SlideShare a Scribd company logo
Business-Aligned Enterprise Security –
Driving Success in the Face of Shifting
sands in Identity & Access Management
Gavin A. Grounds
Security: Security Management
Hewlett Packard Enterprise
Global Director, Information Risk Management. Enterprise Security Services
SCX16S
@gavingrounds
#CAWorld
Abstract
The global economy continues to exponentially change and develop,
shifting the focus and importance of identity – identity of both people and
“things.” As these changes continue, the real challenge is that the
classic approaches for identity and access management and governance
are becoming less effective, yet many organizations are still struggling
with the basics. With shifts towards adaptive authentication, continuous
authentication, contextual authorization and the need for more tighter
alignment with the business so as to both facilitate and protect, this
session will discuss effective strategies for success.
Gavin A.
Grounds
Hewlett Packard
Enterprise
Global Director,
Information Risk
Management –
Enterprise Security
Services
|
Agenda
3
SIZING THE PROBLEM
SIZING THE PROBLEM – LEGACY SYSTEMS
Q&A
SIZING THE PROBLEM – PROLIFERATION OF DISRUPTIVE TECHNOLOGY
SAMPLE USE CASE – RAPID CHANGES : LEGACY PLATFORMS
STRATEGIES FOR SUCCESS – FUNDAMENTAL ISSUES
1
2
3
4
5
6
|
Sizing The Problem
Implications of Rapidly Changing & Disruptive Technology
Primary challenges
Frequent, sophisticated attacks
(limited resources, threat intelligence)1
Extension of enterprise IT
(new vulnerabilities, supplier risk)3
Traditional DC Mobility Big data Cloud
Delivery
A new type of adversary
Reactive postures, increasing regulatory
non-compliance risk, insufficient visibility,
overwhelmed and outpaced resources
Research Infiltration ExfiltrationDiscovery Capture
Governance and compliance
(limited visibility, disparate reporting)2
|
Legacy Systems Still a Key Risk Factor
Identity and Access Management – Status of “the Basics”
52% of organizations have
acknowledged the need to readdress
excessive user privilege
67% of access requests are
checked against security policies before
they are approved
88% of incidents were abuse
of privileged accounts
What the surveys
say:
60%
of organizations don’t
know how many
orphaned accounts
exist in their business27%
of organizations have re-aligned security
polices around user privilege since this
incident occurred
Yet only
of users say they cannot
remember all of their passwords
60%
|
Legacy Systems Still a Key Risk Factor
Implications of Poor Identity & Access Management
|
Decreasing Effectiveness, Increasing Risk
Exponential waves of
technology change,
disruptive innovation & new
inter-connected, real-time
business models require an
intensive shift in the
approach to identity and
privilege management of
both people and “things.”
Classic approaches are
rapidly becoming less
effective.
With shifts towards adaptive
authentication, continuous
authentication and
contextual authorization,
many organizations are still
struggling with the basics.
I&AM
Effectiveness,
Governance
& Control
Enterprise
Business
Risk
Typical
Maturity level
|
Sample Use Case – Rapid Changes : Legacy Platforms
8
Mainframe
Apps
Legacy System
User
Communities
Regulators
Audit
Compliance
Internet
Private Cloud
Public Cloud
Customers /
Citizens
(Self-service)
Employees /
Contractors
Partners
Suppliers
FSIs
Internet
Private Cloud
Public Cloud
Web Apps /
Gateways
Mobile Apps
/ Gateways
Enrichment /
Information
Sources
Internet
Private Cloud
Public Cloud
Internet
Private Cloud
Public Cloud
|
Sample Use Case – Rapid Changes : Legacy Platforms
9
Mainframe
Apps
Legacy System
User
Communities
Regulators
Audit
Compliance
Internet
Private Cloud
Public Cloud
Customers /
Citizens
(Self-service)
Employees /
Contractors
Partners
Suppliers
FSIs
Internet
Private Cloud
Public Cloud
Web Apps /
Gateways
Mobile Apps
/ Gateways
Enrichment /
Information
Sources
Internet
Private Cloud
Public Cloud
Internet
Private Cloud
Public Cloud
Lack end-to-end
(adaptive) Identity &
authorization
|
Sample Use Case – Multi-vendor IT Service & Cloud Providers
10
Mainframe
Apps
User
Communities
Regulators
Audit
Compliance
Internet
Private Cloud
Public Cloud
Customers /
Citizens
(Self-service)
Employees /
Contractors
Partners
Suppliers
FSIs
Internet
Private Cloud
Public Cloud
Web Apps /
Gateways
Mobile Apps
/ Gateways
Enrichment /
Information
Sources
Internet
Private Cloud
Public Cloud
Internet
Private Cloud
Public Cloud
IT Support
Organizations
|
Sample Use Case – Multi-vendor IT Service & Cloud Providers
11
Compliance & Risk
Issues are Exponential
|
Strategies for Success – Business-Aligned Security
Identity & Access Management
Fundamental Issues
– Exponential rapid proliferation of new and disruptive technologies
– Core identity & access management processes, policies and technology deployments not keeping pace
– Proliferation of intra- and inter-enterprise software APIs
– Lack of API security standards / practices
– Application connections assumed to be trust-worthy
– Legacy back-end technology, methodologies and processes
– Dependency on “service” or fixed process accounts
– Lack of end-to-end identity, authorization and auditability
– Actual user identity is not consistent throughout all inter- and intra-enterprise transactions
– Complex, rapidly evolving IT infrastructure and application landscapes
12
|
Strategies for Success – Business-Aligned Security
Identity & Access Management
Key Success Factors
– Don’t “Boil the Ocean…”
– “… when all you want is a cup of tea.”
– “Follow the money”
– Return on Investment & Return on Capital :: Investment in change must result in:
– New Revenue Generation;
– Cost savings;
– Avoidance of penalties;
– Avoidance of un-planned spend; or
– Any & all of the above
– Critical Business Process Mapping
– Critical business processes, to
– Critical applications and data, to
– Critical business infrastructure
– No “silver bullet” – don’t hitch the wagon to a single technology
– Choose your partners wisely
13
|
Strategies for Success – Business-Aligned Security
Identity & Access Management
Suggested Techniques
– Align Strategic Decisions Around Business Risk Priorities
– Get the Basics Right
– Effective User Provisioning
– For managing risk & security, heavier focus on de-provisioning
– Access Compliance Management
– Compliance is invariably focused on infrastructure; most audit failures
– API Gateway
– Facilitates standardization of security in new Apps, without major changes in the legacy
– Allows for rapid password reset without impacting legacy app processes, partner apps and processes, etc.
– Application layer is invariably less secure, yet is key typical attack vector
– Strategy is not about product selection
– Must accommodate acquisition, divestiture, partner & 3rd-party variations
14
| 15
|
Q & A
|
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
CA Technologies
 
