintain Compliance
- Hybrid Cloud
- Build DevSecOps
- Automation orchestration and provisioning
- Develop Cloud IAM Strategy
- Cloud Program Manager
- Develop Target Architecture
- IT Collaboration
- Business Alignment
- Maintain Compliance
- Reduce Risk
- Availability
- Operationalize Cloud
- Education
8
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
8
CLOUD STRATEGY
Use Cases:
- SaaS
• Unsanctioned Applications
• Governance
- IaaS
• What application
• AWS, GCP, Azure
• Cost
- PaaS
• DevOps
• CI/CD
9
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
9
CLOUD GOVERNANCE
Compliance & Standards:
- Map Compliance Standards to CSA CCM
- Develop Cloud Standards
- Map Cloud Compliance & Standards to
requirements
Data Governance:
- Data Classifications
- DLP
- Data Tagging
- Data Lakes
10
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
10
CLOUD GOVERNANCE
IAM Governance
4 Pillars
IAM
Identity Access
Governance (IAG)
Privilege Access
Management (PAM)
Access
Management (AM)
Multi Factor
Authentication
(MFA)
11
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
11
CLOUD REFERENCE ARCHITECTURE
REMOTE END USERS
Mobile Device Management (MDM)
Endpoint Detection & Response (EDR)
Threat, Phishing & Forensics
DLP, Data Tagging & Encryption
End Point Protection (EPP)
CASB/SWG (Secure Web Gateway)
DLP- SaaS, PaaS, IaaS
Advanced Threat Protection
Session Highjack Protection
Encryption
Sandboxing
Malware Protection
IdAM
IdP Federation
MFA
SSO
PAM
IGA
SaaS
Office 365
Netsuite
Salesforce
Concur
Zoom
DATA CENTER / BRANCH
FW
WAF
IPS
SSLi
EPP/EDR
Logging
Alerting
Forensics
Threat Detection & Response
AZURE
FW
WAF
EPP/EDR
Logging
Alerting
GCP
FW
WAF
EPP/EDR
Logging
Alerting
Forensics
Threat Detection & Response
AWS
FW
WAF
EPP/EDR
Logging
Alerting
Forensics
Threat Detection & Response
12
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
12
CLOUD VALIDATION
Validate Capabilities:
- SDWAN
- Develop testing requirements
- Test against metrics
- Security Controls in the Cloud
Branch Office
DC2
DC1
INTERNET
WEB GATEWAY
MPLS
CASB
SaaS
IaaS
PaaS
B2B
13
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
13
ATTESTATION &
CERTIFICATION
ROLE MANAGEMENT
CLOUD PROVISIONING
DEVELOPMENT &
MONITORING
WORKFLOW & ACCESS
OPERATIONALIZE IDM
• Create and configure access rule sets
• Design and manage workflow requests: approvers, notifications
• Customization to environment (scripting, code updates, connectors, adapter modification)
• Monitor IDM health, error logs, processing and environment connections
• Scripting language and membership group provisioning
• Manage request policy process
• Create and develop role management, role mining and role rules
• Create rule sets, manage request process, SME for role governance
• Manage certification review, application integration, SoD library, SoD rule sets
• Develop, create application design reviews, file feed, data management, scheduling
14
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
14
CLOUD OPERATIONS
SOC/NOC Integration:
- Cloud Management Platforms
• Security & Compliance
• Cost Management
• Metrics & Alerting
- Test against metrics
