Identity and Access Positioning of Paradgimo

Size: px
Start display at page:

Download "Identity and Access Positioning of Paradgimo"

Transcription

1 1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP

2 IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values 2 2

3 1. Data Model IAM can be viewed as a set of complex func7ons or processes that manipulate three kinds of data: ü Iden&ty data ü Access data ü Ac&vity data Users' digital identities Identity Attributes Accounts Profiles Data Model Entitlements Permissions Roles Rules Policies Success & failed login Success & failed access Changes to Identity data Changes to Access data 3

4 2. Functions & Processes Create, Maintain & Retire IAM Data Use IAM Data Log Correlate Analyze Report 4

5 2. Functions & Processes is the construc7on phase of iden7ty, and subsequently providing it with a "personality" by assigning abributes, en7tlements, creden7als It provides the create/maintain/re7re capabili7es of IAM. Administra7on also provides the plaeorm for intelligence: a means to make sense of the iden7ty and access events. serves as a founda7onal plaeorm to facilitate authen7ca7on and authoriza7on, and the capabili7es within them, from single sign- on to en7tlements resolu7on and enforcement of access decisions. Access is the "engine" of IAM that takes iden77es and their informa7on and uses them to effect. generates reports for auditors, provides real- 7me monitoring for opera7ons and delivers the analy7cs necessary for analysts and business stakeholders to make intelligent, ac7onable decisions in the business and in IT. 5 5

6 3. Key Components Policies & Practices instantiation Formal sets of Actions & Information Flows Optimal organizational structure Optimal human resources allocation All products, services, open-source software and in-house developments 6 6

7 4. Business Values ü Improve Operational Level ü Improve Service Level ü Reduce Costs ü Governance ü Risk Management ü Compliance ü Business Agility ü Business Decisions 7

8 IAM in a Users' digital identities Identity Attributes Accounts Profiles Policies & Practices instantiation Formal sets of Actions & Information Flows Optimal organizational structure Data Model Optimal human resources allocation All products, services, open-source software and in-house developments Entitlements Permissions Roles Rules Policies Succes & failed login Success & failed access Changes to Identity & Access data! Improve Operational Level! Improve Service Level! Reduce Costs! Governance! Risk Management! Compliance! Business Agility! Business Decisions 8 8

9 Why IAM often fails? Efficiency ü No vision / No strategy ü No feedback loop / No measurements (KPI s) ü Efficiency? ü Effec7veness? Business ü Business Improvement? Enablement ü Lack of execu7ve sponsorship ü No quick win à Tunnel effect ü Lack of true IAM Governance ü Lack of con7nuous improvement process ü Insufficient involvement from the business ü Technology focus instead of Process focus (à 7 P s model) ü Poor data model Doesn t match reality ü Effec&veness 9 9

10 IAM 7 P s Model Complexity Time to Deliver Proper planning direc&on Killing Added Complexity I A M 10

11 New trends in IAM Iden&ty & Access Governance (IAG) & Iden&ty & Access Intelligence (IAI) 11

12 From User Provisioning to IAG & IAI «Identity Life Cycle» Basic Changes Advanced Changes Data Model «Role Life cycle management» Basic Business Intelligence Governance Compliance Performance Business Decisions «Intelligent» Reports «Bulk» Reports Advanced Refined Data Model Who had this access? Who? Access Rights? Assets? Rules? Policies? Discover Mine Engineer Monitor & Report Analysis Model Correlate Report Who did what? «Bulk» Reports Potential Enrichment SIEM 12 Authentications Autorizations Security Incident & Event Monitoring DLP Data Loss Prevention NAC Network Access Control

13 IAM challenges for the coming years? Mobile Crisis Cloud Crisis Governed Crisis Intelligence Collect Correlate Analytics Reporting Compliance Business improvement Social Networks 13

14 IAM at 14 14

15 Gartner s Hype Cycle for IAM Technologies, 07/2011 s expertise 15 15

16 Major references 16 16

17 Web Access Management ü Defini&on : Web access management (WAM) tools provide control of users' iden77es and Web en7tlements, authen7ca7on and authoriza7on to Web- based applica7ons and to some non Web- based resources. ü Maturity : Mature mainstream ü Technology: AM OpenSSO OAM 11g 17 17

