SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Pre-­Con  Ed:  Privileged  Identity  Governance:  
Are  You  Certifying  Privileged  User  Access?
Robert  Marti
SCX207E
SECURITY
Product  Marketing
CA  Technologies
2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
©  2017  CA.  All  rights  reserved.  All  trademarks  referenced  herein  belong  to  their  respective  companies.
The  content  provided  in  this CA  World  2017  presentation  is  intended  for  informational  purposes  only  and  does  not  form  any  type  
of  warranty. The information  provided  by  a  CA  partner  and/or  CA  customer  has  not  been  reviewed  for  accuracy  by  CA.  
For  Informational  Purposes  Only  
Terms  of  This  Presentation
3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Abstract
Many  organizations  have  a  solution  to  control  the  access  and  actions  of  privileged  
users.  But  that’s  not  enough  for  a  complete  privileged  user  management  solution—you  
must  also  govern  access  to  make  sure  that  only  the  correct  users  have  elevated  
privileges,  and  that  they  have  only  the  privileges  that  they  need.  In  this  session,  you  
will  get  an  in-­depth  understanding  of  how  you  can  reduce  your  risk  through  this  
capability  unique  to  CA.  
Robert  Marti
CA  Technologies
Product  Marketing,  
Manager
4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Agenda
BUSINESS  CHALLENGES
INTRODUCING  PRIVILEGED  IDENTITY  GOVERNANCE
SOLUTION  OVERVIEW
USE  CASES
SUCCESS  STORY
1
2
3
4
5
5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Privileged  Identity  and  Access  Are  
Most  Frequently  Exploited  Attack  Vectors
71%
of  users  say  they  
have  access  to  data  
they  shouldn’t.    
80%
of  IT  Professionals  say  
their  company  does  not  
enforce  least  privilege.
80%
of  all  breaches  utilize  
lost,  stolen,  or  weak  
credentials.
60%
of  all  malware  uses  
privilege  escalation  
or  stolen  credentials.    
6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
BIGGEST  CYBER  ATTACKS  
EXPLOIT  PRIVILEGED  ACCESS
Creating  An  Expanding  Radius  of  Data  Loss
DROPBOX
68M Records  
LINKEDIN
167M Records  
YAHOO
500M Records  
EQUIFAX
150M Records  
TUMBLR
65M Records  
7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Excessive  Access  Causes
Embarrassing  Fraud  Cases
Loses  40G  of  source  
code  for  core  products
Adobe
Discloses  personal  data  
for  25M  customers
AT&T  Call  Center
Rogue  trader  aggregates  
privileges  for  a  $7.8B  loss
Société Général
Excessive  Access
CORRUPTS
PRIVILEGED  Access
CORRUPTS  ABSOLUTELY
8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
77%
The  Reason  This  is  Happening:
Pattern  is  Repeatable
77%  attacks  
Internal  Credentials  
30%
28%
Executives  &
Administrators
End-­users  with
Excessive  privileges
GAIN	
  
