Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in the Cloud

CA Technologies
CA TechnologiesWriter and Editor um CA Technologies
How  SGN  Used  Attack  Path  Mapping  to  Control  
Privileged  Access  in  the  Cloud
Mo  Ahddoud
SCT15S
SECURITY
Chief  Information  Security  Officer
SGN
2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
©  2017  CA.  All  rights  reserved.  All  trademarks  referenced  herein  belong  to  their  respective  companies.
The  content  provided  in  this CA  World  2017  presentation  is  intended  for  informational  purposes  only  and  does  not  form  any  type  
of  warranty. The information  provided  by  a  CA  partner  and/or  CA  customer  has  not  been  reviewed  for  accuracy  by  CA.  
For  Informational  Purposes  Only  
Terms  of  This  Presentation
3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Abstract
As  one  of  the  most  forward  thinking  critical  infrastructure  companies  in  the  UK,  SGN  is  
blazing  a  trail  by  becoming  the  first  UK  critical  infrastructure  company  to  run  100%  in  the  
cloud  and  using  innovative  IoT  technologies  to  revolutionize  the  management  of  gas  
pipelines.  To  manage  the  risk,  SGN  embarked  on  a  mission  to  shape  the  attack  path  of  
intruders.  In  this  session,  Mo  Ahddoud,  CISO  at  SGN  will  share  how  he  used  a  
technique  called  attack  path  mapping  to  put  privileged  access  at  the  center  of  SGN's  
digital  transformation.
Mo
Ahddoud
SGN
CISO
Mo	
  Ahddoud,	
  CISO
HOW	
  CA	
  PRIVILEGED	
  ACCESS	
  
(CA	
  PAM)	
  HELPED	
  SGN	
  	
  
SECURELY	
  ADOPT	
  AWS	
  
5
Who	
  Are	
  SGN?
• 5.0bn RAV	
  (March	
  2016)
• 74,000km network	
  length
• 5.9million customers
• c4500 FTEs	
  employees
• 1.1bn revenues	
  (2015/16)
• 15,907 new	
  connections	
  2015/16
• 139TWh energy	
  distributed	
  
• 960km pipes	
  replaced	
  in 2015/16
6
Digital	
  Transformation	
  
Change -­‐ a	
  measurable,	
  
physical	
  difference.	
  	
  	
  
Transformation – an	
  extreme	
  radical,	
  change	
  that	
  
drives	
  an	
  organisation	
  in	
  a	
  new	
  direction	
  and	
  takes	
  
it	
  to	
  an	
  entirely	
  different	
  functional	
  level.	
  	
  
• Internet	
  of	
  Things
• Customer	
  Experience
• Digital	
  Workforce	
  
• Cloud	
  First	
  
TRANSFORMING
THE	
  WAY	
  THE	
  BUSINESS	
  OPERATES	
  
8
Our	
  Business	
  Strategy	
  
• Reduced	
  totex
• Increased	
  agility	
  
• Resilience	
  availability
• New	
  innovation	
  	
  
• Improved	
  Security	
  	
  
Devolution	
  of	
  IT	
  
TAKE  “IT”  OFF  OF  THE  
CRITICAL  PATH
9
Supply	
  Chain
The	
  Cloud	
  Hopper	
  	
  
10
• Unpatched	
  systems
• Fragmented	
  solution
• Obsolete	
  technology	
  
• Convoluted	
  value	
  chain
Business	
  Complexity	
  
11
Attack	
  Path	
  Mapping	
  
• Prioritise	
  on	
  likely	
  attack	
  paths
• Ensure	
  you	
  can	
  detect
• Reduce	
  the	
  network	
  footprint
Internal	
  Phishing
Accessing
User	
  Mailbox
Accessing
Internal	
  Apps
Access
File	
  share
12
The	
  heart	
  of	
  our	
  security	
  strategy
Privileged	
  Access	
  Management	
  
Virtual  Datacentre  Build
Datacentre  
Security  
Testing
Cloud  
Monitoring
ServiceNow
PPM  and  Cloud  
Management
Cloud  Networking  
and  Security
Integration  &  API  
catalogue
Cloud  
Sign-­on
Application  Migration
Application    
Discovery  Due  
Diligence
Operational  Model Service  Transition  and  Support
Cloud  
Programme  
Management  
and  support
Delivery  
Framework  
Definition
Architecture  
Governance
Procurement  
and  
Commercials
Office  365  
Technical    
Migration
Office  365  
Business  
Migration
Automated  Testing
CA  Privileged
Access  Manager
13
• Ticket	
  Authorisation	
  
