Chris Niggel | Okta Director Security & Compliance
Accelerating Transformation with
Identity
October 2018
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Photo Credit: https://upload.wikimedia.org/wikipedia/commons/2/22/Bodiam_Castle_south.jpg
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Image: http://thedailywtf.com/images/remy/robotguys.png
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta ConfidentialPhoto credit: https://www.flickr.com/photos/egfocus/7419859084
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
People Technology
Applications
Devices
Wearables
IoT
Anything
Partners
Contractors
Anyone
Customers
Employees
Identity
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Response
Policy
Engine
Rule Based
Risk Based
Context
Device
User
Location
Network
App
Response
History
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Okta Verify
with Push
SMSYubiKeyOkta Verify OTP
PIV/CAC
okta confidential 13
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Accelerating Information with Identity

Accelerating Information with Identity

Editor's Notes

  • #3 What is your mission, and how has it changed over the years? Every organization is now impacted by technology Images: https://www.flickr.com/photos/26254305@N08/15751860326 http://www.navy.mil/view_image.asp?id=23565 https://www.flickr.com/photos/departmentofenergy/29386413180/
  • #4 Our solution to the problem was to build walls and secrets. We viewed information security like building a castle. Moat to cross in the form of a firewall, with a VPN forming our drawbridge. Secret passwords to open the gate through our 3-foot-thick stone walls, and we moved all of our corporate data inside of this fortress Soon, we were trapped within our network. Sure, things were secure, but all this security was painful for employees. Mobile devices became a force of change against us
  • #5 So, as we forced users to have complex passwords, with multiple letters, numbers, symbols, our users put them on post-it notes, and re-used the same password across personal and corporate sites.
  • #6 When we found passwords were not strong enough, we deployed multifactor tokens, that had to be carried around everywhere we went. Of course, if you left your token on your desk, and the boss wanted that critical report done by the morning, you were stuck. So users put their multifactor token in front of a webcam!
  • #7 As technology progressed, and cloud services took off,I struggled to keep our data within the castle walls, implementing filtering at the firewall. But it was a losing battle - employees just used different services.
  • #8 Now, our castle is in the middle of a city Customer, partners all collaborators
  • #9 Employees not graded on security, they have other tasks to do. Therefore, they are always going to follow the path of least resistance.
  • #12 Traditional authentication can’t scale with todays applications, usage, and need. When we put identity at the center, we are able to shit to contextual authentication. We gain new information feeds that can be used to build risk-based authentication. As an admin you can take your organizations authentication experience to the next level. Traditional authentication leverages passwords as the primary authentication factor. The shortfalls of passwords have been well documented. Strong on convience and familiarity, passwords offer protection from a determined attacker. As part of building out our response to eliminate passwords while improving the user experience, admins can leverage our contextual access policies to , if not eliminate passwords to at least make them optional
  • #14 By centralizing identity, we take away this complexity, speeding adoption of new technologies and gaining the ability to place security where it adds the most value.
  • #15 When we provide services to our constituents, we have to face the same problems – how to ensure secure access to services without creating a barrier to entry https://www.flickr.com/photos/aarongustafson/63773435
  • #16 Handing off identity allows you to focus on your mission.
  • #17 Thank you!