ACCESS/EXPAND
ELEVATE
PRIVILEGE
STEAL
DATA	
  
THE  KILL  CHAIN
Identity  is  the  most  
frequently  exploited  
attack  vector
9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
•HITECH
•GDPR
•FATCA
•FATCA
•PSD2
•HSPD
•HIPAA
•POPI
•201  CMR  17
•OAIC
•CalOPPA
•AADHAR
•PCI  DSS
•FFIEC
Where  Companies  Have  Not  Self-­Regulated
Others  Have  Imposed  Requirements
THE  GLOBAL
WEB  OF  PRIVACY  
COMPLIANCE
10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
So  It  Is  Not  Just  a  Technology  Problem
It  Is  a  Privileged  Governance  Problem
Privileged  Access  Request
Streamline  the  request,  audit  and  
fulfillment  of  privileged  users.
Certify  Privileged  
Access
Provide  audit  reporting  and  
manager  attestation  of  user  
access  to  privileged  accounts.
De-­provision  Privileged  
Access
When  users  separate  from  the  
company,  remove  or  disable  the  
associated  privileged  accounts.    
Remediate  Excessive  Access
Take  workflow  driven  action  to  
remove  excessive  access.
11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Challenges  to  the  Business
Issues  With  Legacy  IAM  Solutions
64%
of  enterprises  
have no  IAM  
monitoring  tools  
AS  A  RESULT:
LEGACY  IAM
SOLUTIONS:
Focused  on  
protecting  
on-­premise
applications
72%
of  enterprises  
do  not  do  
access  review  or  
certification
Were  highly  
customizable
and  required  
specialists
62%
of  enterprises  
have no  access  
request  process  
in  place
Had  significant  
costs  to  deploy,  
configure,  and  
maintain
12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Our  Privileged  Identity  Management  Solution
Leverages  a  Defense  in  Depth  Approach
INTEGRATED
OVERLAPPING
CONTROLS  TO
REDUCE  RISK
Privileged
Identity  Management  
Reducing  audit  risk  and  
achieving  least  privilege  
Advanced  
Authentication    
Preventing  account  
takeover  with  multifactor  
credentials
Threat  Analytics
for  PAM
Monitoring  privileged  
activities  for  abnormal  
usage/behaviors
PAM  Server  Control    
Locking  down  file  
systems  and  server  
resources  
Privileged  Access  
Manager
Securing  privileged  
access  and  preventing  
lateral  motion    
‹#› #CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED
Introducing  
CA  
Privileged  
Access  
Manager
§ Role-­based  and  fine-­grained  access  control  
over  privileged  accounts
§ Privileged  user  credential  protection
§ Monitor,  audit  and  record  privileged  sessions
§ Multifactor  authentication,  single  sign-­on,  and  
federation  support
§ Support  security  and  privacy  regulations  
#CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED
Lower  Total  Cost
of  Ownership
Faster  Time  
to  Value
Hybrid  Environment
Support
Performance  at
Scale
14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Why  Is  Privileged  Access  Governance  
Needed?
The  Situation  Today
§ Privileged  Access  Management  (PAM)  is  mostly  a  standalone
solution  that  implements  critical  security  and  compliance  controls  
managing  and  monitoring  use  of  sensitive  access.
§ In  most  cases,  it  is  separated from  the  corporate  Identity  Management.  
The  Outcome
§ Lack  of  overall  visibility  to  “who  has  access  to  what.”
§ Missing  approval  and  auditing  information  for  “why  access  was  granted.”
§ Inability  to  enforce  consistent  identity  policies  such  as  Segregation  Of  Duties.
§ No  risk  analysis  for  overall  user  access.
§ Fragmented  compliance  with  regulatory  requirements  (examples:  ISO27002  sections  
8.1.2  “ownership  of  assets”  and  9.2.5  “review  of  access  rights”).
‹#› #CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED
Introducing  
CA  
Identity
Suite
§ Self-­service  identity  portal
§ Business-­friendly  entitlements  catalog
§ Proactive  analytics
§ Deployment  Xpress
§ Audit  and  compliance  streamlining  
Privileged  Identity
Compliance
Privileged  Identity
Lifecycle  Management
Improved  Privileged
Access  Security
COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED
16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite
Integration  With  CA  Privileged  Access  Manager
How  it  integrates
§ Provides  “out-­of-­the-­box”  connector  for  CA  
PAM
What  is  does
§ Manages  PAM  Accounts  and  their  assignments  
to  Roles,  Groups,  &  Devices  (provisioning  and  
de-­provisioning)
§ Supports  for  local  and  LDAP/AD  accounts
§ Supports  for  granular  assignment  including  
start/end  dates,  scoping  and  policies  
17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite  &  CA  PAM  Integration  
Requesting  Privileged  Access
