PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Identity, Governance and Administration as forefront of IT Security model: European and North American Experience Vladislav Shapiro Director of Identity.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Cloud Usability Framework
Network security policy: best practices
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Microsoft Identity and Access Solutions Market Trends and Futures
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Unify and Simplify: Security Management
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Continuous Monitoring for Enterprise Applications: Real Needs, Real Solutions. November 22, th Continuous Assurance and Auditing Symposium Newark,
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
CSAS 2009 Running Windows as a Non- Administrator or how I learned to love “User” By: Kasey Dennler.
KMS Products By Justin Saunders. Overview This presentation will discuss the following: –A list of KMS products selected for review –The typical components.
Information Assurance Policy Tim Shimeall
1 The World Bank Internet Services Program Rajan Bhardvaj
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Absence Management System (AMS) Project & System Introduction County of Los Angeles October 2011.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
5/18/2006 Department of Technology Services Security Architecture.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Privileged Access Management (PAM) with MIM 2016
Security Solutions Rachana Ananthakrishnan University of Chicago.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
MIM/PAM Case Study Dean Guenther IAM Manager Washington State University May 2016 Copyright 2016, Washington State University.
Gateways security Aashish Sharma Security Engineer National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
19 Copyright © 2008, Oracle. All rights reserved. Security.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Cloud Computing Q&A Presented by:
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
System Management Issues for the Future Real-Time University Environment Tom Board September 22, 2004 Northwestern University Information Technology.
SaaS Application Deep Dive
Recommending a Security Strategy
BOMGAR REMOTE SUPPORT Karl Lankford
ESA Single Sign On (SSO) and Federated Identity Management
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
What are IAM Key Processes.
Protecting your data with Azure AD
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

PRESENTATION TITLE Presented by: Xxxx Xxxxx

Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000 employees

Topics of Discussion Capabilities IAM tools can bring. Challenges of implementing an IAM tool in the enterprise. How you can improve your security program with an IAM tool.

What is Identity Management  In short it’s the ability to provide provisioning and governance of users within your environment. This includes:  Password Management  Access Requests  Enforcement of role based policies

Capabilities IAM tools can bring to bear around Identity & Access Governance:  Management of employee life cycle from beginning to end.  Provides an overall view of how effective your policies are.  Centralize authentication and authorization of applications across an enterprise.  Gives greater transparency into who has access to what.  Reduce the fears that management has around Identity and Access Governance.

Management of employee life cycle  Add an employee  Move an employee  Employee leaves

Provides an overall view of how effective your polices are by:  Providing reports that show employee violations of polices.  Showing you where there could be potential conflicts with a role or group that could limit an employee’s productivity.

Centralize authentication and authorization of applications across an enterprise  Provides accountability  Allows for the burden of account management to be taken off a department like applications support.  One piece of software can control access to all applications in an enterprise reducing redundancy.

Allows for greater transparency  Gives a high level of who has access and to what based on role or group.  Shows who your super users are and where your areas of high risk are.

High Privilege Group

Reduce managements fears around Identity and Access Governance  Executives and Mangers both fear  Providing leadership with tangible results that allow them the necessary transparency to see that the IAM program is working. Account management is being done incorrectly For the integrity of their data and applications

Report Summary

Privilege group membership report

Challenges Implementing an IAM tool within the enterprise:  Required skills and resources to be successful.  Scoping what you are going to handle and what you are not. (eg. Cloud applications)  Getting buy in and cooperation from other departments.

Required skills and resources to be successful  Understanding different environments.  How does the software work?  Support from the vendor  Trouble shooting

Understanding different environments  What infrastructure are you connecting to (AD, SharePoint, database) and how does it look?  How does that connection work (flat file, database connection etc.)?

How does the software work?  What OS does the software run on?  Needed programming skills  What upkeep skills are needed to keep the machine happy (eg.patching, upgrades)

Rule to add multiple groups to a certification (Java beans)

Support from the vendor  Monthly and Weekly meeting with account manager Discuss projects Discuss milestones Discuss outstanding objectives

Trouble shooting  Who can you call?  What resources are available? Expert Services Customer Portal Google etc.

Scoping what you are going to handle and what you are not?  Hosted & non-hosted applications?  Provisioning or governance?  What is going to be the goal of your IAM program?

How to get buy in from:  Your Leadership.  Your Managers

Getting buy in from Leadership  Show how this is beneficial to the company.  Show you need it even if you haven’t had a problem.

Getting buy in from Managers  Setting up a relationship with our managers.  Straight forward and easy for mangers.

Manager certification

Manager Certification cont.

How you can improve your security program with an IAM tool :  Allows for better creation of role based polices.  Used as a provisioning tool allows for better management of employee life cycle.  Reduce your attack surfaces.

Allows for better creation of role based policies:  Clarity around when to use least privilege.  Performing audits and reports.  High level view allows you to make more informed decisions when setting up rules.

Used as a provisioning tool allows for better management of employee life cycle Setup includes:  Password Management  Application Access  Closing of Accounts

Reduction in attack surface.  Able to clean up old accounts that could be used to access sensitive information.  Mitigates the insider threat.  High privilege accounts can be monitored.  Reduces the risk of super user accounts being created by having it approved by another dept.  Forrester study showed “insiders” were the top source of breaches in the last 12 months. 36% of breaches were due to insiders” (Forrester)

High Privilege Account Certification

Today’s Takeaways  An IAM tool in your enterprise gives you the benefits of a detective tool and a prevention tool.  IAM needs to be a cornerstone of a security program without there is the potential for other controls to break down.  Having an IAM tool gives the business confidence that process of governance and access is being monitored and performed correctly.

Thank you! Thanks for attending my talk today on Identity Management: Tools to govern system access Questions…?

Contact On Security blog: Fighting In.Security