19
Identity + Security: Welcome to your new career Chris Sullivan (Sully) SVP, Chief Information Security Office

Identity + Security: Welcome to Your New Career

Embed Size (px)

Citation preview

Page 1: Identity + Security: Welcome to Your New Career

Identity  +  Security:Welcome  to  your  new  career

Chris  Sullivan  (Sully)  SVP,  Chief  Information  Security  Office

Page 2: Identity + Security: Welcome to Your New Career

Securing  Digital  BusinessSecureAuth,  Core  Security,  Damballa,  Courion,  Secure  Reset,  Bay31

• We  are  leaders  in  IDM,  IGA,  SSO,  Adaptive  Auth,  TI,  Vulnerability  Management,  Pen-­‐Testing,  Threat  Detection,  Threat  Intel

• We  do  primary  research,  analytics,  automation  and  orchestration  across  the  entire  threat  surface

Page 3: Identity + Security: Welcome to Your New Career

Raison  D'être

Page 4: Identity + Security: Welcome to Your New Career

Device  Centric  InvestigationsThe  Old  Way

Defense  In-­‐Depth Manual  Response

Limited  Control  Over  Devices

Manual  Investigation

Silos  Of  Data

Alert  Overload

Alert  FatiguePoint  ProductsFocused  On  Devices

O R C H E S T R A T I O NI D E N T I T Y C A S E   M G M TA N A L Y T I C S A U T O M AT I O N

LACKS

Page 5: Identity + Security: Welcome to Your New Career

This  Looks  Simple  but  It’s  Not

Page 6: Identity + Security: Welcome to Your New Career
Page 7: Identity + Security: Welcome to Your New Career

Attack  Paths  are  Complicated

Page 8: Identity + Security: Welcome to Your New Career

Access  Attack  PathsBillions  of  Changing  Relationships

I D EN T I T Y

AC COUNT S

EN T I T L EMEN T S

RO L E S

A P P L I C AT I ON S

Page 9: Identity + Security: Welcome to Your New Career

Separation  of  Duties

Page 10: Identity + Security: Welcome to Your New Career

Privileged  Access

Page 11: Identity + Security: Welcome to Your New Career

Real  Attack  Paths  are  Real  Complicated

Page 12: Identity + Security: Welcome to Your New Career

The  Role  of  Identity  in  Digital  Business  is  Evolving  

ITEfficiency

ITComplianceSecurity

Business  Agility

Scale

UX

API

API

AI

Page 13: Identity + Security: Welcome to Your New Career

I N T E L L I G ENT   I D ENT I T Y   I S   V I TA L /NECES SARY   FOR   S ECUR I T Y

Page 14: Identity + Security: Welcome to Your New Career

Identity  Security  AutomationThe  Only  Way

O R C H E S T R A T I O NI D E N T I T Y C A S E   M G M TA N A L Y T I C S A U T O M AT I O N

IDENTITY  SECURITY  AUTOMATION

Any  | Any  |  Any

Identity  Centric  TelemetryDevice  Agnostic

WORKFORCEPARTNERS

CONSUMERS

ANY  USER ANY  DEVICE

MOBILETABLETLAPTOPSERVER

ANY  PATH

CLIENT  APPMOBILE  APPBROWSEREMAIL

Contextual  Evidence

Orchestration  ofSiloed  Data

Identity  Context

Authentication  Attempts

Network  Behavior

Vulnerable  Attack  Paths

3rd Party  Sec.  Controls

Automated  Investigation

Analytics  Driven  Case  Mgmt.With  High  Confidence

Adaptive  Automation

Playbooks  for  Rapid  ResponseAt  Identity  Layer  &  Beyond

Page 15: Identity + Security: Welcome to Your New Career

CONVENTIONALVIEW  OF  ACCESS

CLUSTER  ANALYSISOF  ACCESS

LINK  ANALYSISOF  ACCESS

ATTACK  PATHREVIEW

Page 16: Identity + Security: Welcome to Your New Career

Reducing  Business  Friction  SecurelyAdaptive  Authentication

Device  Recognition

Threat  Service

Directory  Lookup

Geo-­‐Location

Geo-­‐Velocity

Geo-­‐Fencing

Phone  Number  Fraud  Prevention

Behavioral  Biometrics

Identity  Governance

User  &  Entity  Behavior  Analytics

Do  we  recognize  this  device?Associated  with  a  user  we  know?

Real-­‐time  Threat  IntelligenceIP  Address  Interrogation

Group  membership  and  attribute  checking

Request  coming  from  a  known  location?Do  we  have  employees,  partners  or  customers  here?

Has  an  improbable  travel  event  taken  place?

Track  normal  behaviorLooking  for  anomalies

Who  should/does  have  access  rights?High  Access  Rights  =  greater  risk/vulnerability

Access  request  coming  from  within  or  outside  a  geographic  barrier

Typing  Sequences  &  Mouse  MovementsUnique  to  each  user  on  each  device

Reduce  #  of  OTPs,  Block  device  class,Identify  “porting”  status,  Block  by  carrier

Page 17: Identity + Security: Welcome to Your New Career

Behind  the  Buzz  of  AISubtitle  left

Page 18: Identity + Security: Welcome to Your New Career

214– Allow  us  to  continue  to  assist

Extract  IP  address  from  major  target  systems  and  evaluate  activity  

Gain  Awareness

Define  criteria  to  determine  level  of  acceptance  by  use  case  or  user  category  

Understand  seasonality  and  impact  to  risk  tolerance  

Assess  Acceptable  Risk

Create  metrics  for  success  (near  term,  mid  term,  long  term)

Determine  success?  

Make  a  time  investment  in  a  Risk  Awareness  Workshop

Page 19: Identity + Security: Welcome to Your New Career

© 2017  by  SecureAuth +  Core  Security  All  rights  reserved

Thank  you…  Thank  you  very  much.