What  it  does
§ Easy-­to-­use  “shopping  cart”  experience  for  
requesting  PAM  permissions
§ Workflow  approvals  for  submitted  requests
§ Risk  analysis  of  a  combined  privileged  and  
non-­privileged  access
§ Segregation  of  duties  compliance  check
§ Automated  provisioning  fulfillment  
18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite  &  CA  PAM  Integration
Requesting  Access  to  Privileged  Account
19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite  &  CA  PAM  Integration
Evaluating  Risk  Associated  With  Requested  Account
20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite  &  CA  PAM  Integration
Requesting  Access  to  Privileged  Account
21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite  &  CA  PAM  Integration
Certifying  Privileged  Access
CA  PAM  Account  
certification
Update  HR  
reports
Mitigate  
access  risk
What  It  Does
§ Automated  collection  of  access  permissions  
via  CA  Identity  Suite  connector
§ Provides  “out-­of-­the-­box”  user  and  access  
certification  processes  for  CA  PAM
§ Easily  identifies  users  with  excessive  access
§ Enriches  experience  with  last  login  and  
usage  logs
§ Automated  removal  of  access  permissions  
that  are  rejected  by  approvers
22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
CA  Identity  Suite  and  CA  PAM  Integration
Reviewing  and  Certifying  Privileged  Access
23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
OFFBOARDINGONBOARDING
PROVISIONING
SELF-­SERVICE
ACCESS  REQUESTS
RISK  ANALYSIS
DEPROVISIONING
Privileged  Identity  Governance
Summary  of  Capabilities
CERTIFICATION
FULL
PRIVILEGED
IDENTITY
LIFECYCLE
MANAGEMENT
24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Case  Study
25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Business  Challenge:
Source  Code  Governance  at  CA  Technologies
3,000  engineers are  using  
over  12  major  source  code  
management  tools.
Access  audits were  a  drain  
on  people  and  money.
Compliance  audits took  
more  than 20,000  employee  
hours.
OUR  GOAL:
Govern  access  to  
source  code  and  
improve  productivity  
and  the  overall  user  
experience
OUR  CHALLENGE:
Manual  process  that  
was  extremely  costly
26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Solution:
CA  Identity  Governance
• All  access  reviews  are  now  
performed  via  automation.
• Incorrect  access  is  quickly
remediated.  
• IP  controls  are  much  easier to  
execute,  and…
• Frequent  Engineering  personnel  
changes  can  be  handled  quickly
while  still  enforcing  strong  security  
over  the  source  code.
CA  Identity  
GovernanceEngineers
(>3,000)
Manager
Certifies
Access
Auditor
Validates
Certification
Source  Code
Repositories
(>5,000)
Requests
access
Access
granted
CA  Identity  Governance  validates  access  rights  to  nearly  5,000  
source  code  repositories  across  all  source  management  tools.
27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Results:
Significant  Time  &  Cost  Savings
75%
75%  reduction
in  audit  time  via  
automated  data  
collection  for  
compliance  audits
90%
90%  drop
in  administrative  
overhead
Engineers  love the  new  
world-­class  source  code  
management  ecosystem
Orphan  source  code  access
quickly  identified  and  removed
Saved  thousands  of  hours
of  employee  time  thanks  
to  automated  certification
28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Recommended  Sessions
SESSION  # TITLE DATE/TIME
ABC123DE   Magna  consectet at  lor ipustie modolore 11/16/2016  at  10:00  am
FGH456IJ Magna  consectet at  lor ipustie modolore 11/17/2016  at  11:00  am
FGH456IJ Magna  consectet at  lor ipustie modolore 11/18/2016  at  12:00  pm
29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
The  Results:
A Closer  Look  at  the  Savings
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
16.00
FY14 FY15 FY16 FY17
PERSON    YEARS Savings  in  Source  Code  Attestation
30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Must  See  Demos
Security  
Starts  
With  
Identity
Security  Content
Area
Demo  
Name
Name
Location
Control  
High  Value
Access
Manage  
Your  
Software  
Risk
Let’s  Talk  
Upgrades
Deliver
Frictionless
Access
Security  Content
Area
Security  Content
Area
Security  Content
Area
Security  Content
Area
31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Questions?
32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Stay  connected  at  communities.ca.com
Thank  you.
33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Security
For  more  information  on  Security,
please  visit:  http://cainc.to/CAW17-­Security

