SlideShare a Scribd company logo
1 of 19
Download to read offline
Identity	
  +	
  Security:
Welcome	
  to	
  your	
  new	
  career
Chris	
  Sullivan	
  (Sully)	
  
SVP,	
  Chief	
  Information	
  Security	
  Office
Securing	
  Digital	
  Business
SecureAuth,	
  Core	
  Security,	
  Damballa,	
  Courion,	
  Secure	
  Reset,	
  Bay31
• We	
  are	
  leaders	
  in	
  IDM,	
  IGA,	
  SSO,	
  Adaptive	
  Auth,	
  
TI,	
  Vulnerability	
  Management,	
  Pen-­‐Testing,	
  Threat	
  
Detection,	
  Threat	
  Intel
• We	
  do	
  primary	
  research,	
  analytics,	
  automation	
  
and	
  orchestration	
  across	
  the	
  entire	
  threat	
  surface
Raison	
  D'être
Device	
  Centric	
  Investigations
The	
  Old	
  Way
Defense	
  In-­‐Depth Manual	
  Response
Limited	
  Control	
  Over	
  Devices
Manual	
  Investigation
Silos	
  Of	
  Data
Alert	
  Overload
Alert	
  Fatigue
Point	
  Products
Focused	
  On	
  Devices
O R C H E S T R A T I O NI D E N T I T Y C A S E 	
   M G M TA N A L Y T I C S A U T O M A T I O N
LACKS
This	
  Looks	
  Simple	
  but	
  It’s	
  Not
Attack	
  Paths	
  are	
  Complicated
Access	
  Attack	
  Paths
Billions	
  of	
  Changing	
  Relationships
I D E N T I T Y
A C C O U N T S
E N T I T L E M E N T S
R O L E S
A P P L I C AT I O N S
Separation	
  of	
  Duties
Privileged	
  Access
Real	
  Attack	
  Paths	
  are	
  Real	
  Complicated
The	
  Role	
  of	
  Identity	
  in	
  Digital	
  Business	
  is	
  Evolving	
  
IT
Efficiency
IT
ComplianceSecurity
Business	
  
Agility
Scale
UX
API
API
AI
I N T EL L I G EN T 	
  I D EN T I T Y 	
  I S 	
  V I TAL / N EC ES SARY 	
  FO R 	
  S EC UR I T Y
Identity	
  Security	
  Automation
The	
  Only	
  Way
O R C H E S T R A T I O NI D E N T I T Y C A S E 	
   M G M TA N A L Y T I C S A U T O M A T I O N
IDENTITY	
  SECURITY	
  AUTOMATION
Any	
  | Any	
  |	
  Any
Identity	
  Centric	
  Telemetry
Device	
  Agnostic
WORKFORCE
PARTNERS
CONSUMERS
ANY	
  USER ANY	
  DEVICE
MOBILE
TABLET
LAPTOP
SERVER
ANY	
  PATH
CLIENT	
  APP
MOBILE	
  APP
BROWSER
EMAIL
Contextual	
  Evidence
Orchestration	
  of
Siloed	
  Data
Identity	
  Context
Authentication	
  Attempts
Network	
  Behavior
Vulnerable	
  Attack	
  Paths
3rd Party	
  Sec.	
  Controls
Automated	
  Investigation
Analytics	
  Driven	
  Case	
  Mgmt.
With	
  High	
  Confidence
Adaptive	
  Automation
Playbooks	
  for	
  Rapid	
  Response
At	
  Identity	
  Layer	
  &	
  Beyond
CONVENTIONAL
VIEW	
  OF	
  ACCESS
CLUSTER	
  ANALYSIS
OF	
  ACCESS
LINK	
  ANALYSIS
OF	
  ACCESS
ATTACK	
  PATH
REVIEW
Reducing	
  Business	
  Friction	
  Securely
Adaptive	
  Authentication
Device	
  Recognition
Threat	
  Service
Directory	
  Lookup
Geo-­‐Location
Geo-­‐Velocity
Geo-­‐Fencing
Phone	
  Number	
  Fraud	
  Prevention
Behavioral	
  Biometrics
Identity	
  Governance
User	
  &	
  Entity	
  Behavior	
  Analytics
Do	
  we	
  recognize	
  this	
  device?
Associated	
  with	
  a	
  user	
  we	
  know?
Real-­‐time	
  Threat	
  Intelligence
IP	
  Address	
  Interrogation
Group	
  membership	
  and	
  attribute	
  