- Security Controls in the Cloud
- Security Logging & Alerting
• Session High Jacking
• Threat Intelligence
• Analytics
15
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
15
SHORT TERM & LONG TERM OBJECTIVES
16
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
16
SHORT TERM OBJECTIVES
Develop a Cloud Strategy
Governance & Standards
- CSA and NIST
- Data Governance
- Develop Cloud Standards
- Sanction Applications
Cloud Deployment Models & Maturity
Model
- SaaS, PaaS, IaaS, Hybrid
Develop Target Architecture that maps to
controls
Training & Education
- Cloud architecture competencies
- Cloud certifications
Cloud Benefit Analysis
- On premise vs cloud
- Cost considerations
- Agility
Connectivity Review
- Performance hub
- SDWAN
- End user experience
17
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
17
SHORT TERM OBJECTIVES
IDM Objectives
- Heavy manual quarterly review
attestations
- Directory domains and forests alignment
- Centralized password management
- High-level access audit, logging and
management provisioning
- Role management and role governance
Target Capabilities
- Business governance
- Identity governance
- Compliance and risk
- Scalability
- Reconciliation
- Privilege account management
- Ease of deployment
- Configuration
- Automation provisioning
18
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
18
SHORT TERM OBJECTIVES
SaaS
APPLICATION
SANCTIONING
§ Execution Strategy
§ Review:
⁃ API Gateway
⁃ Align CASB Requirements
⁃ IAM Dependencies
⁃ Encryption Dependencies
⁃ Sanctioned and Unsanctioned
applications
⁃ DLP Dependencies
⁃ Certificate Lifecycle Dependencies
⁃ Logging and Alerting Dependencies
⁃ SD-WAN Dependencies
§ Defined process to onboarding sanctioned
applications
§ Visibility for SaaS applications
§ Role-based application controls
§ Data Loss Prevention safeguards
§ Develop IdAM execution strategy
§ Smarter and shorter application turn up time
§ Encryption standards
§ Define Bring Your Own Keys (BYOK)
§ Define SD-WAN integration requirements
§ Define certificate lifecycle management
§ Define Managed Detection and Response (MDR)
§ Incident Response (IR)
RESULTS
«
19
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
19
LONG TERM OBJECTIVES
HYBRID CLOUD
STRATEGY
§ Private, Public, Hybrid Cloud & Data
Center
§ DevOps
§ Security Stack in the cloud
§ Redefining Boundaries
§ API Driven Architecture
§ Data Center Automation Orchestration
§ Micro-segmentation
§ Cloud and Data Center connectivity
§ IdAM for IaaS. PaaS
§ Office 365, and other SaaS applications
§ Develop Private, Public, Hybrid Cloud & Data
Center target architecture
§ DevOps CI/CD Process and tools
§ Develop requirements and execution strategy
⁃ Cloud security stack
⁃ Unified security stack
⁃ Data center automation, orchestration &
provisioning
⁃ Micro-segmentation requirements & execution
strategy
⁃ Performance Hub requirements
⁃ IdAM PaaS & IaaS
⁃ Cloud Management Platform (CMP)
⁃ Security & Compliance, Logging, Alerting,
Metrics,
Cost Management
RESULTS
«
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
Your partner
in secure digital
transformation
Q&A