Contenu connexe

Tendances

Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First StrategyFlexera
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementCA Technologies
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!CA Technologies
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why Flexera
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICAmazon Web Services
 

Tendances (20)

Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 

Similaire à Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged User Access?

Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, TooBomgar
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...apidays
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Bomgar
 
AWS Startup Day Kyiv: AWS Security Best Practices
AWS Startup Day Kyiv: AWS Security Best PracticesAWS Startup Day Kyiv: AWS Security Best Practices
AWS Startup Day Kyiv: AWS Security Best PracticesAmazon Web Services
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceAmazon Web Services
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CloudIDSummit
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementCA Technologies
 
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksOWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksAndre Van Klaveren
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPGourav Ladha
 
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...CA Technologies
 
Avoid Unhappy Returns: Proactively Plug Your Revenue Leaks
Avoid Unhappy Returns: Proactively Plug Your Revenue LeaksAvoid Unhappy Returns: Proactively Plug Your Revenue Leaks
Avoid Unhappy Returns: Proactively Plug Your Revenue LeaksDevOps.com
 

Similaire à Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged User Access? (20)

Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
AWS Startup Day Kyiv: AWS Security Best Practices
AWS Startup Day Kyiv: AWS Security Best PracticesAWS Startup Day Kyiv: AWS Security Best Practices
AWS Startup Day Kyiv: AWS Security Best Practices
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to Maintenance
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksOWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAP
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
 
Avoid Unhappy Returns: Proactively Plug Your Revenue Leaks
Avoid Unhappy Returns: Proactively Plug Your Revenue LeaksAvoid Unhappy Returns: Proactively Plug Your Revenue Leaks
Avoid Unhappy Returns: Proactively Plug Your Revenue Leaks
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...CA Technologies
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...CA Technologies
 
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...CA Technologies
 

Plus de CA Technologies (17)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
 
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
 

Dernier

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged User Access?

