SlideShare a Scribd company logo
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
Your partner
in secure digital
transformation
CLOUD MATURITY WORKSHOP
Dan Thormodsgaard, CTO
2
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
2
AGENDA
• CLOUD MATURITY WORKSHOP
• BUILDING BLOCKS
• CLOUD STRATEGY
• GOVERNANCE
• ARCHITECTURE
• VALIDATION
• OPERATIONALIZE
• USE CASE
• SHORT TERM OBJECTIVES
• LONG TERM OBJECTIVES
3
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
3
FISHTECH APPROACH
STRATEGY
OPERATIONS
ARCHITECTURE
GOVERNANCE
IMPLEMENTATION
VALIDATION
Cloud Strategy – Collaborate with our
customer to develop a comprehensive
strategy
Cloud Governance – Map
Organizational Governance
Program to Cloud Strategy
Cloud Architecture – Provide
Multi Cloud Architecture based on
Governance Objectives
Validation – Utilize lab to ensure interoperability, right solution
Implementation – Develop a
execution strategy with short
term and long term objectives
Operations – CYDERES
solutions help Operationalize
Cloud Strategy and Governance
4
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
4
CLOUD DISCOVERY METHODOLOGY
Methodology
- Service definition
• Automation and provisioning
- Discovery
• Detail of current state
- Develop target state
• Gaps analysis of people, process and technology
- Feasibility study
• Tool cost, skill set gaps and process refinement
- Execution strategy
• Execute Plan
5
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
5BUILDING BLOCKS
SERVICE MODEL
SPONSORSHIP/EXECUTIVE
SUPPORT
CLOUD
VISIBILITY
DATA SECURITY BUSINESS CRITICAL
APPLICATIONS
THREAT
PROTECTION
COMPLIANCE
OBJECTIVES
OPERATING MODEL
PEOPLE PROCESS TECHNOLOGY
Executives Management
Human Resources Legal
SOC Analysts Security Architecture
Network Architecture Application Architecture
Security Operations Network Operations
Application Operations Compliance
RACI Model Incident Management
POC/Deployment Operational
Procurement Access Controls
Data Lifecycle Change Management
Monitoring SLAs
Metrics BC/DR
AWS Ticketing
CMDB SIEM
CASB APIs
Visibility Security Controls
Infrastructure Encryption/Tokenization
Application Security Monitoring Tools
CLOUD
6
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
6
CLOUD STRATEGY
Problem Statements:
- We have 800 SaaS Applications (that we know of)
- CEO/CIO/CTO "Cloud First”
- Data Center Migration to IaaS (Lift & Shift)
- No Defined Cloud Strategy
- Lack of Cost Control
- Gaps in Cloud IAM Strategy
- Visibility Challenges
- DevOps Teams
- Where do we start
- We need training
7
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
7
CLOUD STRATEGY
Target Capabilities:
- Business enablement
- Cost governance
- Configuration management
- Competitive advantage
- Application Onboarding Process
- Maintain Compliance
- Hybrid Cloud
- Build DevSecOps
- Automation orchestration and provisioning
- Develop Cloud IAM Strategy
- Cloud Program Manager
- Develop Target Architecture
- IT Collaboration
- Business Alignment
- Maintain Compliance
- Reduce Risk
- Availability
- Operationalize Cloud
- Education
8
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
8
CLOUD STRATEGY
Use Cases:
- SaaS
• Unsanctioned Applications
• Governance
- IaaS
• What application
• AWS, GCP, Azure
• Cost
- PaaS
• DevOps
• CI/CD
9
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
9
CLOUD GOVERNANCE
Compliance & Standards:
- Map Compliance Standards to CSA CCM
- Develop Cloud Standards
- Map Cloud Compliance & Standards to
requirements
Data Governance:
- Data Classifications
- DLP
- Data Tagging
- Data Lakes
10
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
10
CLOUD GOVERNANCE
IAM Governance
4 Pillars
IAM
Identity Access
Governance (IAG)
Privilege Access
Management (PAM)
Access
Management (AM)
Multi Factor
Authentication
(MFA)
11
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
11
CLOUD REFERENCE ARCHITECTURE
REMOTE END USERS
Mobile Device Management (MDM)
Endpoint Detection & Response (EDR)
Threat, Phishing & Forensics
DLP, Data Tagging & Encryption
End Point Protection (EPP)
CASB/SWG (Secure Web Gateway)
DLP- SaaS, PaaS, IaaS
Advanced Threat Protection
Session Highjack Protection
Encryption
Sandboxing
Malware Protection
IdAM
IdP Federation
MFA
SSO
PAM
IGA
SaaS
Office 365
Netsuite
Salesforce
Concur
Zoom
DATA CENTER / BRANCH
FW
WAF
IPS
SSLi
EPP/EDR
Logging
Alerting
Forensics
Threat Detection & Response
AZURE
FW
WAF
EPP/EDR
Logging
Alerting
GCP
FW
WAF
EPP/EDR
Logging
Alerting
Forensics
Threat Detection & Response
AWS
FW
WAF
EPP/EDR
Logging
Alerting
Forensics