Automate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactAutomate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business Impact
CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
CA Technologies
 
Foundations of the Scaled Agile Framework® : Values, Principles, Practices, ...
Foundations of the Scaled Agile Framework®: Values, Principles, Practices, ...Foundations of the Scaled Agile Framework®: Values, Principles, Practices, ...
Foundations of the Scaled Agile Framework® : Values, Principles, Practices, ...
CA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
CA Technologies
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIs
CA Technologies
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
CA Technologies
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA Technologies
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
CA Technologies
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
CA Technologies
 
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
CA Technologies
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
CA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
CA Technologies
 
Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1
CA Technologies
 
Case Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCase Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service Virtualization
CA Technologies
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
CA Technologies
 
The 21st Century Enterprise: The Future of Enterprise IT
The 21st Century Enterprise: The Future of Enterprise ITThe 21st Century Enterprise: The Future of Enterprise IT
The 21st Century Enterprise: The Future of Enterprise IT
CA Technologies
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
CA Technologies
 

What's hot (20)

Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
 
Automate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactAutomate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business Impact
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Foundations of the Scaled Agile Framework® : Values, Principles, Practices, ...
Foundations of the Scaled Agile Framework®: Values, Principles, Practices, ...Foundations of the Scaled Agile Framework®: Values, Principles, Practices, ...
Foundations of the Scaled Agile Framework® : Values, Principles, Practices, ...
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIs
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1Pre-Con Education: What's New in CA Application Performance Management 10.1
Pre-Con Education: What's New in CA Application Performance Management 10.1
 
Case Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCase Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service Virtualization
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
 
The 21st Century Enterprise: The Future of Enterprise IT
The 21st Century Enterprise: The Future of Enterprise ITThe 21st Century Enterprise: The Future of Enterprise IT
The 21st Century Enterprise: The Future of Enterprise IT
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
 

Viewers also liked

NYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern WorldNYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern World
ForgeRock
 
Penberthy
PenberthyPenberthy
Penberthy
SHORTBUS101
 
Zalando - The Big Switch - ForgeRock Identity Summit 2015
Zalando - The Big Switch - ForgeRock Identity Summit 2015Zalando - The Big Switch - ForgeRock Identity Summit 2015
Zalando - The Big Switch - ForgeRock Identity Summit 2015
Jan Löffler
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
Lumension
 
private, public and global enterprises
private, public and global enterprisesprivate, public and global enterprises
private, public and global enterprises
Sruthy Ajith
 