checking
Request	
  coming	
  from	
  a	
  known	
  location?
Do	
  we	
  have	
  employees,	
  partners	
  or	
  customers	
  here?
Has	
  an	
  improbable	
  travel	
  event	
  
taken	
  place?
Track	
  normal	
  behavior
Looking	
  for	
  anomalies
Who	
  should/does	
  have	
  access	
  rights?
High	
  Access	
  Rights	
  =	
  greater	
  risk/vulnerability
Access	
  request	
  coming	
  from	
  within	
  or	
  
outside	
  a	
  geographic	
  barrier
Typing	
  Sequences	
  &	
  Mouse	
  Movements
Unique	
  to	
  each	
  user	
  on	
  each	
  device
Reduce	
  #	
  of	
  OTPs,	
  Block	
  device	
  class,
Identify	
  “porting”	
  status,	
  Block	
  by	
  carrier
Behind	
  the	
  Buzz	
  of	
  AI
Subtitle	
  left
214– Allow	
  us	
  to	
  
continue	
  to	
  assist
Extract	
  IP	
  address	
  from	
  major	
  target	
  
systems	
  and	
  evaluate	
  activity	
  
Gain	
  Awareness
Define	
  criteria	
  to	
  determine	
  level	
  of	
  
acceptance	
  by	
  use	
  case	
  or	
  user	
  category	
  
Understand	
  seasonality	
  and	
  impact	
  to	
  risk	
  
tolerance	
  
Assess	
  Acceptable	
  Risk
Create	
  metrics	
  for	
  success	
  (near	
  term,	
  mid	
  
term,	
  long	
  term)
Determine	
  success?	
  
Make	
  a	
  time	
  investment	
  in	
  a	
  
Risk	
  Awareness	
  Workshop
© 2017	
  by	
  SecureAuth +	
  Core	
  Security	
  
All	
  rights	
  reserved
Thank	
  you…	
  
Thank	
  you	
  very	
  much.

More Related Content

What's hot

Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
Ben Massey
 

What's hot (20)

Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptx
 
Threat Detection and Response Solutions
Threat Detection and Response SolutionsThreat Detection and Response Solutions
Threat Detection and Response Solutions
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Holy Threat Intelligence AMPman! We Need Endpoint Security!
Holy Threat Intelligence AMPman! We Need Endpoint Security!Holy Threat Intelligence AMPman! We Need Endpoint Security!
Holy Threat Intelligence AMPman! We Need Endpoint Security!
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Perimeter Protection Solutions
Perimeter Protection SolutionsPerimeter Protection Solutions
Perimeter Protection Solutions
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
"We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect...
"We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect..."We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect...
"We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect...
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.
 
5 Signs Your End-Users Need a Security Boost
5 Signs Your End-Users Need a Security Boost5 Signs Your End-Users Need a Security Boost
5 Signs Your End-Users Need a Security Boost
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- Spafford
 
Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID?
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
Managed Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionManaged Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable Protection
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 

Similar to Identity + Security: Welcome to Your New Career

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 

Similar to Identity + Security: Welcome to Your New Career (20)

Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?
 
Security threats and countermeasures in daily life - Symantec
Security threats and countermeasures in daily life - SymantecSecurity threats and countermeasures in daily life - Symantec
Security threats and countermeasures in daily life - Symantec
 
01.L1 Deck- Singularity Platform.pptx
01.L1 Deck- Singularity Platform.pptx01.L1 Deck- Singularity Platform.pptx
01.L1 Deck- Singularity Platform.pptx
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 

More from Core Security

More from Core Security (20)

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks
 
Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
 
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
 
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityVulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling you
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