  • 1. Pre-­Con  Ed:  Privileged  Identity  Governance:   Are  You  Certifying  Privileged  User  Access? Robert  Marti SCX207E SECURITY Product  Marketing CA  Technologies
  • 2. 2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ©  2017  CA.  All  rights  reserved.  All  trademarks  referenced  herein  belong  to  their  respective  companies. The  content  provided  in  this CA  World  2017  presentation  is  intended  for  informational  purposes  only  and  does  not  form  any  type   of  warranty. The information  provided  by  a  CA  partner  and/or  CA  customer  has  not  been  reviewed  for  accuracy  by  CA.   For  Informational  Purposes  Only   Terms  of  This  Presentation
  • 3. 3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Abstract Many  organizations  have  a  solution  to  control  the  access  and  actions  of  privileged   users.  But  that’s  not  enough  for  a  complete  privileged  user  management  solution—you   must  also  govern  access  to  make  sure  that  only  the  correct  users  have  elevated   privileges,  and  that  they  have  only  the  privileges  that  they  need.  In  this  session,  you   will  get  an  in-­depth  understanding  of  how  you  can  reduce  your  risk  through  this   capability  unique  to  CA.   Robert  Marti CA  Technologies Product  Marketing,   Manager
  • 4. 4 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Agenda BUSINESS  CHALLENGES INTRODUCING  PRIVILEGED  IDENTITY  GOVERNANCE SOLUTION  OVERVIEW USE  CASES SUCCESS  STORY 1 2 3 4 5
  • 5. 5 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Privileged  Identity  and  Access  Are   Most  Frequently  Exploited  Attack  Vectors 71% of  users  say  they   have  access  to  data   they  shouldn’t.     80% of  IT  Professionals  say   their  company  does  not   enforce  least  privilege. 80% of  all  breaches  utilize   lost,  stolen,  or  weak   credentials. 60% of  all  malware  uses   privilege  escalation   or  stolen  credentials.    
  • 6. 6 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS BIGGEST  CYBER  ATTACKS   EXPLOIT  PRIVILEGED  ACCESS Creating  An  Expanding  Radius  of  Data  Loss DROPBOX 68M Records   LINKEDIN 167M Records   YAHOO 500M Records   EQUIFAX 150M Records   TUMBLR 65M Records  
  • 7. 7 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Excessive  Access  Causes Embarrassing  Fraud  Cases Loses  40G  of  source   code  for  core  products Adobe Discloses  personal  data   for  25M  customers AT&T  Call  Center Rogue  trader  aggregates   privileges  for  a  $7.8B  loss Société Général Excessive  Access CORRUPTS PRIVILEGED  Access CORRUPTS  ABSOLUTELY
  • 8. 8 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS 77% The  Reason  This  is  Happening: Pattern  is  Repeatable 77%  attacks   Internal  Credentials   30% 28% Executives  & Administrators End-­users  with Excessive  privileges GAIN   ACCESS/EXPAND ELEVATE PRIVILEGE STEAL DATA   THE  KILL  CHAIN Identity  is  the  most   frequently  exploited   attack  vector
  • 9. 9 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS •HITECH •GDPR •FATCA •FATCA •PSD2 •HSPD •HIPAA •POPI •201  CMR  17 •OAIC •CalOPPA •AADHAR •PCI  DSS •FFIEC Where  Companies  Have  Not  Self-­Regulated Others  Have  Imposed  Requirements THE  GLOBAL WEB  OF  PRIVACY   COMPLIANCE
  • 10. 10 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS So  It  Is  Not  Just  a  Technology  Problem It  Is  a  Privileged  Governance  Problem Privileged  Access  Request Streamline  the  request,  audit  and   fulfillment  of  privileged  users. Certify  Privileged   Access Provide  audit  reporting  and   manager  attestation  of  user   access  to  privileged  accounts. De-­provision  Privileged   Access When  users  separate  from  the   company,  remove  or  disable  the   associated  privileged  accounts.     Remediate  Excessive  Access Take  workflow  driven  action  to   remove  excessive  access.
  • 11. 11 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Challenges  to  the  Business Issues  With  Legacy  IAM  Solutions 64% of  enterprises   have no  IAM   monitoring  tools   AS  A  RESULT: LEGACY  IAM SOLUTIONS: Focused  on   protecting   on-­premise applications 72% of  enterprises   do  not  do   access  review  or   certification Were  highly   customizable and  required   specialists 62% of  enterprises   have no  access   request  process   in  place Had  significant   costs  to  deploy,   configure,  and   maintain
  • 12. 12 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Our  Privileged  Identity  Management  Solution Leverages  a  Defense  in  Depth  Approach INTEGRATED OVERLAPPING CONTROLS  TO REDUCE  RISK Privileged Identity  Management   Reducing  audit  risk  and   achieving  least  privilege   Advanced   Authentication     Preventing  account   takeover  with  multifactor   credentials Threat  Analytics for  PAM Monitoring  privileged   activities  for  abnormal   usage/behaviors PAM  Server  Control     Locking  down  file   systems  and  server   resources   Privileged  Access   Manager Securing  privileged   access  and  preventing   lateral  motion    
  • 13. ‹#› #CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED Introducing   CA   Privileged   Access   Manager § Role-­based  and  fine-­grained  access  control   over  privileged  accounts § Privileged  user  credential  protection § Monitor,  audit  and  record  privileged  sessions § Multifactor  authentication,  single  sign-­on,  and   federation  support § Support  security  and  privacy  regulations   #CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED Lower  Total  Cost of  Ownership Faster  Time   to  Value Hybrid  Environment Support Performance  at Scale
  • 14. 14 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Why  Is  Privileged  Access  Governance   Needed? The  Situation  Today § Privileged  Access  Management  (PAM)  is  mostly  a  standalone solution  that  implements  critical  security  and  compliance  controls   managing  and  monitoring  use  of  sensitive  access. § In  most  cases,  it  is  separated from  the  corporate  Identity  Management.   The  Outcome § Lack  of  overall  visibility  to  “who  has  access  to  what.” § Missing  approval  and  auditing  information  for  “why  access  was  granted.” § Inability  to  enforce  consistent  identity  policies  such  as  Segregation  Of  Duties. § No  risk  analysis  for  overall  user  access. § Fragmented  compliance  with  regulatory  requirements  (examples:  ISO27002  sections   8.1.2  “ownership  of  assets”  and  9.2.5  “review  of  access  rights”).