• Timebound	
  
• Remove	
  Passwords
• Audit	
  and	
  Verify
Protecting	
  Apps	
  and	
  Data
Amazon	
  Web	
  Services
14
• NCSC
• Lighthouse	
  partnership
Collaboration	
  &	
  Partnership	
  
15
Thank	
  You	
  for	
  Listening
_____
Any	
  Questions?
16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS
Security
For  more  information  on  Security,
please  visit:  http://cainc.to/CAW17-­Security
1 von 16

Recomendados

Emerging Managed Services Opportunities in Identity and Access Management von
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
844 views25 Folien
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid... von
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
512 views21 Folien
Leveraging Monitoring Governance: How Service Providers Can Boost Operational... von
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
641 views23 Folien
Making Security Work—Implementing a Transformational Security Program von
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
720 views27 Folien
Application Experience Analytics Services: The Strategic Digital Transformati... von
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
549 views24 Folien
Application Experience Analytics Services: The Strategic Digital Transformati... von
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
679 views26 Folien

Más contenido relacionado

Was ist angesagt?

Case Study: Privileged Access in a World on Time von
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
1.4K views23 Folien
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use... von
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
1.4K views33 Folien
Keynote: Making Security a Competitive Advantage von
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
516 views37 Folien
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat... von
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
638 views26 Folien
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit... von
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
486 views29 Folien
Blockchain: Strategies for Moving From Hype to Realities of Deployment von
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
573 views23 Folien

Was ist angesagt?(19)

Case Study: Privileged Access in a World on Time von CA Technologies
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies1.4K views
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use... von CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies1.4K views
Keynote: Making Security a Competitive Advantage von CA Technologies
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies516 views
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat... von CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies638 views
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit... von CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies486 views
Blockchain: Strategies for Moving From Hype to Realities of Deployment von CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies573 views
Keynote: Announcing API and Microservice Innovations that Drive Business Agil... von CA Technologies
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
CA Technologies562 views
Case Study: Putting Citizens at The Center of Digital Government von CA Technologies
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies684 views
Protecting the Software-Defined Data Center from Data Breach von CA Technologies
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
CA Technologies1.7K views
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis... von CA API Management
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
CA API Management1.3K views
Webinar: What's New In FlexNet Manager Suite 2018 R1 von Rana Zayed
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Rana Zayed29 views
"Why Micro Services adoption is crucial for SaaS companies?" von Vignesh Manivannan
"Why Micro Services adoption is crucial for SaaS companies?""Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?"
Digical is the Imminent Reality von CA Technologies
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent Reality
CA Technologies1.1K views
7 Things You Need to Know for Your Cloud-First Strategy von Flexera
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
Flexera393 views
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore... von Amazon Web Services
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
Adopting Modern Application Architecture with AWS and Project Flogo (Sponsore...
The Practical Approach for End-to-End SaaS Management von Flexera
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
Flexera327 views
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in... von CA Technologies
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
CA Technologies1.3K views
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap... von Infostretch
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
Infostretch241 views

Similar a Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in the Cloud

Orange Data Centre and Cloud von
Orange Data Centre and CloudOrange Data Centre and Cloud
Orange Data Centre and CloudOrange Business Services
3.1K views28 Folien
Security: Enabling the Journey to the Cloud von
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
1.9K views20 Folien
The Trouble with Saas and Hybrid Cloud von
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudNovosco
113 views22 Folien
Keys-to-Success-and-Security-in-the-Cloud von
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
213 views42 Folien
Keys to success and security in the cloud von
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
909 views42 Folien
A New Approach to Continuous Monitoring in the Cloud von
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
1.3K views24 Folien

Similar a Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in the Cloud(20)

