Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ.

Slides:



Advertisements
Similar presentations
Validator for Identity Manager Save Time, Improve Quality and Reduce Deployment Costs.
Advertisements

Confidential & Proprietary to Cooper Compliance Corporation Revised September 8, 2014 AUDiT-READY TM.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2011 Autodesk Go Big or Go Home! Part 1 – Large Scale Autodesk Vault Deployments Irvin Hayes Jr. Technical Product Manager.
Damian Leibaschoff Support Escalation Engineer Microsoft.
Security for Today’s Threat Landscape Kat Pelak 1.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Novell Vibe Webinar: Basic Business Issues March 6 th and 8 th Adam Wingate, Justin Larson, Landon Stott, Craig Altom Vibe Resource Library
50 Migrations in Less Than 24 Hours Name Title Date.
02 | Managing Users, Groups, and Licenses Anthony Steven | Principal Technologist, Content Master Martin Coetzer | Portfolio Architect, Microsoft.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Executive Overview. PLEASE READ (hidden slide) To deliver this presentation effectively, you need to be familiar with Windows Server 2008 R2 management.
Technical Overview. PLEASE READ (hidden slide) To deliver this presentation effectively, you need to be familiar with Windows Server 2008 R2 management.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
| |
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2011 Autodesk Suites and CAD Managers Jerry Milana Autodesk Consulting.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Rethink Your Disaster Recovery Name Title Date. © 2011 NetIQ Corporation. All rights reserved. 2 Agenda The need for disaster recovery (DR) The traditional.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Identifying Security Opportunities NetIQ Security Solution
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Security Planning and Administrative Delegation Lesson 6.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications.
Hosting an Enterprise Financial Forecasting Application with Terminal Server Published: June 2003.
Mario D’Silva National Technology Specialists Unified Communications UNC307.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
© 2013 Autodesk Autodesk Upgrade Discontinuation Presenter Name Presenter Title 2013.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Join us on Twitter: #AU2014. Class summary text goes here Class summary.
Certified NetIQ Salesperson 2015: IT Operations Management Solutions.
© 2012 Autodesk The Picture Says It All: Commercial Site Plan 3D Visualizations Using Autodesk® IDS John Sayre Civil Application Engineer.
© 2011 Autodesk The Suite Life of AutoCAD® Guillermo Melantoni Sr Product Manager: Workflows and Interoperability at Autodesk.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
© 2012 Autodesk Collaboration Systems – It’s good to share Martin Duke Business Systems Manager.
1 © Copyright 2015 EMC Corporation. All rights reserved. What’s new in RSA Via Lifecycle and Governance 7.0 RSA Customer Update – July 2015.
19 Copyright © 2004, Oracle. All rights reserved. Database Backups.
THE CENTRAL SECURITY PLATFORM GUARDIAN360 IS PART OF THE INTERMAX GROUP.
Automate. Integrate. Accelerate. Eliminating Processing Bottlenecks in the Oracle E-Business Suite Financial Period Close NorCalOAUG 2007.
© 2014 Autodesk Getting started with Desktop Subscription.
The time to address enterprise mobility is now
Deployment Planning Services
Deployment Planning Services
SaaS Application Deep Dive
Business Connectivity Services in SharePoint 2010 and Office 2010
Microsoft Dynamics GP 2015 New Features
Forensics Week 11.
CMGT 245 Education for Service-- snaptutorial.com.
CMGT 245 Teaching Effectively-- snaptutorial.com.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
ე ვ ი ო Ш Е Т И О А С Д Ф К Ж З В Н М W Y U I O S D Z X C V B N M
Chapter # 3 COMPUTER AND INTERNET CRIME
Microsoft Data Insights Summit
SQL Server Assessment Results
Active Directory Assessment Results
Windows Client Assessment Results
Active Directory Security Assessment Results
Microsoft Virtual Academy
Presentation transcript:

Risk Based Identity Governance Ken Willén, Senior System Engineer NetIQ

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 2 Identity governance is often a time-consuming necessity, of which it can be hard to prove the business value With Risk Based Governance, the required re- certifications will be based on the risk the different entitlements poses to the business and the employees actual use or misuse of them

3 All types of attacks misuse Identities! Insider attacks Accidental disclosures Hackers Advanced Persistent Threats

Identity is the key

5 Focus on the basics Identity, Access & Security together Enforce access controls Monitor user activity Minimize rights

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 6 Minimize rights - Re-Certification

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 7 The Burden of Re-certification Cost: Static re-certification schema: – Re-certification of users with no change Security: Re-certification according to potential risk – Re-certification schema does not follow increased/de-creased actual company risk – Re-certification is done with no insight in real use or potential misuse of entitlements – Too many re-certifications leads to bulk execution

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 8 Risk Based Re-Certification - Identity, Access and Security Together Has he logged on to the application in the last 6 month? Do he show suspicious behavior on high risk applications? Has his entitlements changed since the last full review?

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 9 Context Enrichment

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 10 Summary Identities poses a threat to our business Re-certification can minimize risk - but is costly Risk Based Re-certification improves security and reduces costs

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. 11

This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.