SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Cost-efficient implementation of
                                   IT-security – an I&AM example


Copyright © 2011 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture.   1
Accenture’s Security Practice understands your business,
and has the global footprint, technology expertise and end-
to-end capabilities to help you achieve high performance


Security Practice Statistics                      Industries             Global Delivery Network
•   Professionals: 1800+                          • Communications &     • Over 90,000 GDN resources
•   Countries: 52+                                  High Tech              across the globe
•   Clients: 210+                                 • Financial Services   • 300+ GDN Security
•   Head Count Growth: 50+%                       • Products               Specialists
                                                  • Health and Public    • High growth rate,
                                                    Service                broadening of skills and
                                                                           addition of new locations
                                                  • Resources


Copyright © 2011 Accenture All Rights Reserved.                                                        2
Accenture helps balance conflicting business objectives
of safeguarding the enterprise while enabling growth

 A straightforward approach: honing in on three key organizational
 objectives can help address challenging business security requirements


                                                                       Managing Identity
                                   Defending information,              and Access
   Protecting from                 systems, critical infrastructures
   Cyber Threats                   and key business processes

                                                                       Securing
                                                                       Applications and
                                                                       Infrastructure
   Enterprise                      Enabling new business initiatives
   Opportunity                     and innovation, improving use of
   with Inherent                   information assets, ensuring        Protecting
   Risk                            compliance and resilience
                                                                       Information


Copyright © 2011 Accenture All Rights Reserved.                                            3
In Sweden, we work closely with our Nordic Security
colleagues in Risk Mgmt, IAM, Infra Sec, BC/DR and more

Nordic Security Practice
• Nordic Team: 60+
• Swedish Team: 20+
• Example engagements:
  • IAM strategy, design and implementation
  • Infrastructure Security assessments, design
    and implementation
  • ISO 2700x-assessments and implementation
  • BC/DR design, planning and implementation
  • Application security (GRC etc)

• Today’s presenters:

                    Peder Nordvaller – Manager         Michael Asplund – Senior Manager

                    • 5+ years experience in IAM       • 9+ years experience in risk, IAM,
                      Strategy, design, architecture     and security delivery; including
                      and implementation                 program- and project
                    • CISSP, TIM Certified Architect     management. CISSP Certified.
Copyright © 2011 Accenture All Rights Reserved.                                          4
Today’s topic



                                                  Q: How to achieve cost-efficient
                                                  implementation of IT-security?




                                                    Accenture’s approach


      Innovate and industrialize: Enabling                             Streamline and business align:
        cost-efficiency through the use of                            Realizing cost-efficiency through a
      architectural principles and patterns                              value-driven delivery model




Copyright © 2011 Accenture All Rights Reserved.                                                             5
Why architectural patterns and principles?
Identity and Access Management as an example…
                                                                            applications
   • Establishes common security controls and aims to
     improve operational efficiency
   • Requires clear interfaces and delineation against many
     processes, governance and technology areas
   • Realizes value as identities and applications are
     onboarded and capabilities are grown…
   • … But has not scaled well, and developed slower than
     business and technology has evolved


                                                  Patterns and principles
           Defines clear responsibilities of and interfaces to IAM to allow for a clear
          development path, pull-based consumption and demand-driven innovation

            Conceptually generic frameworks for governance, process- & technology,
                                   requiring client adaptation

Copyright © 2011 Accenture All Rights Reserved.                                            6
Example of conceptual pattern/principles: Identities

                I.    Information about identities comes from the business. I&AM should
                      rely on and help improve data, not master it
                II. I&AM should be the sole mechanism of vending identity data to
                    applications and systems, based on common identity data model
                    describing the different types of identities and their information
                III. Lifecycle processes shall describe the life of identity types defined
                     in the common identity data model to support RBAC and automated
                     provisioning
                                                                       3


                                      1




                                                  2


Copyright © 2011 Accenture All Rights Reserved.                                              7
Example of conceptual pattern/principles: Externalization



• Managed resources should
  externalise authN and authZ to                          1
  IAM services.
                                                      2
• Provides guidelines for
                                                  3
  consumption and leverage of
  central IAM
• Constrains direct provisioning to
  common infra, legacy and value-
  driven exceptions
• Favours and drives adoption of                          4

  loose coupling, federated
  identity, .NET claims etc.
• Realized by e.g. components
  such as TIM/TAM/TDS



