IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Similar documents
SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

Next Generation Authentication

MITIGATE CYBER ATTACK RISK

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

THE IDENTITY DEFINED SECURITY ALLIANCE

Securing Digital Transformation

Virtual Machine Encryption Security & Compliance in the Cloud

Using Biometric Authentication to Elevate Enterprise Security

Are You Flirting with Risk?

Are You Flirting with Risk?

FOR FINANCIAL SERVICES ORGANIZATIONS

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Run the business. Not the risks.

To Audit Your IAM Program

THE SECURITY LEADER S GUIDE TO SSO

Identity & Access Management

The Etihad Journey to a Secure Cloud

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Security Readiness Assessment

Operationalizing the Three Principles of Advanced Threat Detection

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

Integrated Access Management Solutions. Access Televentures

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide

Part 2: How to Detect Insider Threats

MEETING ISO STANDARDS

Identity Management as a Service

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

Dissecting NIST Digital Identity Guidelines

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

What It Takes to be a CISO in 2017

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Compliance with CloudCheckr

Keep the Door Open for Users and Closed to Hackers

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

Protect Your Organization from Cyber Attacks

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

GDPR Update and ENISA guidelines

Mobile Data Security Essentials for Your Changing, Growing Workforce

Pulseway Security White Paper

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Modern Database Architectures Demand Modern Data Security Measures

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. CyberArk Enterprise Password Vault

Teradata and Protegrity High-Value Protection for High-Value Data

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Sage Data Security Services Directory

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide

EU General Data Protection Regulation (GDPR) Achieving compliance

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

with Advanced Protection

Security Diagnostics for IAM

Cloud sicherung durch Adaptive Multi-factor Authentication

Secure Access for Microsoft Office 365 & SaaS Applications

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

How Next Generation Trusted Identities Can Help Transform Your Business

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Yubico with Centrify for Mac - Deployment Guide

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Building a Resilient Security Posture for Effective Breach Prevention

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

CipherCloud CASB+ Connector for ServiceNow

HIPAA Compliance discussion

Addressing Credential Compromise & Account Takeovers: Bearersensitive. Girish Chiruvolu, Ph.D., CISSP, CISM, MBA ISACA NTX April 19

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

AKAMAI CLOUD SECURITY SOLUTIONS

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Authentication and Fraud Detection Buyer s Guide

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Transcription:

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO (US) @BEN_SMITH

IDENTITY = THE MOST CONSEQUENTIAL ATTACK VECTOR Confirmed data breaches involving weak, default or stolen passwords 63% Web application attacks where credentials are harvested from customer devices 95%+ Point of sale breaches featuring stolen credentials leveraging legitimate partner access 98% Verizon Data Breach Investigations Report (DBIR): 2016, 2015

STOPPING THE INTERNAL TUG-OF-WAR Easy Access to cloud, web and mobile applications from any device Regain Control of a disrupted perimeter with consistent and centrally enforced policy End Users CIO / CISO

AND EXTERNALLY, WHAT ABOUT YOUR SUPPLY CHAIN?

DILEMMAS OF THE MODERN ORGANIZATION Protect VPN access with strong authentication OLD WORLD Account lifecycle management automation for IT efficiency

DILEMMAS OF THE MODERN ORGANIZATION SECURITY TEAM Supporting SaaS applications is problematic. Too many security problems. Security is key. We need strong authentication and control" CISO We need to secure our identities and applications, comply with regulatory requirements and ensure we are aligned with the business LINE OF BUSINESS We need to get the job done quickly. This SaaS application is the industry standard. We will use it with out without the support of IT, and we will not jump through hoops NEW WORLD IT MANAGER I need to cut cost of ownership, which means moving to the cloud. I need to support SaaS applications AND maintain security RISK MANAGER I need to ensure organization is compliant with internal and external governing policies and industry regulations IAM MANAGER I need to have confidence that I know who has access to what, and that applications and data are protected while enforcing privacy.

MODERNIZATION MALICE MANDATES APPS USERS DEVICES PHISHING BREACH MALWARE PCI GDPR DFARS Organizations are taking more business online Cloud and mobile change the game Increasingly sophisticated and more frequent IDENTITY CHALLENGES CONTINUE TO GROW Transitioning from simple guidance to rigid security with a modern, global infrastructure

NEW CHALLENGES REQUIRE ADDITIONAL CAPABILITIES EVOLVE FROM STRONG AUTHENTICATION TRANSFORM TO IDENTITY ASSURANCE OTP tokens can be cumbersome for some Access decisions based solely on credentials Passwords still dominant and creating gaps CONVENIENT more choices for a variety of use scenarios INTELLIGENT context and risk increase security & reduce friction PERVASIVE protect ground to cloud limits the attack surface

RISK-BASED IDENTITY ASSURANCE Location Role Network Static User and Context Rules PASS Device Session App Approve Tokencode RSA SecurID Location Access Pattern Identity Assurance Engine RISKY Device Biometrics Email FIDO Device Time App Network Dynamic Behavior-based Confidence SMS Deny Voice

BENEFITS TO RISK-BASED IDENTITY ASSURANCE CONVENIENCE SCALE SECURITY Invisible to users Reduce the friction 90% step-ups eliminated Any authentication method Can extend risk-based to all users Lower total cost of ownership (TCO) Continuously monitor all access Risky actions, automatic step-up Learned behaviors over time

Identity Governance Act with insight to prioritize access decisions Access & SSO Ensures right individuals have convenient and secure access Access Meets Assurance access requirements of the modern workforce Who has access to what? Reduces startup times and lowers costs Identity Lifecycle Ensure users have timely access the the right applications Delivering convenient and secure access to the modern workforce Authentication

Identity Governance Manage and provide insight into who has access to what Identity Lifecycle Expanded visibility and control over identities Prioritized actions based on risk Reduces time / manual effort with automated processes Strengthens risk posture Reduces chances of audit failure or breach Reduced TCO

WHO is the user? WHAT known fraud is this user or device associated with? WHAT can they access? HOW are they using that access and is it a threat? WHY should I care? Is there a risk to my business?