18 User Provisioning ü Defini&on : User- provisioning or account- provisioning technology creates, modifies, disables and deletes user accounts and their profiles across IT infrastructure and business applica7ons. Provisioning tools use approaches such as cloning, roles and business rules so businesses can automate on- boarding, off- boarding and other administra7on workforce processes (for example, new hires, transfers, promo7ons and termina7ons). Provisioning tools also automa7cally aggregate and correlate iden7ty data from HR, CRM, systems and other iden7ty stores. ü Maturity : Mature mainstream IDM OIM 11g Custom scripts 18 18

19 Federated Identity Management ü Defini&on : Federated iden7ty management enables iden7ty informa7on to be shared among several en77es and across trust domains. Tools and standards permit iden7ty abributes to be transferred from one trusted iden7fying and authen7ca7ng en7ty to another for authen7ca7on, authoriza7on and other purposes. ü Maturity : Early mainstream ü Technology : OpenSSO OIF SAML

20 IAM Services Consulting & Integration IAM Managed Services ü Defini&on : Iden7ty and Access management (IAM) consul7ng and integra7on providers deliver specific presales and implementa7on services for clients seeking to select, install, configure and customize IAM products and services. Managed iden7ty and access management (IAM) services are IAM product implementa7ons whose opera7ons and maintenance responsibili7es are handled by IAM service providers. Thus, the customers of those IAM products can handle IAM via outsourcing. ü Maturity : Early mainstream ü Technology : see other slides 20

21 «Identity Life Cycle» Basic Changes Who? Access Rights? Assets? Rules? Policies? Data Model Discover Mine Engineer «Role Life cycle management» Refined Data Model Business Intelligence Governance Compliance Performance Business Decisions «Intelligent» Reports Analysis Model Correlate Report Authentications Autorizations Who did what? «Bulk» Reports Potential Enrichment SIEM ü Defini&on : «Bulk» Reports Advanced Basic Monitor & Report Who had this access? Identity & Access Governance Changes Advanced Security Incident & Event Monitoring DLP Data Loss Prevention NAC Network Access Control Iden7ty and Access Governance (IAG) is a broad discipline that ul7mately delivers a life cycle of control and decision making to the management of iden77es and how they are used to access systems, applica7ons and data. Role life cycle management is part of IAG, and is replaced on the Hype Cycle with IAG. ü Maturity : Adolescent ü Technology : IDM OIM 11g Oracle Iden&ty Analy&cs (OIA) 21 21

22 «Identity Life Cycle» Basic Changes Who? Access Rights? Assets? Rules? Policies? Data Model Discover Mine Engineer «Role Life cycle management» Refined Data Model Business Intelligence Governance Compliance Performance Business Decisions «Intelligent» Reports «Bulk» Reports Advanced Basic Monitor & Report Who had this access? Identity & Access Intelligence Changes Advanced Analysis Model Correlate Report Who did what? «Bulk» Reports Potential Enrichment SIEM ü Defini&on : Security Incident & Event Monitoring DLP Data Loss Prevention NAC Network Access Control Iden7ty and Access Intelligence (IAI) is the output derived from: Collec7ng iden7ty and access ac7vity and event data Correla7ng that data with iden7ty and access repositories Applying formal (BI) analy7cs to the collected informa7on in search of paberns and other useful knowledge for IT and the business Then using that output for: Repor7ng for compliance and IAM performance management Providing modeling and simula7on func7onality for applying en7tlements Providing the means to improve IAM and business decisions ü Maturity : Emerging ü Technology : Iden&ty GRC 22 Authentications Autorizations

23 Maturity Levels Maturity Level Status Products/Vendors Embryonic Emerging s presence Identity & Access Intelligence Adolescent Maturing technology capabilities and process understanding Uptake beyond early adopters Second generation Less customization Identity & Access Governance Early mainstream Proven technology Vendors, technology and adoption rapidly evolving Third generation More out of box Methodologies Public Key Operations IAM Services Consulting & Integration IAM Managed Services Federated Identity Management Mature mainstream Robust technology Not much evolution in vendors or technology Several dominant vendors User Provisioning Web Access Management Privilege Account Activity Management Legacy Obsolete 23

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for

More information

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM Toby Emden Vice President Strategy and Practices 2014 CONTENTS Evolution Business Drivers Provisioning

More information

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013 Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty

More information

C21 Introduction to User Access

C21 Introduction to User Access C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

Introduc)on to the IoT- A methodology

Introduc)on to the IoT- A methodology 10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Business Analysis Center of Excellence The Cornerstone of Business Transformation February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv. UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni [email protected] Master in Interna+onal Business and Economics Defini8on Performance