Security: Enabling the Journey to the Cloud von Capgemini
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
Capgemini1.9K views
The Trouble with Saas and Hybrid Cloud von Novosco
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
Novosco113 views
Keys-to-Success-and-Security-in-the-Cloud von patmisasi
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi213 views
Keys to success and security in the cloud von Scalar Decisions
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions909 views
A New Approach to Continuous Monitoring in the Cloud von NETSCOUT
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
NETSCOUT1.3K views
Extending the partnership to the cloud von Capgemini
Extending the partnership to the cloudExtending the partnership to the cloud
Extending the partnership to the cloud
Capgemini2.2K views
IT-as-a-Service: Ushering the New Era of Service Aware Cloud - Session Sponso... von Amazon Web Services
IT-as-a-Service: Ushering the New Era of Service Aware Cloud - Session Sponso...IT-as-a-Service: Ushering the New Era of Service Aware Cloud - Session Sponso...
IT-as-a-Service: Ushering the New Era of Service Aware Cloud - Session Sponso...
Amazon Web Services2.9K views
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S... von Alen Leit
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Alen Leit2.7K views
Extending the Partnership to the Cloud von BMC Software
Extending the Partnership to the CloudExtending the Partnership to the Cloud
Extending the Partnership to the Cloud
BMC Software715 views
Visibility and Automation for Enhanced Security von patmisasi
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
patmisasi1.7K views
AWS re:Invent 2016: Enterprise IT as a Service: Empowering the Digital Experi... von Amazon Web Services
AWS re:Invent 2016: Enterprise IT as a Service: Empowering the Digital Experi...AWS re:Invent 2016: Enterprise IT as a Service: Empowering the Digital Experi...
AWS re:Invent 2016: Enterprise IT as a Service: Empowering the Digital Experi...
Amazon Web Services1.3K views
Cw13 cloud computing & big data by ahmed aamer von inevitablecloud
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
inevitablecloud551 views
Migrating to Cloud – A Journey of Excellence von Ahmed Aamer
Migrating to Cloud – A Journey of ExcellenceMigrating to Cloud – A Journey of Excellence
Migrating to Cloud – A Journey of Excellence
Ahmed Aamer1.4K views
Defining a Cloud Adoption Journey to Deliver Cloud Native Services von Amazon Web Services
Defining a Cloud Adoption Journey to Deliver Cloud Native ServicesDefining a Cloud Adoption Journey to Deliver Cloud Native Services
Defining a Cloud Adoption Journey to Deliver Cloud Native Services
Unlocking the Cloud Operating Model: Networking in Multi-Cloud von Mitchell Pronschinske
Unlocking the Cloud Operating Model: Networking in Multi-CloudUnlocking the Cloud Operating Model: Networking in Multi-Cloud
Unlocking the Cloud Operating Model: Networking in Multi-Cloud
Skip the Security Slow Lane with VMware Cloud on AWS von Trend Micro
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
Trend Micro1.9K views

Más de CA Technologies

CA Mainframe Resource Intelligence von
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
17.1K views25 Folien
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence von
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
2.5K views26 Folien
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes... von
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
1.6K views23 Folien
Case Study: How The Home Depot Built Quality Into Software Development von
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
2.9K views28 Folien
Keynote: Making Security a Competitive Advantage von
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
523 views37 Folien
Establish Digital Trust as the Currency of Digital Enterprise von
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
433 views29 Folien

Más de CA Technologies(17)

CA Mainframe Resource Intelligence von CA Technologies
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies17.1K views
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence von CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies2.5K views
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes... von CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies1.6K views
Case Study: How The Home Depot Built Quality Into Software Development von CA Technologies
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies2.9K views
Keynote: Making Security a Competitive Advantage von CA Technologies
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies523 views
Establish Digital Trust as the Currency of Digital Enterprise von CA Technologies
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies433 views
How Components Increase Speed and Risk von CA Technologies
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
CA Technologies406 views
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol... von CA Technologies
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
CA Technologies609 views
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio... von CA Technologies
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
CA Technologies859 views
When You Test Matters: Why Testing Early in the SDLC is Important von CA Technologies
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
CA Technologies435 views
Application Security in a DevOps World von CA Technologies
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
CA Technologies572 views
Case Study: How The Home Depot Built Quality Into Software Development von CA Technologies
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies358 views
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes... von CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies87 views
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk. von CA Technologies
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
CA Technologies429 views
Case Study: United Airlines Transforms Release Management for Its Modern Soft... von CA Technologies
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
CA Technologies2.5K views
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ... von CA Technologies
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
CA Technologies376 views
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site... von CA Technologies
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
Industry Keynote: Redefine Operations in a DevOps World—The New Role for Site...
CA Technologies463 views

Último

Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... von
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...ShapeBlue
154 views62 Folien
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
50 views35 Folien
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
222 views23 Folien
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
132 views15 Folien
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
158 views20 Folien
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
123 views28 Folien