Threat Detection & Response
12
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
12
CLOUD VALIDATION
Validate Capabilities:
- SDWAN
- Develop testing requirements
- Test against metrics
- Security Controls in the Cloud
Branch Office
DC2
DC1
INTERNET
WEB GATEWAY
MPLS
CASB
SaaS
IaaS
PaaS
B2B
13
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
13
ATTESTATION &
CERTIFICATION
ROLE MANAGEMENT
CLOUD PROVISIONING
DEVELOPMENT &
MONITORING
WORKFLOW & ACCESS
OPERATIONALIZE IDM
• Create and configure access rule sets
• Design and manage workflow requests: approvers, notifications
• Customization to environment (scripting, code updates, connectors, adapter modification)
• Monitor IDM health, error logs, processing and environment connections
• Scripting language and membership group provisioning
• Manage request policy process
• Create and develop role management, role mining and role rules
• Create rule sets, manage request process, SME for role governance
• Manage certification review, application integration, SoD library, SoD rule sets
• Develop, create application design reviews, file feed, data management, scheduling
14
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
14
CLOUD OPERATIONS
SOC/NOC Integration:
- Cloud Management Platforms
• Security & Compliance
• Cost Management
• Metrics & Alerting
- Test against metrics
- Security Controls in the Cloud
- Security Logging & Alerting
• Session High Jacking
• Threat Intelligence
• Analytics
15
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
15
SHORT TERM & LONG TERM OBJECTIVES
16
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
16
SHORT TERM OBJECTIVES
Develop a Cloud Strategy
Governance & Standards
- CSA and NIST
- Data Governance
- Develop Cloud Standards
- Sanction Applications
Cloud Deployment Models & Maturity
Model
- SaaS, PaaS, IaaS, Hybrid
Develop Target Architecture that maps to
controls
Training & Education
- Cloud architecture competencies
- Cloud certifications
Cloud Benefit Analysis
- On premise vs cloud
- Cost considerations
- Agility
Connectivity Review
- Performance hub
- SDWAN
- End user experience
17
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
17
SHORT TERM OBJECTIVES
IDM Objectives
- Heavy manual quarterly review
attestations
- Directory domains and forests alignment
- Centralized password management
- High-level access audit, logging and
management provisioning
- Role management and role governance
Target Capabilities
- Business governance
- Identity governance
- Compliance and risk
- Scalability
- Reconciliation
- Privilege account management
- Ease of deployment
- Configuration
- Automation provisioning
18
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
18
SHORT TERM OBJECTIVES
SaaS
APPLICATION
SANCTIONING
§ Execution Strategy
§ Review:
⁃ API Gateway
⁃ Align CASB Requirements
⁃ IAM Dependencies
⁃ Encryption Dependencies
⁃ Sanctioned and Unsanctioned
applications
⁃ DLP Dependencies
⁃ Certificate Lifecycle Dependencies
⁃ Logging and Alerting Dependencies
⁃ SD-WAN Dependencies
§ Defined process to onboarding sanctioned
applications
§ Visibility for SaaS applications
§ Role-based application controls
§ Data Loss Prevention safeguards
§ Develop IdAM execution strategy
§ Smarter and shorter application turn up time
§ Encryption standards
§ Define Bring Your Own Keys (BYOK)
§ Define SD-WAN integration requirements
§ Define certificate lifecycle management
§ Define Managed Detection and Response (MDR)
§ Incident Response (IR)
RESULTS
«
19
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
19
LONG TERM OBJECTIVES
HYBRID CLOUD
STRATEGY
§ Private, Public, Hybrid Cloud & Data
Center
§ DevOps
§ Security Stack in the cloud
§ Redefining Boundaries
§ API Driven Architecture
§ Data Center Automation Orchestration
§ Micro-segmentation
§ Cloud and Data Center connectivity
§ IdAM for IaaS. PaaS
§ Office 365, and other SaaS applications
§ Develop Private, Public, Hybrid Cloud & Data
Center target architecture
§ DevOps CI/CD Process and tools
§ Develop requirements and execution strategy
⁃ Cloud security stack
⁃ Unified security stack
⁃ Data center automation, orchestration &
provisioning
⁃ Micro-segmentation requirements & execution
strategy
⁃ Performance Hub requirements
⁃ IdAM PaaS & IaaS
⁃ Cloud Management Platform (CMP)
⁃ Security & Compliance, Logging, Alerting,
Metrics,
Cost Management
RESULTS
«
F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient
and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC.
Your partner
in secure digital
transformation
Q&A

