1
ADDRESSING DIGITAL IDENTITY RISKRSA SECURID® SUITE
Vassilis Boulogiorgos
Identity Account Executive, Middle East & AFrica
2
IDENTITY EXPLODES WITH DIGITAL TRANSFORMATION
3
IDENTITY CHALLENGES
CONTINUE TO GROW
Organizations are taking their
business online Cloud and mobile
change the game
M O D E R N I Z AT I O N
Increasingly sophisticated and
more frequent
M A L I C E
Transitioning from simple guidance
to rigid security with a modern,
global infrastructure
M A N D AT E S
MALWAREPHISHING BREACHDEVICESAPPS USERS DFARSPCI GDPR
4
IDENTITY RISK CHANGING DYNAMICS
Privileged Access;
Crown Jewels
Password Protection
Getting Harder
Expanding populations;
3 party access
Lacking Business
Reviews; Rubber Stamp
Increasing
Regulatory and
Compliance Scrutiny
BYOD, Access for
Any User,
Anywhere, on
Any Device
Need to Balance
Security with
User Convenience
Islands of Identity;
No Visibility
5
Orphaned accounts
Privileged access
Outliers
Unauthorized changes
Changes as a result of movement
High risk applications
Unstructured data
Un-reviewed items
Shared and service accounts
Toxic combinations Segregation of Duties & policy violations
UNDERSTANDING & QUANTIFYING THE CRITICAL IDENTITY RISK FACTORS
6
CONSEQUENCES FOR NOT RESPONDING TO IDENTITY RISK
IDENTITY RISK IS A BUSINESS RISK
Audit Failure
s
Security
Breaches
Financial
cost
Business
Productivity
7
Accelerate business, increase
security and reduce costs
I N T E L L I G E N T
From ground
To cloud
P E RVA S I V E
User experience for the
modern workforce
C O N V E N I E N T
IMAGINE A SECURE WORLD…
8
Access AssuranceWho has access to what?
Identity AssuranceIs the user who they claim to be?
Identity Governance
Act with insight to prioritize
access decisions
Identity Lifecycle
Ensure users have timely access
the the right applications
Authentication
Provide convenient & secure
access for all your users
Access & SSO
Connect to any resource
on-premises or in the cloud
9
Identity Governance
Identity Lifecycle
▪ Expanded visibility and
control over identities
▪ Prioritized actions based on
risk
▪ Reduces time / manual effort
with automated processes
▪ Strengthens risk posture
▪ Reduces chances of audit
failure or breach
▪ Reduced TCO
Manage and provide
insight into who has
access to what
10
A BATTLE PLAN TO ADDRESS THE RISKS
Risk and priority driven certifications
Targeted reviews for orphaned accounts
Unauthorized change and policy exception
detection & remediation
Risk-based dynamic approval and
compliance orchestration
Joiner, mover, leaver policy enforcement
Full visibility into unstructured data access
Centralized privileged access management &
certification
11
IDENTITY RISK PRIORITY ACCESS REVIEWS
12
Access AssuranceWho has access to what?
Identity Governance
Act with insight to prioritize
access decisions
Identity Lifecycle
Ensure users have timely access
the the right applications
Access & SSO
Authentication
▪ Ensures right individuals
have convenient and
secure access
▪ Meets access
requirements of the
modern workforce
▪ Reduces startup times
and lowers costs
Delivering convenient
and secure access to
the modern workforce
13
Network
Session AppDevice
Role
RISKY
PASS
Location
Static User and
Context Rules
Deny
Behavior-based
Confidence
INTELLIGENCE RISK-DRIVEN IDENTITY ASSURANCE
Approve Tokencode RSA SecurID
FIDOFaceIDFingerprintLocation
TimeApp
Network
Device
Access Pattern
Identity
Assurance
Engine
14
ADDRESSING IDENTITY RISK… I N T E L L I G E N T
…REQUIRES A HOLISTIC APPROACH
15
WHO is the user?
WHATcan they access?
WHATknown fraud is this user or device associated with?
HOWdo you take threats into account?
WHYshould I care? Is there a risk to my business?
Lines of Business
Risk/ FraudIdentity
SOC
Compliance
IT/OPS
CONNECTEDS E C U R E A C C E S S TA K E S A V I L L A G E
16
C O N N E C T I N G I D E N T I T Y T O
U S E R R I S K
SOC
90 Breach
Mitigated
High Risk Network/ Device Behavior Identified90
Inform RSA SecurID Access Risk Engine of suspicious user or network activity to drive step-up Authenticationas required to confirm user identity
In response to an active incident:1. Based on risk analysis automated playbook is activated
to authenticate users on devices with anomalous activity
2. The SOC Analyst adds user , device or network information to high risk user/device list to limit or block user’s access, or to reduce false positives by requesting users to authenticate
Breach
Mitigated
17
A U T H E V E N T S C A P T U R E I N N W
BLACK HAT ASIA 2018
18
Compliance
CONTINUOUS COMPLIANCE
A U T O M A T E D & D Y N A M I C E X C H A N G E O F A C T I O N A B L E
I D E N T I T Y D A T A
Define objectives, policies
Assess risk; measure/report
Business context & prioritization
for IT assets, apps and risk
Access governance, provisioning
and compliance reporting
Policy enforcement, e.g. SoD
Engine for identity risk events
Holistic View
▪ Automated,
continuous
collaboration
▪ Holistic view of
identity risk
▪ Reduced user
access risk
1919
SECURE ACCESS FROM GROUND TO CLOUD
$
C O N V E N I E N T
▪ Ensures the right individuals have convenient and secure access
▪ Meets authentication requirements of the modern workforce
I N T E L L I G E N T
▪ Uses intelligence to act with insight
P E R VA S I V E
▪ Provides unified visibility and control across all access use cases
▪ Reduces startup times and lowers costs
ACCELERATE BUSINESS WHILE YOUMITIGATE IDENTITY RISK
20
THANK YOU!