Identity + Security: Welcome to Your New Career

  • 1. Identity  +  Security: Welcome  to  your  new  career Chris  Sullivan  (Sully)   SVP,  Chief  Information  Security  Office
  • 2. Securing  Digital  Business SecureAuth,  Core  Security,  Damballa,  Courion,  Secure  Reset,  Bay31 • We  are  leaders  in  IDM,  IGA,  SSO,  Adaptive  Auth,   TI,  Vulnerability  Management,  Pen-­‐Testing,  Threat   Detection,  Threat  Intel • We  do  primary  research,  analytics,  automation   and  orchestration  across  the  entire  threat  surface
  • 4. Device  Centric  Investigations The  Old  Way Defense  In-­‐Depth Manual  Response Limited  Control  Over  Devices Manual  Investigation Silos  Of  Data Alert  Overload Alert  Fatigue Point  Products Focused  On  Devices O R C H E S T R A T I O NI D E N T I T Y C A S E   M G M TA N A L Y T I C S A U T O M A T I O N LACKS
  • 5. This  Looks  Simple  but  It’s  Not
  • 6.
  • 7. Attack  Paths  are  Complicated
  • 8. Access  Attack  Paths Billions  of  Changing  Relationships I D E N T I T Y A C C O U N T S E N T I T L E M E N T S R O L E S A P P L I C AT I O N S
  • 11. Real  Attack  Paths  are  Real  Complicated
  • 12. The  Role  of  Identity  in  Digital  Business  is  Evolving   IT Efficiency IT ComplianceSecurity Business   Agility Scale UX API API AI
  • 13. I N T EL L I G EN T  I D EN T I T Y  I S  V I TAL / N EC ES SARY  FO R  S EC UR I T Y
  • 14. Identity  Security  Automation The  Only  Way O R C H E S T R A T I O NI D E N T I T Y C A S E   M G M TA N A L Y T I C S A U T O M A T I O N IDENTITY  SECURITY  AUTOMATION Any  | Any  |  Any Identity  Centric  Telemetry Device  Agnostic WORKFORCE PARTNERS CONSUMERS ANY  USER ANY  DEVICE MOBILE TABLET LAPTOP SERVER ANY  PATH CLIENT  APP MOBILE  APP BROWSER EMAIL Contextual  Evidence Orchestration  of Siloed  Data Identity  Context Authentication  Attempts Network  Behavior Vulnerable  Attack  Paths 3rd Party  Sec.  Controls Automated  Investigation Analytics  Driven  Case  Mgmt. With  High  Confidence Adaptive  Automation Playbooks  for  Rapid  Response At  Identity  Layer  &  Beyond
  • 15. CONVENTIONAL VIEW  OF  ACCESS CLUSTER  ANALYSIS OF  ACCESS LINK  ANALYSIS OF  ACCESS ATTACK  PATH REVIEW
  • 16. Reducing  Business  Friction  Securely Adaptive  Authentication Device  Recognition Threat  Service Directory  Lookup Geo-­‐Location Geo-­‐Velocity Geo-­‐Fencing Phone  Number  Fraud  Prevention Behavioral  Biometrics Identity  Governance User  &  Entity  Behavior  Analytics Do  we  recognize  this  device? Associated  with  a  user  we  know? Real-­‐time  Threat  Intelligence IP  Address  Interrogation Group  membership  and  attribute   checking Request  coming  from  a  known  location? Do  we  have  employees,  partners  or  customers  here? Has  an  improbable  travel  event   taken  place? Track  normal  behavior Looking  for  anomalies Who  should/does  have  access  rights? High  Access  Rights  =  greater  risk/vulnerability Access  request  coming  from  within  or   outside  a  geographic  barrier Typing  Sequences  &  Mouse  Movements Unique  to  each  user  on  each  device Reduce  #  of  OTPs,  Block  device  class, Identify  “porting”  status,  Block  by  carrier
  • 17. Behind  the  Buzz  of  AI Subtitle  left
  • 18. 214– Allow  us  to   continue  to  assist Extract  IP  address  from  major  target   systems  and  evaluate  activity   Gain  Awareness Define  criteria  to  determine  level  of   acceptance  by  use  case  or  user  category   Understand  seasonality  and  impact  to  risk   tolerance   Assess  Acceptable  Risk Create  metrics  for  success  (near  term,  mid   term,  long  term) Determine  success?   Make  a  time  investment  in  a   Risk  Awareness  Workshop
  • 19. © 2017  by  SecureAuth +  Core  Security   All  rights  reserved Thank  you…   Thank  you  very  much.