  • 15. ‹#› #CAWORLD #NOBARRIERS COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED Introducing   CA   Identity Suite § Self-­service  identity  portal § Business-­friendly  entitlements  catalog § Proactive  analytics § Deployment  Xpress § Audit  and  compliance  streamlining   Privileged  Identity Compliance Privileged  Identity Lifecycle  Management Improved  Privileged Access  Security COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED
  • 16. 16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite Integration  With  CA  Privileged  Access  Manager How  it  integrates § Provides  “out-­of-­the-­box”  connector  for  CA   PAM What  is  does § Manages  PAM  Accounts  and  their  assignments   to  Roles,  Groups,  &  Devices  (provisioning  and   de-­provisioning) § Supports  for  local  and  LDAP/AD  accounts § Supports  for  granular  assignment  including   start/end  dates,  scoping  and  policies  
  • 17. 17 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite  &  CA  PAM  Integration   Requesting  Privileged  Access What  it  does § Easy-­to-­use  “shopping  cart”  experience  for   requesting  PAM  permissions § Workflow  approvals  for  submitted  requests § Risk  analysis  of  a  combined  privileged  and   non-­privileged  access § Segregation  of  duties  compliance  check § Automated  provisioning  fulfillment  
  • 18. 18 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite  &  CA  PAM  Integration Requesting  Access  to  Privileged  Account
  • 19. 19 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite  &  CA  PAM  Integration Evaluating  Risk  Associated  With  Requested  Account
  • 20. 20 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite  &  CA  PAM  Integration Requesting  Access  to  Privileged  Account
  • 21. 21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite  &  CA  PAM  Integration Certifying  Privileged  Access CA  PAM  Account   certification Update  HR   reports Mitigate   access  risk What  It  Does § Automated  collection  of  access  permissions   via  CA  Identity  Suite  connector § Provides  “out-­of-­the-­box”  user  and  access   certification  processes  for  CA  PAM § Easily  identifies  users  with  excessive  access § Enriches  experience  with  last  login  and   usage  logs § Automated  removal  of  access  permissions   that  are  rejected  by  approvers
  • 22. 22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS CA  Identity  Suite  and  CA  PAM  Integration Reviewing  and  Certifying  Privileged  Access
  • 23. 23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS OFFBOARDINGONBOARDING PROVISIONING SELF-­SERVICE ACCESS  REQUESTS RISK  ANALYSIS DEPROVISIONING Privileged  Identity  Governance Summary  of  Capabilities CERTIFICATION FULL PRIVILEGED IDENTITY LIFECYCLE MANAGEMENT
  • 24. 24 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Case  Study
  • 25. 25 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Business  Challenge: Source  Code  Governance  at  CA  Technologies 3,000  engineers are  using   over  12  major  source  code   management  tools. Access  audits were  a  drain   on  people  and  money. Compliance  audits took   more  than 20,000  employee   hours. OUR  GOAL: Govern  access  to   source  code  and   improve  productivity   and  the  overall  user   experience OUR  CHALLENGE: Manual  process  that   was  extremely  costly
  • 26. 26 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Solution: CA  Identity  Governance • All  access  reviews  are  now   performed  via  automation. • Incorrect  access  is  quickly remediated.   • IP  controls  are  much  easier to   execute,  and… • Frequent  Engineering  personnel   changes  can  be  handled  quickly while  still  enforcing  strong  security   over  the  source  code. CA  Identity   GovernanceEngineers (>3,000) Manager Certifies Access Auditor Validates Certification Source  Code Repositories (>5,000) Requests access Access granted CA  Identity  Governance  validates  access  rights  to  nearly  5,000   source  code  repositories  across  all  source  management  tools.
  • 27. 27 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Results: Significant  Time  &  Cost  Savings 75% 75%  reduction in  audit  time  via   automated  data   collection  for   compliance  audits 90% 90%  drop in  administrative   overhead Engineers  love the  new   world-­class  source  code   management  ecosystem Orphan  source  code  access quickly  identified  and  removed Saved  thousands  of  hours of  employee  time  thanks   to  automated  certification
  • 28. 28 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Recommended  Sessions SESSION  # TITLE DATE/TIME ABC123DE   Magna  consectet at  lor ipustie modolore 11/16/2016  at  10:00  am FGH456IJ Magna  consectet at  lor ipustie modolore 11/17/2016  at  11:00  am FGH456IJ Magna  consectet at  lor ipustie modolore 11/18/2016  at  12:00  pm
  • 29. 29 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS The  Results: A Closer  Look  at  the  Savings 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 16.00 FY14 FY15 FY16 FY17 PERSON    YEARS Savings  in  Source  Code  Attestation
  • 30. 30 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Must  See  Demos Security   Starts   With   Identity Security  Content Area Demo   Name Name Location Control   High  Value Access Manage   Your   Software   Risk Let’s  Talk   Upgrades Deliver Frictionless Access Security  Content Area Security  Content Area Security  Content Area Security  Content Area
  • 31. 31 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Questions?
  • 32. 32 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Stay  connected  at  communities.ca.com Thank  you.
  • 33. 33 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Security For  more  information  on  Security, please  visit:  http://cainc.to/CAW17-­Security