More Related Content

Similar to Sept MN Cloud Security Alliance - Presentation

Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
DVV Solutions Third Party Risk Management
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
Sridhar Karnam
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Cloudera, Inc.
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Concept Searching, Inc
 
Secure HR Platform for Utilities
Secure HR Platform for Utilities Secure HR Platform for Utilities
Secure HR Platform for Utilities
Bhupesh Chaurasia
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to business
Mark Albala
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
Cloudera, Inc.
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
ForgeRock
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
Oracle Developers
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
CSA Argentina
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
DATAVERSITY
 
Digital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the CloudDigital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the Cloud
Amazon Web Services
 
Enterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdfEnterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdf
andy282535
 
Building Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source TechnologiesBuilding Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source Technologies
Catarina Reis
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docxhjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
salmonpybus
 

Similar to Sept MN Cloud Security Alliance - Presentation (20)

Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Secure HR Platform for Utilities
Secure HR Platform for Utilities Secure HR Platform for Utilities
Secure HR Platform for Utilities
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
A process for defining your digital approach to business
A process for defining your digital approach to businessA process for defining your digital approach to business
A process for defining your digital approach to business
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
 
Digital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the CloudDigital Transformation: Empowering People to Adapt to the Cloud
Digital Transformation: Empowering People to Adapt to the Cloud
 
Enterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdfEnterprise Software - Market Insights - Fall 2023.pdf
Enterprise Software - Market Insights - Fall 2023.pdf
 
Building Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source TechnologiesBuilding Trust using Hyperledger Open Source Technologies
Building Trust using Hyperledger Open Source Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docxhjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
hjklzxcvbnmqwer lzxcvbnmqwertyui cvbnmqwertyuiop n.docx
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 