More Related Content

Similar to Sept MN Cloud Security Alliance Chapter - Cloud Maturity Presentation

Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
Secure HR Platform for Utilities
Secure HR Platform for Utilities Secure HR Platform for Utilities
Secure HR Platform for Utilities Bhupesh Chaurasia
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to businessMark Albala
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Oracle Developers
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA Argentina
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data DATAVERSITY
 
Digital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the CloudDigital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the CloudAmazon Web Services
 
Enterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdfEnterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdfandy282535
 
Building Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source TechnologiesBuilding Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source TechnologiesCatarina Reis
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docxhjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docxsalmonpybus
 

Similar to Sept MN Cloud Security Alliance Chapter - Cloud Maturity Presentation (20)

Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Secure HR Platform for Utilities
Secure HR Platform for Utilities Secure HR Platform for Utilities
Secure HR Platform for Utilities
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to business
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
 
Digital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the CloudDigital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the Cloud
 
Enterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdfEnterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdf
 
Building Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source TechnologiesBuilding Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docxhjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 

Sept MN Cloud Security Alliance Chapter - Cloud Maturity Presentation

  • 1. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. Your partner in secure digital transformation CLOUD MATURITY WORKSHOP Dan Thormodsgaard, CTO
  • 2. 2 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 2 AGENDA • CLOUD MATURITY WORKSHOP • BUILDING BLOCKS • CLOUD STRATEGY • GOVERNANCE • ARCHITECTURE • VALIDATION • OPERATIONALIZE • USE CASE • SHORT TERM OBJECTIVES • LONG TERM OBJECTIVES
  • 3. 3 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 3 FISHTECH APPROACH STRATEGY OPERATIONS ARCHITECTURE GOVERNANCE IMPLEMENTATION VALIDATION Cloud Strategy – Collaborate with our customer to develop a comprehensive strategy Cloud Governance – Map Organizational Governance Program to Cloud Strategy Cloud Architecture – Provide Multi Cloud Architecture based on Governance Objectives Validation – Utilize lab to ensure interoperability, right solution Implementation – Develop a execution strategy with short term and long term objectives Operations – CYDERES solutions help Operationalize Cloud Strategy and Governance
  • 4. 4 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 4 CLOUD DISCOVERY METHODOLOGY Methodology - Service definition • Automation and provisioning - Discovery • Detail of current state - Develop target state • Gaps analysis of people, process and technology - Feasibility study • Tool cost, skill set gaps and process refinement - Execution strategy • Execute Plan
  • 5. 5 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 5BUILDING BLOCKS SERVICE MODEL SPONSORSHIP/EXECUTIVE SUPPORT CLOUD VISIBILITY DATA SECURITY BUSINESS CRITICAL APPLICATIONS THREAT PROTECTION COMPLIANCE OBJECTIVES OPERATING MODEL PEOPLE PROCESS TECHNOLOGY Executives Management Human Resources Legal SOC Analysts Security Architecture Network Architecture Application Architecture Security Operations Network Operations Application Operations Compliance RACI Model Incident Management POC/Deployment Operational Procurement Access Controls Data Lifecycle Change Management Monitoring SLAs Metrics BC/DR AWS Ticketing CMDB SIEM CASB APIs Visibility Security Controls Infrastructure Encryption/Tokenization Application Security Monitoring Tools CLOUD
  • 6. 6 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 6 CLOUD STRATEGY Problem Statements: - We have 800 SaaS Applications (that we know of) - CEO/CIO/CTO "Cloud First” - Data Center Migration to IaaS (Lift & Shift) - No Defined Cloud Strategy - Lack of Cost Control - Gaps in Cloud IAM Strategy - Visibility Challenges - DevOps Teams - Where do we start - We need training
  • 7. 7 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 7 CLOUD STRATEGY Target Capabilities: - Business enablement - Cost governance - Configuration management - Competitive advantage - Application Onboarding Process - Maintain Compliance - Hybrid Cloud - Build DevSecOps - Automation orchestration and provisioning - Develop Cloud IAM Strategy - Cloud Program Manager - Develop Target Architecture - IT Collaboration - Business Alignment - Maintain Compliance - Reduce Risk - Availability - Operationalize Cloud - Education
  • 8. 8 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 8 CLOUD STRATEGY Use Cases: - SaaS • Unsanctioned Applications • Governance - IaaS • What application • AWS, GCP, Azure • Cost - PaaS • DevOps • CI/CD
  • 9. 9 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 9 CLOUD GOVERNANCE Compliance & Standards: - Map Compliance Standards to CSA CCM - Develop Cloud Standards - Map Cloud Compliance & Standards to requirements Data Governance: - Data Classifications - DLP - Data Tagging - Data Lakes