Último(20)

Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... von ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue154 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue132 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 views
DRBD Deep Dive - Philipp Reisner - LINBIT von ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue94 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 views
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... von ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 views
Data Integrity for Banking and Financial Services von Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely78 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views

Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in the Cloud

  • 1. How  SGN  Used  Attack  Path  Mapping  to  Control   Privileged  Access  in  the  Cloud Mo  Ahddoud SCT15S SECURITY Chief  Information  Security  Officer SGN
  • 2. 2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS ©  2017  CA.  All  rights  reserved.  All  trademarks  referenced  herein  belong  to  their  respective  companies. The  content  provided  in  this CA  World  2017  presentation  is  intended  for  informational  purposes  only  and  does  not  form  any  type   of  warranty. The information  provided  by  a  CA  partner  and/or  CA  customer  has  not  been  reviewed  for  accuracy  by  CA.   For  Informational  Purposes  Only   Terms  of  This  Presentation
  • 3. 3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Abstract As  one  of  the  most  forward  thinking  critical  infrastructure  companies  in  the  UK,  SGN  is   blazing  a  trail  by  becoming  the  first  UK  critical  infrastructure  company  to  run  100%  in  the   cloud  and  using  innovative  IoT  technologies  to  revolutionize  the  management  of  gas   pipelines.  To  manage  the  risk,  SGN  embarked  on  a  mission  to  shape  the  attack  path  of   intruders.  In  this  session,  Mo  Ahddoud,  CISO  at  SGN  will  share  how  he  used  a   technique  called  attack  path  mapping  to  put  privileged  access  at  the  center  of  SGN's   digital  transformation. Mo Ahddoud SGN CISO
  • 4. Mo  Ahddoud,  CISO HOW  CA  PRIVILEGED  ACCESS   (CA  PAM)  HELPED  SGN     SECURELY  ADOPT  AWS  
  • 5. 5 Who  Are  SGN? • 5.0bn RAV  (March  2016) • 74,000km network  length • 5.9million customers • c4500 FTEs  employees • 1.1bn revenues  (2015/16) • 15,907 new  connections  2015/16 • 139TWh energy  distributed   • 960km pipes  replaced  in 2015/16
  • 6. 6 Digital  Transformation   Change -­‐ a  measurable,   physical  difference.       Transformation – an  extreme  radical,  change  that   drives  an  organisation  in  a  new  direction  and  takes   it  to  an  entirely  different  functional  level.     • Internet  of  Things • Customer  Experience • Digital  Workforce   • Cloud  First  
  • 7. TRANSFORMING THE  WAY  THE  BUSINESS  OPERATES  
  • 8. 8 Our  Business  Strategy   • Reduced  totex • Increased  agility   • Resilience  availability • New  innovation     • Improved  Security     Devolution  of  IT   TAKE  “IT”  OFF  OF  THE   CRITICAL  PATH
  • 10. 10 • Unpatched  systems • Fragmented  solution • Obsolete  technology   • Convoluted  value  chain Business  Complexity  
  • 11. 11 Attack  Path  Mapping   • Prioritise  on  likely  attack  paths • Ensure  you  can  detect • Reduce  the  network  footprint Internal  Phishing Accessing User  Mailbox Accessing Internal  Apps Access File  share
  • 12. 12 The  heart  of  our  security  strategy Privileged  Access  Management   Virtual  Datacentre  Build Datacentre   Security   Testing Cloud   Monitoring ServiceNow PPM  and  Cloud   Management Cloud  Networking   and  Security Integration  &  API   catalogue Cloud   Sign-­on Application  Migration Application     Discovery  Due   Diligence Operational  Model Service  Transition  and  Support Cloud   Programme   Management   and  support Delivery   Framework   Definition Architecture   Governance Procurement   and   Commercials Office  365   Technical     Migration Office  365   Business   Migration Automated  Testing CA  Privileged Access  Manager
  • 13. 13 • Ticket  Authorisation   • Timebound   • Remove  Passwords • Audit  and  Verify Protecting  Apps  and  Data Amazon  Web  Services
  • 14. 14 • NCSC • Lighthouse  partnership Collaboration  &  Partnership  
  • 15. 15 Thank  You  for  Listening _____ Any  Questions?
  • 16. 16 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS Security For  more  information  on  Security, please  visit:  http://cainc.to/CAW17-­Security