Sept MN Cloud Security Alliance - Presentation

  • 1. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. Your partner in secure digital transformation CLOUD MATURITY WORKSHOP Dan Thormodsgaard, CTO
  • 2. 2 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 2 AGENDA • CLOUD MATURITY WORKSHOP • BUILDING BLOCKS • CLOUD STRATEGY • GOVERNANCE • ARCHITECTURE • VALIDATION • OPERATIONALIZE • USE CASE • SHORT TERM OBJECTIVES • LONG TERM OBJECTIVES
  • 3. 3 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 3 FISHTECH APPROACH STRATEGY OPERATIONS ARCHITECTURE GOVERNANCE IMPLEMENTATION VALIDATION Cloud Strategy – Collaborate with our customer to develop a comprehensive strategy Cloud Governance – Map Organizational Governance Program to Cloud Strategy Cloud Architecture – Provide Multi Cloud Architecture based on Governance Objectives Validation – Utilize lab to ensure interoperability, right solution Implementation – Develop a execution strategy with short term and long term objectives Operations – CYDERES solutions help Operationalize Cloud Strategy and Governance
  • 4. 4 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 4 CLOUD DISCOVERY METHODOLOGY Methodology - Service definition • Automation and provisioning - Discovery • Detail of current state - Develop target state • Gaps analysis of people, process and technology - Feasibility study • Tool cost, skill set gaps and process refinement - Execution strategy • Execute Plan
  • 5. 5 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 5BUILDING BLOCKS SERVICE MODEL SPONSORSHIP/EXECUTIVE SUPPORT CLOUD VISIBILITY DATA SECURITY BUSINESS CRITICAL APPLICATIONS THREAT PROTECTION COMPLIANCE OBJECTIVES OPERATING MODEL PEOPLE PROCESS TECHNOLOGY Executives Management Human Resources Legal SOC Analysts Security Architecture Network Architecture Application Architecture Security Operations Network Operations Application Operations Compliance RACI Model Incident Management POC/Deployment Operational Procurement Access Controls Data Lifecycle Change Management Monitoring SLAs Metrics BC/DR AWS Ticketing CMDB SIEM CASB APIs Visibility Security Controls Infrastructure Encryption/Tokenization Application Security Monitoring Tools CLOUD
  • 6. 6 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 6 CLOUD STRATEGY Problem Statements: - We have 800 SaaS Applications (that we know of) - CEO/CIO/CTO "Cloud First” - Data Center Migration to IaaS (Lift & Shift) - No Defined Cloud Strategy - Lack of Cost Control - Gaps in Cloud IAM Strategy - Visibility Challenges - DevOps Teams - Where do we start - We need training
  • 7. 7 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 7 CLOUD STRATEGY Target Capabilities: - Business enablement - Cost governance - Configuration management - Competitive advantage - Application Onboarding Process - Maintain Compliance - Hybrid Cloud - Build DevSecOps - Automation orchestration and provisioning - Develop Cloud IAM Strategy - Cloud Program Manager - Develop Target Architecture - IT Collaboration - Business Alignment - Maintain Compliance - Reduce Risk - Availability - Operationalize Cloud - Education
  • 8. 8 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 8 CLOUD STRATEGY Use Cases: - SaaS • Unsanctioned Applications • Governance - IaaS • What application • AWS, GCP, Azure • Cost - PaaS • DevOps • CI/CD
  • 9. 9 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 9 CLOUD GOVERNANCE Compliance & Standards: - Map Compliance Standards to CSA CCM - Develop Cloud Standards - Map Cloud Compliance & Standards to requirements Data Governance: - Data Classifications - DLP - Data Tagging - Data Lakes
  • 10. 10 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 10 CLOUD GOVERNANCE IAM Governance 4 Pillars IAM Identity Access Governance (IAG) Privilege Access Management (PAM) Access Management (AM) Multi Factor Authentication (MFA)
  • 11. 11 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 11 CLOUD REFERENCE ARCHITECTURE REMOTE END USERS Mobile Device Management (MDM) Endpoint Detection & Response (EDR) Threat, Phishing & Forensics DLP, Data Tagging & Encryption End Point Protection (EPP) CASB/SWG (Secure Web Gateway) DLP- SaaS, PaaS, IaaS Advanced Threat Protection Session Highjack Protection Encryption Sandboxing Malware Protection IdAM IdP Federation MFA SSO PAM IGA SaaS Office 365 Netsuite Salesforce Concur Zoom DATA CENTER / BRANCH FW WAF IPS SSLi EPP/EDR Logging Alerting Forensics Threat Detection & Response AZURE FW WAF EPP/EDR Logging Alerting GCP FW WAF EPP/EDR Logging Alerting Forensics Threat Detection & Response AWS FW WAF EPP/EDR Logging Alerting Forensics Threat Detection & Response
