![Page 1: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/1.jpg)
COVITS 2011 - The Changing Landscape of Cyber-Security – Identity, Credential, and Access Management (ICAM)
![Page 2: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/2.jpg)
On Tuesday, August 23rd at 1:51 PM…
—A magnitude 5.8 (Mw) earthquake occurred at 1:51 pm EDT (17:51 UTC) on August 23, 2011, at a depth of about 3.7 miles (6 kilometers) beneath the town of Mineral, Virginia, located approximately 27 miles (45 km) east of Charlottesville. The event is among the largest earthquakes recorded in the eastern United States.
— http://earthquake.usgs.gov/earthquakes/recenteqsww/Quakes/se082311a.php
![Page 3: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/3.jpg)
Agenda
![Page 4: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/4.jpg)
The Changing Landscape of Cyber-Security
![Page 5: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/5.jpg)
Agenda
![Page 6: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/6.jpg)
The Changing Landscape of Cyber-Security
![Page 7: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/7.jpg)
Changing the Landscape of Cyber-Security… Mobile Devices and Social Networking –
7 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 8: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/8.jpg)
Cloud Computing … Changing the Cyber-Security Landscape
8 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 9: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/9.jpg)
Changing the Cyber-Security Landscape… Advanced Persistent Threat
9 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 10: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/10.jpg)
Changing the Cyber-Security Landscape… Identity Theft
10 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 11: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/11.jpg)
“Houston, We have a problem!”
Changing Landscape of Cyber-Security Copyright © 2011 CA 11
![Page 12: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/12.jpg)
So we turn to tools and technology to solve problems
Changing Landscape of Cyber-Security Copyright © 2011 CA 12
![Page 13: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/13.jpg)
Result: High Performance and Smooth Sailing
Changing Landscape of Cyber-Security Copyright © 2011 CA 13
![Page 14: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/14.jpg)
The Cyber-Security Landscape is changing – ICAM stage 1 stovepipes
ICAM Stage 2 >
Privileges
Application
Credential
User Account
Authorization
Authentication
Privileges
Application
Credential
User Account
Authorization
Authentication
Privileges
Application
Credential
User Account
Authorization
Authentication
Privileges
Application
Credential
User Account
Authorization
Authentication
Privileges
Application
Credential
User Account
Authorization
Authentication
User Identities
Changing Landscape of Cyber-Security Copyright © 2011 CA 14
![Page 15: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/15.jpg)
Centralized Entitlement and Access Management with Delegated Administration
ICAM Future - Centralized entitlement and access management
User Identity
Credential
Application Application Application
Authorization
Application Application Application
User Account
Authentication
Privileges
Application Application Application
Changing Landscape of Cyber-Security Copyright © 2011 CA 15
![Page 16: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/16.jpg)
16 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 17: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/17.jpg)
Managing the Risk = Protecting the Data and Securing Access
Employees, Contractors
Customers
Privileged Users
Partners
We help you ensure the right people have the right access to the right information at the right time
You have to Authenticate People Services Devices
You have to Authorize Systems Applications Information use
You have to Report User/Service Activity Information Activity Privacy/Compliance
Web Services, API access
Mobile
Web Apps, SaaS Apps
Systems, Network
Email, IM, Social Net
Application Data
Shared Files
Private Cloud, Public Cloud
17 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 18: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/18.jpg)
—Where previous models relied upon verticalization and perimeter security, new models rely upon enterprise ICAM services, virtualization and abstraction.
—New security model must be adaptive, contextual, identity-aware, and more modular than the traditional information security model
— Identity, Credential, and Access Management (ICAM) becomes the foundation of the new security model
ICAM - Identity, Credential, and Access Management Foundation of the new Security Model
18 Changing Landscape of Cyber-Security Copyright © 2011 CA
![Page 19: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/19.jpg)
Tools and Technology for Identity and Access Management
Changing Landscape of Cyber-Security Copyright © 2011 CA
Role Mgt
ID Governance
Role Management
Provisioning
ID Admin
Identity Management
Web Access Mgt SSO & Multi-Factor
Auth
Federation
Web Access Management
SOA
Entitlements (Access)
Provision (Identities, Access)
Privileged User Mgmt
Host Access Mgmt
Privileged User Mgmt Enterprise
e-Mail Control
Data Mgt
Auditing & Reporting
User Activity & Compliance Reporting
Log Management, Auditing, & Reporting 19
![Page 20: COVITS 2011 - The Changing Landscape of Cyber-Security ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Changing Landscape of Cyber-Security – Identity, Credential, and Access](https://reader033.vdocuments.mx/reader033/viewer/2022042916/5f585b0e773ff50de44b9290/html5/thumbnails/20.jpg)
Changing Landscape of Cyber-Security Copyright © 2011 CA
Success is being ready for the future … of ICAM
20