Bridging the gap between crm and digital marketing - in 5 steps
Bridging the gap between crm and digital marketing - in 5 stepsBridging the gap between crm and digital marketing - in 5 steps
Bridging the gap between crm and digital marketing - in 5 steps
Lars Crama
 
Bridging the gap between bricks and mortar and digital
Bridging the gap between bricks and mortar and digitalBridging the gap between bricks and mortar and digital
Bridging the gap between bricks and mortar and digital
StarTrack
 
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
CA Technologies
 
Digital Divide Bridging The Gap
Digital Divide   Bridging The GapDigital Divide   Bridging The Gap
Digital Divide Bridging The Gap
M J Caputo
 

Viewers also liked (9)

NYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern WorldNYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern World
 
Penberthy
PenberthyPenberthy
Penberthy
 
Zalando - The Big Switch - ForgeRock Identity Summit 2015
Zalando - The Big Switch - ForgeRock Identity Summit 2015Zalando - The Big Switch - ForgeRock Identity Summit 2015
Zalando - The Big Switch - ForgeRock Identity Summit 2015
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
private, public and global enterprises
private, public and global enterprisesprivate, public and global enterprises
private, public and global enterprises
 
Bridging the gap between crm and digital marketing - in 5 steps
Bridging the gap between crm and digital marketing - in 5 stepsBridging the gap between crm and digital marketing - in 5 steps
Bridging the gap between crm and digital marketing - in 5 steps
 
Bridging the gap between bricks and mortar and digital
Bridging the gap between bricks and mortar and digitalBridging the gap between bricks and mortar and digital
Bridging the gap between bricks and mortar and digital
 
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
 
Digital Divide Bridging The Gap
Digital Divide   Bridging The GapDigital Divide   Bridging The Gap
Digital Divide Bridging The Gap
 

Similar to Business-Aligned Enterprise Security – Driving Success in the Face of Shifting sands in Identity & Access Management

Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
Dynamic Case Management
Dynamic Case ManagementDynamic Case Management
Dynamic Case Management
Software AG
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
Alireza Ghahrood
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
Sharath Kumar
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
Lalith Kumar Vemali
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
happiestmindstech
 
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementActionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Enterprise Management Associates
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptx
Muhammad Khalid
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
Andrew Smart
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
Hortonworks
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
Mantala
 

Similar to Business-Aligned Enterprise Security – Driving Success in the Face of Shifting sands in Identity & Access Management (20)

Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Dynamic Case Management
Dynamic Case ManagementDynamic Case Management
Dynamic Case Management
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access ManagementActionable Guidance to Succeed in Enterprise-Class Privileged Access Management
Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptx
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Business-Aligned Enterprise Security – Driving Success in the Face of Shifting sands in Identity & Access Management