Copyright © 2011 Accenture All Rights Reserved.               8
Example of conceptual pattern/principles: Externalization



• Externalization provides
  foundations for sophisticated
  policy management                                   1

• IAM support, evaluate and
  enforce access control decisions                        2
                                                                  3
• Centralization of policy control is
  supported by e.g. XACML,
  Windows Identity Foundation
                                                  5
  (WIF) etc.
                                                      4
• Allows for fine-grained policies;
                                                              6
  SOA security; infrastructure etc.
• Can be realized by e.g. TSPM




Copyright © 2011 Accenture All Rights Reserved.                       9
Today’s topic



                                                  Q: How to achieve cost-efficient
                                                  implementation of IT-security?




                                                    Accenture’s approach


      Innovate and industrialize: Enabling                             Streamline and business align:
        cost-efficiency through the use of                            Realizing cost-efficiency through a
      architectural principles and patterns                              value-driven delivery model




Copyright © 2011 Accenture All Rights Reserved.                                                             10
Scaling of IAM through delivery patterns: Goals and
 Benefits


                             Prioritise IAM value drops for quick delivery



                             Focus expensive innovation where it’s required



                             Industrialise and de-bureaucratise the most reproducible
                             areas


                             Progressively change the industrialised elements of
                             your programme


Copyright © 2011 Accenture All Rights Reserved.                                    11
Scaling of I&AM: Conceptual Patterns/Principles



                                                                       • Steady-state factory delivery for
                                                                         industrialised work
                                                                       • Specialised effort concentrated on
                                                                         the hard problems that need
                                                                         innovation




                                                  • Industrialise what can be
        • Identity Manager                          industrialised tailored to your
        • Directory Consolidation                   specifics

        • Web SSO                                 • Establish common, consistent
                                                    design patterns
        • Enterprise SSO
                                                  • Don’t solve problems in a vacuum




Copyright © 2011 Accenture All Rights Reserved.                                                               12
Delivery of IAM: Streamlining

    High level delivery dimensions required for your programme are
    known. Which allows for industrialisation and realising the synergies.


                    Architect

                   Streamline

                    Prioritise

                    Schedule

                     Offshore

                      Govern

                     Monitor




Copyright © 2011 Accenture All Rights Reserved.                              13
Conclusion

 • Security work must not lose sight of its business
   goals: strong connection to the business, with clear
   governance is essential.

 • However, appropriate design patterns can ensure that
   work is not reinvented and effort is directed where it is
   most appropriate.

 • Furthermore, pragmatic management allows for
   appropriate industrialisation with bespoke work only
   where it is required and cookie-cutter delivery where it is
   not.

Copyright © 2011 Accenture All Rights Reserved.                  14

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Briefmageeb
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldChris Byrne
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach FinalHossam Hassanien
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 

Was ist angesagt? (19)

Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real World
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
About Acumin
About AcuminAbout Acumin
About Acumin
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Axoss Security Hardening Services
Axoss Security Hardening ServicesAxoss Security Hardening Services
Axoss Security Hardening Services
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 

Andere mochten auch

4 key items which will make Distributed Agile successful !
4 key items which will make Distributed Agile successful ! 4 key items which will make Distributed Agile successful !
4 key items which will make Distributed Agile successful ! Nishant Verma
 
Executing large distributed projects using agile methodologies india agile we...
Executing large distributed projects using agile methodologies india agile we...Executing large distributed projects using agile methodologies india agile we...
Executing large distributed projects using agile methodologies india agile we...Mahesh Varadharajan
 
Lessons learned from scaling Agile to distributed, offshore teams
Lessons learned from scaling Agile to distributed, offshore teamsLessons learned from scaling Agile to distributed, offshore teams
Lessons learned from scaling Agile to distributed, offshore teamssrondal
 
Agile Nearshoring Solutions
Agile Nearshoring SolutionsAgile Nearshoring Solutions
Agile Nearshoring SolutionsFelix Ruessel
 
Successful agile in distributed team Scrum Gathering Shanghai 2015
Successful agile in distributed team Scrum Gathering Shanghai 2015Successful agile in distributed team Scrum Gathering Shanghai 2015
Successful agile in distributed team Scrum Gathering Shanghai 2015hrbendi
 
Fixed Price Offshore Agile projects
Fixed Price Offshore Agile projectsFixed Price Offshore Agile projects
Fixed Price Offshore Agile projectsNaresh Jain
 
