44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 303 495 3123 Cell +1 303 995 5387

Slides:



Advertisements
Similar presentations
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Advertisements

Overview of Web Services
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Xavier Verhaeghe Vice President Oracle Security Solutions
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
The Open Group: An Introduction Interoperable Informatics Infrastructure Consortium May 6th, 2003 Your Name Title Mobile GSM
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Generic AAA model in Grids IRTF - AAAARCH meeting IETF 52 – Dec 14 th Salt Lake City Leon Gommans Advanced Internet Research Group.
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
Cloud Usability Framework
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
An Overview of TOGAF® Version 9.1
PRESENTATION OF ETSI © ETSI All rights reserved Sophia Antipolis, 22 May 2014 Luis Jorge Romero Director General, ETSI.
Lessons Learned in Smart Grid Cyber Security
Authentication & Authorization: Security and Integrity in the Cloud Desmond White July 3,
Chapter 6 of the Executive Guide manual Technology.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
SWIM-SUIT Information Models & Services
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
OFFICE OF INFORMATION TECHNOLOGY Identity & Access Management at BYU.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Copyright © The Open Group 2014 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Copyright © The Open Group 2011 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Copyright © The Open Group 2015 Open Platform 3.0™ Overview – 3 rd June 2015 Dr Christopher J Harding Director for Interoperability
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
June California Investor Owned Utilities (IOU) HAN vision statement development 15 June 2007.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Network Centric Operations Industry Consortium The Intersection of Cloud Computing and Cyber Security Melvin Greer, NCOIC Vice Chair, Cloud Computing Working.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
© 2016 ForgeRock. All rights reserved. Lars Gunnar Tiben – Senior Customer Engineer Nordic
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Clouding with Microsoft Azure
Open Platform 3.0™ Overview – 3rd August 2016 Dr Christopher J Harding
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Data and Applications Security Developments and Directions
Security and Boundaryless Information Flow
BOMGAR REMOTE SUPPORT Karl Lankford
Securing Cloud-Native Applications Jason Schmitt CEO
Azure Availability, Reliability, and Performance
Standards Are For The Guidance Of The Wise
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
Collaboration Oriented Architecture COA Position Paper An Overview
ITU-T Workshop on Security, Seoul (Korea), May 2002
IT Management Services Infrastructure Services
The Intelligent Enterprise and SAP Business One
Zero Trust in Practice: Identity Drives an Adaptive Workforce
Presentation transcript:

44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell Jim Hietala Vice President, Security

Security Forum Vision & Mission l The Open Group: Boundaryless Information Flow, achieved through global interoperability in a secure, reliable and timely manner l The Open Group Security Forum: To facilitate the rapid development of secure architectures supporting boundaryless information flow through: n Development of industry standards, either independently or through co- operation (adopt, adapt, publish) n Developing guides, business rationales & scenarios, use cases n Developing reference and common system architectures, and support services l The Open Group also manages and supports the Jericho Forum

IT Changes Affecting Security n Web 2.0 coming to most enterprises, like it or not n Consumerization of IT with mobile devices n Shift in user patterns – an increasing % of user logins are now contractors, consultants, and business partners n Perimeter security model proving ineffective at securing this evolving environment

Web Security Study Web Application Security Consortium, 2007, and White Hat Security, analysis of 600+ sites n 7% of sites compromised automatically n 7.7% of sites had a high severity detectable through scanning n 9 of 10 sites have at least one serious vulnerability n Average of 7 vulnerabilities/site

Security Standards Needs Exist at Multiple Levels… n Security function interoperability- SAML, XACML, etc. n Implementation level…ISO27002, PCI DSS, etc. n Architecture – need for new standard security architecture describing information-centric vs. perimeter- centric security

Standards: CDSA- Authentication API AZN-API- Authorization API UAS Standards: DCE- Distributed Computing Environment XBSS- Baseline Security Services XDSF- Distributed Security Framework GSS API- Generic Security Services Standards: XDAS- Distributed Audit Service APKI- Architecture for Public Key Encryption XSSO- Single Sign-On CDSA Guides, White Papers: Security, Privacy, DRM, Identity Management, PKI, IdM Architectures, Security Design Patterns, Electronic Chattel Paper, Trust models, Common Core Identifiers The Open Group Security Forum Key Accomplishments Guides, White Papers: Information Security Strategy 12/2007: Integration of Network Applications Consortium

The Open Group: Future Security Activities n Continued support of Jericho Forum activities n Ongoing standards work in these areas: l Risk management taxonomy l Secure Mobile Architectures l Trust models l XML platform compliance reporting l Standard security architectures n Initiating Security Practitioners Conferences l Workshop approach to develop understanding and requirements around key emerging security issues such as Cloud Computing and Virtualization

Thank You!