  • 1. Business-Aligned Enterprise Security – Driving Success in the Face of Shifting sands in Identity & Access Management Gavin A. Grounds Security: Security Management Hewlett Packard Enterprise Global Director, Information Risk Management. Enterprise Security Services SCX16S @gavingrounds #CAWorld
  • 2. Abstract The global economy continues to exponentially change and develop, shifting the focus and importance of identity – identity of both people and “things.” As these changes continue, the real challenge is that the classic approaches for identity and access management and governance are becoming less effective, yet many organizations are still struggling with the basics. With shifts towards adaptive authentication, continuous authentication, contextual authorization and the need for more tighter alignment with the business so as to both facilitate and protect, this session will discuss effective strategies for success. Gavin A. Grounds Hewlett Packard Enterprise Global Director, Information Risk Management – Enterprise Security Services
  • 3. | Agenda 3 SIZING THE PROBLEM SIZING THE PROBLEM – LEGACY SYSTEMS Q&A SIZING THE PROBLEM – PROLIFERATION OF DISRUPTIVE TECHNOLOGY SAMPLE USE CASE – RAPID CHANGES : LEGACY PLATFORMS STRATEGIES FOR SUCCESS – FUNDAMENTAL ISSUES 1 2 3 4 5 6
  • 4. | Sizing The Problem Implications of Rapidly Changing & Disruptive Technology Primary challenges Frequent, sophisticated attacks (limited resources, threat intelligence)1 Extension of enterprise IT (new vulnerabilities, supplier risk)3 Traditional DC Mobility Big data Cloud Delivery A new type of adversary Reactive postures, increasing regulatory non-compliance risk, insufficient visibility, overwhelmed and outpaced resources Research Infiltration ExfiltrationDiscovery Capture Governance and compliance (limited visibility, disparate reporting)2
  • 5. | Legacy Systems Still a Key Risk Factor Identity and Access Management – Status of “the Basics” 52% of organizations have acknowledged the need to readdress excessive user privilege 67% of access requests are checked against security policies before they are approved 88% of incidents were abuse of privileged accounts What the surveys say: 60% of organizations don’t know how many orphaned accounts exist in their business27% of organizations have re-aligned security polices around user privilege since this incident occurred Yet only of users say they cannot remember all of their passwords 60%
  • 6. | Legacy Systems Still a Key Risk Factor Implications of Poor Identity & Access Management
  • 7. | Decreasing Effectiveness, Increasing Risk Exponential waves of technology change, disruptive innovation & new inter-connected, real-time business models require an intensive shift in the approach to identity and privilege management of both people and “things.” Classic approaches are rapidly becoming less effective. With shifts towards adaptive authentication, continuous authentication and contextual authorization, many organizations are still struggling with the basics. I&AM Effectiveness, Governance & Control Enterprise Business Risk Typical Maturity level
  • 8. | Sample Use Case – Rapid Changes : Legacy Platforms 8 Mainframe Apps Legacy System User Communities Regulators Audit Compliance Internet Private Cloud Public Cloud Customers / Citizens (Self-service) Employees / Contractors Partners Suppliers FSIs Internet Private Cloud Public Cloud Web Apps / Gateways Mobile Apps / Gateways Enrichment / Information Sources Internet Private Cloud Public Cloud Internet Private Cloud Public Cloud
  • 9. | Sample Use Case – Rapid Changes : Legacy Platforms 9 Mainframe Apps Legacy System User Communities Regulators Audit Compliance Internet Private Cloud Public Cloud Customers / Citizens (Self-service) Employees / Contractors Partners Suppliers FSIs Internet Private Cloud Public Cloud Web Apps / Gateways Mobile Apps / Gateways Enrichment / Information Sources Internet Private Cloud Public Cloud Internet Private Cloud Public Cloud Lack end-to-end (adaptive) Identity & authorization
  • 10. | Sample Use Case – Multi-vendor IT Service & Cloud Providers 10 Mainframe Apps User Communities Regulators Audit Compliance Internet Private Cloud Public Cloud Customers / Citizens (Self-service) Employees / Contractors Partners Suppliers FSIs Internet Private Cloud Public Cloud Web Apps / Gateways Mobile Apps / Gateways Enrichment / Information Sources Internet Private Cloud Public Cloud Internet Private Cloud Public Cloud IT Support Organizations
  • 11. | Sample Use Case – Multi-vendor IT Service & Cloud Providers 11 Compliance & Risk Issues are Exponential
  • 12. | Strategies for Success – Business-Aligned Security Identity & Access Management Fundamental Issues – Exponential rapid proliferation of new and disruptive technologies – Core identity & access management processes, policies and technology deployments not keeping pace – Proliferation of intra- and inter-enterprise software APIs – Lack of API security standards / practices – Application connections assumed to be trust-worthy – Legacy back-end technology, methodologies and processes – Dependency on “service” or fixed process accounts – Lack of end-to-end identity, authorization and auditability – Actual user identity is not consistent throughout all inter- and intra-enterprise transactions – Complex, rapidly evolving IT infrastructure and application landscapes 12
  • 13. | Strategies for Success – Business-Aligned Security Identity & Access Management Key Success Factors – Don’t “Boil the Ocean…” – “… when all you want is a cup of tea.” – “Follow the money” – Return on Investment & Return on Capital :: Investment in change must result in: – New Revenue Generation; – Cost savings; – Avoidance of penalties; – Avoidance of un-planned spend; or – Any & all of the above – Critical Business Process Mapping – Critical business processes, to – Critical applications and data, to – Critical business infrastructure – No “silver bullet” – don’t hitch the wagon to a single technology – Choose your partners wisely 13
  • 14. | Strategies for Success – Business-Aligned Security Identity & Access Management Suggested Techniques – Align Strategic Decisions Around Business Risk Priorities – Get the Basics Right – Effective User Provisioning – For managing risk & security, heavier focus on de-provisioning – Access Compliance Management – Compliance is invariably focused on infrastructure; most audit failures – API Gateway – Facilitates standardization of security in new Apps, without major changes in the legacy – Allows for rapid password reset without impacting legacy app processes, partner apps and processes, etc. – Application layer is invariably less secure, yet is key typical attack vector – Strategy is not about product selection – Must accommodate acquisition, divestiture, partner & 3rd-party variations 14
  • 15. | 15
  • 17. | For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15