Practicing Agile in Offshore Environment by Himanshu Seth & Imran Mir
Practicing Agile in Offshore Environment by Himanshu Seth & Imran MirPracticing Agile in Offshore Environment by Himanshu Seth & Imran Mir
Practicing Agile in Offshore Environment by Himanshu Seth & Imran MirXebia IT Architects
 
Offshore Outsourcing with Scrum
Offshore Outsourcing with Scrum Offshore Outsourcing with Scrum
Offshore Outsourcing with Scrum Alexey Krivitsky
 
A Practical Guide to Setting-up Distributed Agile Projects
A Practical Guide to Setting-up Distributed Agile ProjectsA Practical Guide to Setting-up Distributed Agile Projects
A Practical Guide to Setting-up Distributed Agile ProjectsTarang Baxi
 
A Journey towards Offshore Agility
A Journey towards Offshore AgilityA Journey towards Offshore Agility
A Journey towards Offshore AgilityCoffee Talk
 
Applying Agile to Multi-Team Projects - April 2010
Applying Agile to Multi-Team Projects - April 2010Applying Agile to Multi-Team Projects - April 2010
Applying Agile to Multi-Team Projects - April 2010Adam Monago
 
Offshore Agile Challenges
Offshore Agile ChallengesOffshore Agile Challenges
Offshore Agile ChallengesNaresh Jain
 
The Distributed Agile Game
The Distributed Agile GameThe Distributed Agile Game
The Distributed Agile GameSumeet Moghe
 
Agile Anywhere in the 21st Century: Setting up distributed teams to be effective
Agile Anywhere in the 21st Century: Setting up distributed teams to be effectiveAgile Anywhere in the 21st Century: Setting up distributed teams to be effective
Agile Anywhere in the 21st Century: Setting up distributed teams to be effectiveAgileDenver
 
Scrum process powerpoint ppt slides.
Scrum process powerpoint ppt slides.Scrum process powerpoint ppt slides.
Scrum process powerpoint ppt slides.SlideTeam.net
 

Andere mochten auch (15)

4 key items which will make Distributed Agile successful !
4 key items which will make Distributed Agile successful ! 4 key items which will make Distributed Agile successful !
4 key items which will make Distributed Agile successful !
 
Executing large distributed projects using agile methodologies india agile we...
Executing large distributed projects using agile methodologies india agile we...Executing large distributed projects using agile methodologies india agile we...
Executing large distributed projects using agile methodologies india agile we...
 
Lessons learned from scaling Agile to distributed, offshore teams
Lessons learned from scaling Agile to distributed, offshore teamsLessons learned from scaling Agile to distributed, offshore teams
Lessons learned from scaling Agile to distributed, offshore teams
 
Agile Nearshoring Solutions
Agile Nearshoring SolutionsAgile Nearshoring Solutions
Agile Nearshoring Solutions
 
Successful agile in distributed team Scrum Gathering Shanghai 2015
Successful agile in distributed team Scrum Gathering Shanghai 2015Successful agile in distributed team Scrum Gathering Shanghai 2015
Successful agile in distributed team Scrum Gathering Shanghai 2015
 
Fixed Price Offshore Agile projects
Fixed Price Offshore Agile projectsFixed Price Offshore Agile projects
Fixed Price Offshore Agile projects
 
Practicing Agile in Offshore Environment by Himanshu Seth & Imran Mir
Practicing Agile in Offshore Environment by Himanshu Seth & Imran MirPracticing Agile in Offshore Environment by Himanshu Seth & Imran Mir
Practicing Agile in Offshore Environment by Himanshu Seth & Imran Mir
 
Offshore Outsourcing with Scrum
Offshore Outsourcing with Scrum Offshore Outsourcing with Scrum
Offshore Outsourcing with Scrum
 
A Practical Guide to Setting-up Distributed Agile Projects
A Practical Guide to Setting-up Distributed Agile ProjectsA Practical Guide to Setting-up Distributed Agile Projects
A Practical Guide to Setting-up Distributed Agile Projects
 
A Journey towards Offshore Agility
A Journey towards Offshore AgilityA Journey towards Offshore Agility
A Journey towards Offshore Agility
 
Applying Agile to Multi-Team Projects - April 2010
Applying Agile to Multi-Team Projects - April 2010Applying Agile to Multi-Team Projects - April 2010
Applying Agile to Multi-Team Projects - April 2010
 