  • 10. 10 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 10 CLOUD GOVERNANCE IAM Governance 4 Pillars IAM Identity Access Governance (IAG) Privilege Access Management (PAM) Access Management (AM) Multi Factor Authentication (MFA)
  • 11. 11 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 11 CLOUD REFERENCE ARCHITECTURE REMOTE END USERS Mobile Device Management (MDM) Endpoint Detection & Response (EDR) Threat, Phishing & Forensics DLP, Data Tagging & Encryption End Point Protection (EPP) CASB/SWG (Secure Web Gateway) DLP- SaaS, PaaS, IaaS Advanced Threat Protection Session Highjack Protection Encryption Sandboxing Malware Protection IdAM IdP Federation MFA SSO PAM IGA SaaS Office 365 Netsuite Salesforce Concur Zoom DATA CENTER / BRANCH FW WAF IPS SSLi EPP/EDR Logging Alerting Forensics Threat Detection & Response AZURE FW WAF EPP/EDR Logging Alerting GCP FW WAF EPP/EDR Logging Alerting Forensics Threat Detection & Response AWS FW WAF EPP/EDR Logging Alerting Forensics Threat Detection & Response
  • 12. 12 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 12 CLOUD VALIDATION Validate Capabilities: - SDWAN - Develop testing requirements - Test against metrics - Security Controls in the Cloud Branch Office DC2 DC1 INTERNET WEB GATEWAY MPLS CASB SaaS IaaS PaaS B2B
  • 13. 13 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 13 ATTESTATION & CERTIFICATION ROLE MANAGEMENT CLOUD PROVISIONING DEVELOPMENT & MONITORING WORKFLOW & ACCESS OPERATIONALIZE IDM • Create and configure access rule sets • Design and manage workflow requests: approvers, notifications • Customization to environment (scripting, code updates, connectors, adapter modification) • Monitor IDM health, error logs, processing and environment connections • Scripting language and membership group provisioning • Manage request policy process • Create and develop role management, role mining and role rules • Create rule sets, manage request process, SME for role governance • Manage certification review, application integration, SoD library, SoD rule sets • Develop, create application design reviews, file feed, data management, scheduling
  • 14. 14 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 14 CLOUD OPERATIONS SOC/NOC Integration: - Cloud Management Platforms • Security & Compliance • Cost Management • Metrics & Alerting - Test against metrics - Security Controls in the Cloud - Security Logging & Alerting • Session High Jacking • Threat Intelligence • Analytics
  • 15. 15 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 15 SHORT TERM & LONG TERM OBJECTIVES
  • 16. 16 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 16 SHORT TERM OBJECTIVES Develop a Cloud Strategy Governance & Standards - CSA and NIST - Data Governance - Develop Cloud Standards - Sanction Applications Cloud Deployment Models & Maturity Model - SaaS, PaaS, IaaS, Hybrid Develop Target Architecture that maps to controls Training & Education - Cloud architecture competencies - Cloud certifications Cloud Benefit Analysis - On premise vs cloud - Cost considerations - Agility Connectivity Review - Performance hub - SDWAN - End user experience
  • 17. 17 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 17 SHORT TERM OBJECTIVES IDM Objectives - Heavy manual quarterly review attestations - Directory domains and forests alignment - Centralized password management - High-level access audit, logging and management provisioning - Role management and role governance Target Capabilities - Business governance - Identity governance - Compliance and risk - Scalability - Reconciliation - Privilege account management - Ease of deployment - Configuration - Automation provisioning
  • 18. 18 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 18 SHORT TERM OBJECTIVES SaaS APPLICATION SANCTIONING § Execution Strategy § Review: ⁃ API Gateway ⁃ Align CASB Requirements ⁃ IAM Dependencies ⁃ Encryption Dependencies ⁃ Sanctioned and Unsanctioned applications ⁃ DLP Dependencies ⁃ Certificate Lifecycle Dependencies ⁃ Logging and Alerting Dependencies ⁃ SD-WAN Dependencies § Defined process to onboarding sanctioned applications § Visibility for SaaS applications § Role-based application controls § Data Loss Prevention safeguards § Develop IdAM execution strategy § Smarter and shorter application turn up time § Encryption standards § Define Bring Your Own Keys (BYOK) § Define SD-WAN integration requirements § Define certificate lifecycle management § Define Managed Detection and Response (MDR) § Incident Response (IR) RESULTS «
  • 19. 19 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 19 LONG TERM OBJECTIVES HYBRID CLOUD STRATEGY § Private, Public, Hybrid Cloud & Data Center § DevOps § Security Stack in the cloud § Redefining Boundaries § API Driven Architecture § Data Center Automation Orchestration § Micro-segmentation § Cloud and Data Center connectivity § IdAM for IaaS. PaaS § Office 365, and other SaaS applications § Develop Private, Public, Hybrid Cloud & Data Center target architecture § DevOps CI/CD Process and tools § Develop requirements and execution strategy ⁃ Cloud security stack ⁃ Unified security stack ⁃ Data center automation, orchestration & provisioning ⁃ Micro-segmentation requirements & execution strategy ⁃ Performance Hub requirements ⁃ IdAM PaaS & IaaS ⁃ Cloud Management Platform (CMP) ⁃ Security & Compliance, Logging, Alerting, Metrics, Cost Management RESULTS «
  • 20. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. Your partner in secure digital transformation Q&A