1
Intelligent Identity and Access Governance
Deter, Detect, and Remediate Breaches Before Business Loss
Tuesday, December 8, 2015Venkat Rajaji, VP Product Management
Chris Sullivan, GM Intelligence/Analytics
2
What you do is important!
1982 2008 2013
3
10x Market
All Use Cases – Highest CS – Delivering on intelligent IGA
4
Deter, Detect &
Remediate Access Risk
with Speed, Efficiency
& Efficacy
5
What are we talking about??????
 IGA – Identity and access governance
 IAM – Identity and access management
 IDM – Identity management
 I-* – Intelligent *
 Identity
 Access
 Governance
 Intelligence
6
So what’s the problem?
7
of breaches used compromised accounts
8
Days that accounts were found to be
compromised in breach investigations
9
of budgets are spent on the perimeter
10
This leaves a burning need for
11
Root Cause
Problem Area
 Real Risk
 Regulatory Risk
Treatment
 IPS
 SEIM
 Firewalls
 AV
Access Control
 Information
 Processes
12
Access is Complicated…
 Identity
 Accounts
 Entitlements
 Roles
 Applications
13
Separation of Duties
14
Privileged Access
15
The Complexity Challenge
POLICIES
RESOURCES
ACTIVITIES
RIGHTS
IDENTITIES
PROVISIONING
GOVERNANCE
Identities Resources Rights Policy Activity Total
16
High
Months
or Never
The OODA (Speed) Chasm
PROVISIONING
GOVERNANCE
Low
Days
Observe Orient
Act Decide
Observe Orient
Act Decide
17
The Management Gap
18
“By year-end 2020, identity analytics and
intelligence (IAI) tools will deliver direct
business value in 60% of enterprises, up
from <5% today.”
Intelligent IAM
19
• Access (Cyber) Intelligence/Analytics
ACSC
20
A Short but Important Tangent
IMPACT LIKELIHOODRISK
21
22
Access Insight™ = Value in Hours
 Reduces Attack Surface
• Large US bank
 3,435 active accounts have never been used
 640 SoD violations
 53 administrative accounts for
terminated staff
• Similar findings:
 Insurance
 Retail
 Healthcare
 Detects and Disrupts Before Loss
23
The New OODA Chasm
PROVISIONING
GOVERNANCE
Low
Days
Observe Orient
Act Decide
Low
Minutes
High
Fidelity
Observe Orient
Act Decide
Continuous Process Improvement
24
Chris Sullivan
GM, Intelligence/Analytics
csullivan@Courion.com
Venkat Rajaji
VP, Product Management/Marketing
vrajaji@Courion.com

Detect, Deter, and Remediate Cyber Risk

Editor's Notes

  • #2 We all know what IGA is. How about Intelligence? - One definition is: Intelligence is like teenage sex.. lot's of people talk'n bout it, not a lot of people doin it.. even fewer doin it well. We think about it like a data driven decision systems. Think air traffic controls.. On a typical day, 40MM people are floating in small metal tubes over London and they have never run into each other. This is not something that humans can do. What happens if that data driven decision engine stops? Plan B, manual, is slow and scary
  • #3 This is why we are so passionate about this stuff. It’s not just data, it’s process.. It is physical. RSA – national security Target – money Sony – Guardians of Peace (probably NC) – more than a year. Extortion. Asymmetric AM – they hacked one of their competitors. TSP – 1982 3KT TNT. – access to SCADA 2008 – Russia invade Georgia – access to key governmental systems 1 hr before tanks rolled. Iranian nuclear facility – Stuxnet – 21 Jan 2013. – Access to SCADA
  • #4 Right now we are in the IGA space and we’re pretty good at it. “Access Assurance Suite was the only product to consistently perform well across every product scenario within this Magic Quadrant's evaluation criteria, in contrast with the other vendors' products that each had poor results in several of the evaluated product scenarios.” Reference customers reported satisfaction with the product, and support is among the highest of all vendors evaluated. All reference customers indicated that they were highly likely to recommend the product to others. “Its uniquely differentiated marketing message emphasizes analytics for "intelligent" IAM and resonates with customers and prospects“
  • #5 What are we really trying to accomplish.
  • #6 If ur not from this industry, there’s lots of buzz words. Think about the meaning and ask… Identity – associated with a role or a need… Intelligence – brain enhancement – like air traffic control.
  • #7 Beaches that use compromised accounts
  • #8 Beaches that use compromised accounts
  • #9 Days that accounts were found to be compromised in breach investigations
  • #10 Spent on protecting the perimeter.
  • #11 There is a burning need for intelligent IGA but…
  • #16 Regulations require us to provision the minimum necessary access and then review that on the order of months to years. Operating. But if you consider the problem.. Who has access to what, how did they get that access, what are they accessing? When? There’s trillions of changing relationships to consider. And hackers take days.. 16 in the case of RSA. 12 in the case of target. According to the speaker notes, the median company here is about 5000.. Anyone in that range?
  • #17 They are so far inside our ooda loop that most times we only find out when someone else tells us.. You get a call from the NSA that says we just found joint strike fighter designs on a PC in china or from the FBI that says someone just posted a block of 70 million high quality credit cards and the one thing that they have in common is that they were used at Target.
  • #18 No Access Management Discipline (Look up KPI for dummies and use examples like networks). Good quotes on KPIs
  • #20 Clockwise from 3 o’clock. Bottom: Real data warehouse and data scientist. Real BI tool (UX for large, complex data sets). Top IGA domain expertise Cyber domain expertise w/ ACSC (http://www.acscenter.org/) to harden our own defences and to gain domain expertise to feed into AI
  • #22 Make the connections View business risk in an intuitive visual format Drill-down to understand identify & access issues creating risk Click to evaluate & remediate
  • #23 Let’s talk about the magnitude of what this means.. Just to give you an idea of the narrative. Continuous, Comprehensive, Historic of Access