Offshore Agile Challenges
Offshore Agile ChallengesOffshore Agile Challenges
Offshore Agile Challenges
 
The Distributed Agile Game
The Distributed Agile GameThe Distributed Agile Game
The Distributed Agile Game
 
Agile Anywhere in the 21st Century: Setting up distributed teams to be effective
Agile Anywhere in the 21st Century: Setting up distributed teams to be effectiveAgile Anywhere in the 21st Century: Setting up distributed teams to be effective
Agile Anywhere in the 21st Century: Setting up distributed teams to be effective
 
Scrum process powerpoint ppt slides.
Scrum process powerpoint ppt slides.Scrum process powerpoint ppt slides.
Scrum process powerpoint ppt slides.
 

Ähnlich wie Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Smarter Business 2011

Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generationmuratc2a
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportPaul Muller
 
Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Brian Crotty
 
Getronics - Governance and the Cloud
Getronics - Governance and the CloudGetronics - Governance and the Cloud
Getronics - Governance and the CloudMaurice Remmé
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Resume 2.0 Remi Beauregard
Resume 2.0  Remi BeauregardResume 2.0  Remi Beauregard
Resume 2.0 Remi BeauregardRemiBeau
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliancerhanna11
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:HyTrust
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 

Ähnlich wie Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Smarter Business 2011 (20)

NJVC Brochure
NJVC BrochureNJVC Brochure
NJVC Brochure
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 
Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013
 
Getronics - Governance and the Cloud
Getronics - Governance and the CloudGetronics - Governance and the Cloud
Getronics - Governance and the Cloud
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Resume 2.0 Remi Beauregard
Resume 2.0  Remi BeauregardResume 2.0  Remi Beauregard
Resume 2.0 Remi Beauregard
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 

Mehr von IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, InterexionIBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBMIBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetIBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explainedIBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalIBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcmIBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_aiIBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIBM Sverige
 

Mehr von IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Kürzlich hochgeladen

Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsP&CO
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Winbusinessin
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView
 
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...Khaled Al Awadi
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...IMARC Group
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfCharles Cotter, PhD
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBBPMedia1
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.ukaroemirsr
 
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGUNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGlokeshwarmaha
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..dlewis191
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Onlinelng ths
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsyasinnathani
 
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfPDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfHajeJanKamps
 
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003believeminhh
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessAPCO
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 

Kürzlich hochgeladen (20)

Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizations
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
 
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
WAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdfWAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdf
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.uk
 
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGUNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
 
Investment Opportunity for Thailand's Automotive & EV Industries
Investment Opportunity for Thailand's Automotive & EV IndustriesInvestment Opportunity for Thailand's Automotive & EV Industries
Investment Opportunity for Thailand's Automotive & EV Industries
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Online
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story points
 
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfPDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
 
