See Chris "Sully" Sullivan's presentation from this year's Gartner IAM Summit in Las Vegas where he outlines how identity and security are coming together to form a new team and a new career path.
2. Securing
Digital
Business
SecureAuth,
Core
Security,
Damballa,
Courion,
Secure
Reset,
Bay31
• We
are
leaders
in
IDM,
IGA,
SSO,
Adaptive
Auth,
TI,
Vulnerability
Management,
Pen-‐Testing,
Threat
Detection,
Threat
Intel
• We
do
primary
research,
analytics,
automation
and
orchestration
across
the
entire
threat
surface
4. Device
Centric
Investigations
The
Old
Way
Defense
In-‐Depth Manual
Response
Limited
Control
Over
Devices
Manual
Investigation
Silos
Of
Data
Alert
Overload
Alert
Fatigue
Point
Products
Focused
On
Devices
O R C H E S T R A T I O NI D E N T I T Y C A S E
M G M TA N A L Y T I C S A U T O M A T I O N
LACKS
12. The
Role
of
Identity
in
Digital
Business
is
Evolving
IT
Efficiency
IT
ComplianceSecurity
Business
Agility
Scale
UX
API
API
AI
13. I N T EL L I G EN T
I D EN T I T Y
I S
V I TAL / N EC ES SARY
FO R
S EC UR I T Y
14. Identity
Security
Automation
The
Only
Way
O R C H E S T R A T I O NI D E N T I T Y C A S E
M G M TA N A L Y T I C S A U T O M A T I O N
IDENTITY
SECURITY
AUTOMATION
Any
| Any
|
Any
Identity
Centric
Telemetry
Device
Agnostic
WORKFORCE
PARTNERS
CONSUMERS
ANY
USER ANY
DEVICE
MOBILE
TABLET
LAPTOP
SERVER
ANY
PATH
CLIENT
APP
MOBILE
APP
BROWSER
EMAIL
Contextual
Evidence
Orchestration
of
Siloed
Data
Identity
Context
Authentication
Attempts
Network
Behavior
Vulnerable
Attack
Paths
3rd Party
Sec.
Controls
Automated
Investigation
Analytics
Driven
Case
Mgmt.
With
High
Confidence
Adaptive
Automation
Playbooks
for
Rapid
Response
At
Identity
Layer
&
Beyond
16. Reducing
Business
Friction
Securely
Adaptive
Authentication
Device
Recognition
Threat
Service
Directory
Lookup
Geo-‐Location
Geo-‐Velocity
Geo-‐Fencing
Phone
Number
Fraud
Prevention
Behavioral
Biometrics
Identity
Governance
User
&
Entity
Behavior
Analytics
Do
we
recognize
this
device?
Associated
with
a
user
we
know?
Real-‐time
Threat
Intelligence
IP
Address
Interrogation
Group
membership
and
attribute
checking
Request
coming
from
a
known
location?
Do
we
have
employees,
partners
or
customers
here?
Has
an
improbable
travel
event
taken
place?
Track
normal
behavior
Looking
for
anomalies
Who
should/does
have
access
rights?
High
Access
Rights
=
greater
risk/vulnerability
Access
request
coming
from
within
or
outside
a
geographic
barrier
Typing
Sequences
&
Mouse
Movements
Unique
to
each
user
on
each
device
Reduce
#
of
OTPs,
Block
device
class,
Identify
“porting”
status,
Block
by
carrier
18. 214– Allow
us
to
continue
to
assist
Extract
IP
address
from
major
target
systems
and
evaluate
activity
Gain
Awareness
Define
criteria
to
determine
level
of
acceptance
by
use
case
or
user
category
Understand
seasonality
and
impact
to
risk
tolerance
Assess
Acceptable
Risk
Create
metrics
for
success
(near
term,
mid
term,
long
term)
Determine
success?
Make
a
time
investment
in
a
Risk
Awareness
Workshop