  • 12. 12 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 12 CLOUD VALIDATION Validate Capabilities: - SDWAN - Develop testing requirements - Test against metrics - Security Controls in the Cloud Branch Office DC2 DC1 INTERNET WEB GATEWAY MPLS CASB SaaS IaaS PaaS B2B
  • 13. 13 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 13 ATTESTATION & CERTIFICATION ROLE MANAGEMENT CLOUD PROVISIONING DEVELOPMENT & MONITORING WORKFLOW & ACCESS OPERATIONALIZE IDM • Create and configure access rule sets • Design and manage workflow requests: approvers, notifications • Customization to environment (scripting, code updates, connectors, adapter modification) • Monitor IDM health, error logs, processing and environment connections • Scripting language and membership group provisioning • Manage request policy process • Create and develop role management, role mining and role rules • Create rule sets, manage request process, SME for role governance • Manage certification review, application integration, SoD library, SoD rule sets • Develop, create application design reviews, file feed, data management, scheduling
  • 14. 14 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 14 CLOUD OPERATIONS SOC/NOC Integration: - Cloud Management Platforms • Security & Compliance • Cost Management • Metrics & Alerting - Test against metrics - Security Controls in the Cloud - Security Logging & Alerting • Session High Jacking • Threat Intelligence • Analytics
  • 15. 15 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 15 SHORT TERM & LONG TERM OBJECTIVES
  • 16. 16 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 16 SHORT TERM OBJECTIVES Develop a Cloud Strategy Governance & Standards - CSA and NIST - Data Governance - Develop Cloud Standards - Sanction Applications Cloud Deployment Models & Maturity Model - SaaS, PaaS, IaaS, Hybrid Develop Target Architecture that maps to controls Training & Education - Cloud architecture competencies - Cloud certifications Cloud Benefit Analysis - On premise vs cloud - Cost considerations - Agility Connectivity Review - Performance hub - SDWAN - End user experience
  • 17. 17 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 17 SHORT TERM OBJECTIVES IDM Objectives - Heavy manual quarterly review attestations - Directory domains and forests alignment - Centralized password management - High-level access audit, logging and management provisioning - Role management and role governance Target Capabilities - Business governance - Identity governance - Compliance and risk - Scalability - Reconciliation - Privilege account management - Ease of deployment - Configuration - Automation provisioning
  • 18. 18 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 18 SHORT TERM OBJECTIVES SaaS APPLICATION SANCTIONING § Execution Strategy § Review: ⁃ API Gateway ⁃ Align CASB Requirements ⁃ IAM Dependencies ⁃ Encryption Dependencies ⁃ Sanctioned and Unsanctioned applications ⁃ DLP Dependencies ⁃ Certificate Lifecycle Dependencies ⁃ Logging and Alerting Dependencies ⁃ SD-WAN Dependencies § Defined process to onboarding sanctioned applications § Visibility for SaaS applications § Role-based application controls § Data Loss Prevention safeguards § Develop IdAM execution strategy § Smarter and shorter application turn up time § Encryption standards § Define Bring Your Own Keys (BYOK) § Define SD-WAN integration requirements § Define certificate lifecycle management § Define Managed Detection and Response (MDR) § Incident Response (IR) RESULTS «
  • 19. 19 F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. 19 LONG TERM OBJECTIVES HYBRID CLOUD STRATEGY § Private, Public, Hybrid Cloud & Data Center § DevOps § Security Stack in the cloud § Redefining Boundaries § API Driven Architecture § Data Center Automation Orchestration § Micro-segmentation § Cloud and Data Center connectivity § IdAM for IaaS. PaaS § Office 365, and other SaaS applications § Develop Private, Public, Hybrid Cloud & Data Center target architecture § DevOps CI/CD Process and tools § Develop requirements and execution strategy ⁃ Cloud security stack ⁃ Unified security stack ⁃ Data center automation, orchestration & provisioning ⁃ Micro-segmentation requirements & execution strategy ⁃ Performance Hub requirements ⁃ IdAM PaaS & IaaS ⁃ Cloud Management Platform (CMP) ⁃ Security & Compliance, Logging, Alerting, Metrics, Cost Management RESULTS «
  • 20. F I S H T E C H G R O U P September 24, 2018The information contained in this document is confidential, privileged and only for the information of the intended recipient and may not be used, published or redistributed without the prior written consent of Fishtech Group LLC. Your partner in secure digital transformation Q&A