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 

Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Smarter Business 2011

  • 1. Cost-efficient implementation of IT-security – an I&AM example Copyright © 2011 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. 1
  • 2. Accenture’s Security Practice understands your business, and has the global footprint, technology expertise and end- to-end capabilities to help you achieve high performance Security Practice Statistics Industries Global Delivery Network • Professionals: 1800+ • Communications & • Over 90,000 GDN resources • Countries: 52+ High Tech across the globe • Clients: 210+ • Financial Services • 300+ GDN Security • Head Count Growth: 50+% • Products Specialists • Health and Public • High growth rate, Service broadening of skills and addition of new locations • Resources Copyright © 2011 Accenture All Rights Reserved. 2
  • 3. Accenture helps balance conflicting business objectives of safeguarding the enterprise while enabling growth A straightforward approach: honing in on three key organizational objectives can help address challenging business security requirements Managing Identity Defending information, and Access Protecting from systems, critical infrastructures Cyber Threats and key business processes Securing Applications and Infrastructure Enterprise Enabling new business initiatives Opportunity and innovation, improving use of with Inherent information assets, ensuring Protecting Risk compliance and resilience Information Copyright © 2011 Accenture All Rights Reserved. 3
  • 4. In Sweden, we work closely with our Nordic Security colleagues in Risk Mgmt, IAM, Infra Sec, BC/DR and more Nordic Security Practice • Nordic Team: 60+ • Swedish Team: 20+ • Example engagements: • IAM strategy, design and implementation • Infrastructure Security assessments, design and implementation • ISO 2700x-assessments and implementation • BC/DR design, planning and implementation • Application security (GRC etc) • Today’s presenters: Peder Nordvaller – Manager Michael Asplund – Senior Manager • 5+ years experience in IAM • 9+ years experience in risk, IAM, Strategy, design, architecture and security delivery; including and implementation program- and project • CISSP, TIM Certified Architect management. CISSP Certified. Copyright © 2011 Accenture All Rights Reserved. 4
  • 5. Today’s topic Q: How to achieve cost-efficient implementation of IT-security? Accenture’s approach Innovate and industrialize: Enabling Streamline and business align: cost-efficiency through the use of Realizing cost-efficiency through a architectural principles and patterns value-driven delivery model Copyright © 2011 Accenture All Rights Reserved. 5
  • 6. Why architectural patterns and principles? Identity and Access Management as an example… applications • Establishes common security controls and aims to improve operational efficiency • Requires clear interfaces and delineation against many processes, governance and technology areas • Realizes value as identities and applications are onboarded and capabilities are grown… • … But has not scaled well, and developed slower than business and technology has evolved Patterns and principles Defines clear responsibilities of and interfaces to IAM to allow for a clear development path, pull-based consumption and demand-driven innovation Conceptually generic frameworks for governance, process- & technology, requiring client adaptation Copyright © 2011 Accenture All Rights Reserved. 6
  • 7. Example of conceptual pattern/principles: Identities I. Information about identities comes from the business. I&AM should rely on and help improve data, not master it II. I&AM should be the sole mechanism of vending identity data to applications and systems, based on common identity data model describing the different types of identities and their information III. Lifecycle processes shall describe the life of identity types defined in the common identity data model to support RBAC and automated provisioning 3 1 2 Copyright © 2011 Accenture All Rights Reserved. 7
  • 8. Example of conceptual pattern/principles: Externalization • Managed resources should externalise authN and authZ to 1 IAM services. 2 • Provides guidelines for 3 consumption and leverage of central IAM • Constrains direct provisioning to common infra, legacy and value- driven exceptions • Favours and drives adoption of 4 loose coupling, federated identity, .NET claims etc. • Realized by e.g. components such as TIM/TAM/TDS Copyright © 2011 Accenture All Rights Reserved. 8
  • 9. Example of conceptual pattern/principles: Externalization • Externalization provides foundations for sophisticated policy management 1 • IAM support, evaluate and enforce access control decisions 2 3 • Centralization of policy control is supported by e.g. XACML, Windows Identity Foundation 5 (WIF) etc. 4 • Allows for fine-grained policies; 6 SOA security; infrastructure etc. • Can be realized by e.g. TSPM Copyright © 2011 Accenture All Rights Reserved. 9
  • 10. Today’s topic Q: How to achieve cost-efficient implementation of IT-security? Accenture’s approach Innovate and industrialize: Enabling Streamline and business align: cost-efficiency through the use of Realizing cost-efficiency through a architectural principles and patterns value-driven delivery model Copyright © 2011 Accenture All Rights Reserved. 10
  • 11. Scaling of IAM through delivery patterns: Goals and Benefits Prioritise IAM value drops for quick delivery Focus expensive innovation where it’s required Industrialise and de-bureaucratise the most reproducible areas Progressively change the industrialised elements of your programme Copyright © 2011 Accenture All Rights Reserved. 11
  • 12. Scaling of I&AM: Conceptual Patterns/Principles • Steady-state factory delivery for industrialised work • Specialised effort concentrated on the hard problems that need innovation • Industrialise what can be • Identity Manager industrialised tailored to your • Directory Consolidation specifics • Web SSO • Establish common, consistent design patterns • Enterprise SSO • Don’t solve problems in a vacuum Copyright © 2011 Accenture All Rights Reserved. 12
  • 13. Delivery of IAM: Streamlining High level delivery dimensions required for your programme are known. Which allows for industrialisation and realising the synergies. Architect Streamline Prioritise Schedule Offshore Govern Monitor Copyright © 2011 Accenture All Rights Reserved. 13
  • 14. Conclusion • Security work must not lose sight of its business goals: strong connection to the business, with clear governance is essential. • However, appropriate design patterns can ensure that work is not reinvented and effort is directed where it is most appropriate. • Furthermore, pragmatic management allows for appropriate industrialisation with bespoke work only where it is required and cookie-cutter delivery where it is not. Copyright © 2011 Accenture All Rights Reserved. 14