More information

WHY ANALYSE? BOB APOLLO

WHY ANALYSE? BOB APOLLO WHY ANALYSE? BOB APOLLO Analy-cs are the key that enables the VP of sales, sales opera-ons and front- end sales organiza-ons to move from a culture based only on gut feeling and percep-on- based decision

More information

Everything You Need to Know about Cloud BI. Freek Kamst

Everything You Need to Know about Cloud BI. Freek Kamst Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to

More information

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

White Paper The Identity & Access Management (R)evolution

White Paper The Identity & Access Management (R)evolution White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

Case Study. The SACM Journey at the Ontario Government

Case Study. The SACM Journey at the Ontario Government Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Introducing Data Visualiza2on Cloud Service

Introducing Data Visualiza2on Cloud Service Introducing Data Visualiza2on Cloud Service Vasu Murthy Sr. Director, Product Management Samar Lo2a VP of Development Oracle Business Analy2cs October 28, 2015 Note: The speaker notes for this slide include

More information

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Secure your cloud applications by building solid foundations with enterprise (security ) architecture Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

Uniting IAM and data protection for greater security

Uniting IAM and data protection for greater security E-Guide Uniting IAM and data protection for greater security There's been a new development in the information security world: content-aware identity and access management, an integration of two established,

More information

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &

More information

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases Elba Horta Regional Sales Manager, Southern Europe SSH Communica1ons Security [email protected] ENABLE,

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

The Right BI Tool for the Job in a non- SAP Applica9on Environment

The Right BI Tool for the Job in a non- SAP Applica9on Environment September 9 11, 2013 Anaheim, California The Right BI Tool for the Job in a non- SAP Applica9on Environment Speaker Name(s): Ty Miller Full Spectrum Business Intelligence Self Service Dashboards and Apps

More information

Identity and Access Management. Key Initiative Overview

Identity and Access Management. Key Initiative Overview Ray Wagner Research Managing Vice President This overview provides a high-level description of the Identity and Access Management Key Initiative. IT leaders can use this guide to understand what they need

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

Shannon Rykaceski Director of Opera4ons CCFHCC

Shannon Rykaceski Director of Opera4ons CCFHCC Shannon Rykaceski Director of Opera4ons CCFHCC PRESENTER BIO Shannon Salicce Rykaceski Director of Opera4ons for the Catholic Chari4es Free Health Care Center (CCFHCC), located in PiCsburgh, PA. Prior

More information

The Real Score of Cloud

The Real Score of Cloud The Real Score of Cloud Mayur Sahni Sr. Research Manger IDC Asia/Pacific [email protected] @mayursahni Digital Transformation Changing Role of IT Innova&on Informa&on Business agility Changing role of the

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision

More information

Investor Presenta,on Third Quarter 2014. 2014 ServiceNow All Rights Reserved 1

Investor Presenta,on Third Quarter 2014. 2014 ServiceNow All Rights Reserved 1 Investor Presenta,on Third Quarter 2014 2014 ServiceNow All Rights Reserved 1 FORWARD- LOOKING STATEMENTS, INDUSTRY AND MARKET DATA This presenta>on contains forward- looking statements that are based

More information

Identity Access Management Challenges and Best Practices

Identity Access Management Challenges and Best Practices Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

PROJECT PORTFOLIO SUITE

PROJECT PORTFOLIO SUITE ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.

More information

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview

More information

Private Cloud Website Solu2on

Private Cloud Website Solu2on Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business

More information

Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering

Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering Agenda Industry Trends Cloud Storage Evolu4on of Storage Architectures Storage Connec4vity redefined S3 Cloud Storage Use

More information

Strategy and Architecture to Establish 'Smart Plants'

Strategy and Architecture to Establish 'Smart Plants' Strategy and Architecture to Establish 'Smart Plants' About Intrigo We are a solu*on provider of Business Applica:ons focused on orchestra*ng Customer Value Networks in the changing SAP Enterprise technology

More information

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

THE KEY ADVANTAGES OF BUSINESS INTELLIGENCE AND ANALYTICS

THE KEY ADVANTAGES OF BUSINESS INTELLIGENCE AND ANALYTICS THE KEY ADVANTAGES OF BUSINESS INTELLIGENCE AND ANALYTICS With the help of business intelligence solutions, organizations can implement corrections and take necessary measures to improve efficiency in

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................

More information

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD

More information