Identity Live Sydney 2017 - Michael Dowling

ForgeRock
ForgeRockForgeRock
Michael Dowling
APAC Digital Identity Lead
Accenture Australia
Identity Live Sydney
August 15th 2017
Copyright 2017 Accenture. All rights reserved. 2
NAVIGATING COMPLEX
ECOSYSTEMS
Businesses operate in a digital ecosystem that is becoming
ever more connected, collaborative and complex.
Think about your ecosystem as a neighbourhood…
Copyright 2017 Accenture. All rights reserved. 3
WHO IS IN YOUR
NEIGHBOURHOOD?
Copyright 2017 Accenture. All rights reserved. 4
A SELF-SUSTAINING
ENTERPRISE
UNDERSTANDS AND
RESPONDS TO WHO’S
MOVING IN AND OUT,
WHAT THEY’RE DOING,
AND WHAT THREATS
THEY PRESENT.
Has the agility to
sense & respond to
threats and vulnerabilities
as they present themselves
THE SELF-SUSTAINING ENTERPRISE
Copyright 2017 Accenture. All rights reserved. 5
Infrastructure shifts
security postures
in response to
ecosystem changes.
Uses predictive
analytics and cognitive
modelling to automate how
enterprise security “thinks”
about threats or risks.
Infrastructure
paradigms such as network
functions virtualisation (NFV)
and serverless architectures
introduce the agility needed
to “react”.
Copyright 2017 Accenture. All rights reserved. 6
Proliferation of
insecure devices
Merging of personal
and professional lives
and data
Attackers
“weaponising”
the internet
CYBER RISKS IN A NEW
BUSINESS ECOSYSTEM
Businesses operate in a digital ecosystem that is
becoming ever more connected, collaborative and complex.
Copyright 2017 Accenture. All rights reserved. 7
THE NECESSARY FUNDAMENTALS
OF SELF-SUSTAINING ENTERPRISES
Continuous discovery
and classification
of new assets
(user, device or data)
Trust-based
authentication assigns a
“trust-level”
to each device
An adaptive, intelligent
security platform will
streamline security
operations and reduce
complexity
Copyright 2017 Accenture. All rights reserved. 8
THE
EVOLUTION
OF TRUST
PRINCIPLES
Digital
Trust
Think digital trust is cornerstone
of digital economy
33% Proactively brought ethics into
Tech Vision discussion
83%
A self-sustaining approach enhances existing cybersecurity capabilities through
automation, machine learning, software-defined networking and new approaches to
infrastructure.
ENABLING THE SELF-SUSTAINING
ENTERPRISE
Copyright 2017 Accenture. All rights reserved. 9
An adaptive, intelligent platform that can
deliver a self-healing, scalable security
environment
More sophisticated identity methods for seamless integration
Consistent user experience across applications, devices and internet-connected
things to manage persistent identity.
Going serverless
Applications built within a serverless architecture exist as individual functions, with a
strong definition for how data needs to flow between them. It required operational
discipline--triggers and microservices--which can be leveraged for cyber defense.
Thinking about infrastructure and security as code
Software-defined security has controls designed independently of the physical
infrastructure. Virtualising in this way provides the flexibility and agility to control and
quarantine small parts of the network/device.
Becoming dynamic
As threats or risks change, the self-sustaining enterprise responds by segmenting,
moving and morphing assets with a much more fluid and unpredictable approach to
managing business risks, protecting assets or containing incidents.
ENABLING THE SELF-SUSTAINING
ENTERPRISE
Copyright 2017 Accenture. All rights reserved. 10
Copyright 2017 Accenture. All rights reserved. 11
Continuous Integration through DevOps
Continuous / Persistent Authorisation
Micro-services / Serverless
Customer Driven Authentication
Experiences
Data Privacy
Device / Phone as Token
Robotic Provisioning
Biometrics
Blockchain
IOT Asset and Trust
IDENTITY
“By 2020, a typical small
enterprise's IAM program will
span a million people, 10
million things and billions of
relationships, driving
significant simplification of its
approach to IAM.”
Source: Gartner (May 2015)
Trends that promise to disrupt how we think about Identity
THE OPPORTUNITY
Rapid enablement of cloud, mobile and IoT Digital Identity service delivers a
richer, seamless user experience across applications, devices and internet-
connected things.
New Channels
Single View
Personalisation
Relationships Privacy
Regulatory Compliance
Operational Efficiencies
Security
Seamless User Experience
RETURN ON
IDENTITY
The business challenge: getting the math right on ROI
Copyright 2017 Accenture. All rights reserved. 12
Integrate products
and/or techniques that
“think” and “react”
with minimal human
effort (for example, AI
and advanced analytics)
to enable the self-sustaining
environment.
THE SELF-SUSTAINING
ENTERPRISE JOURNEY
Copyright 2017 Accenture. All rights reserved. 13
Understand the
availability and
sustainability goals
for key business
processes based on
acceptable levels of risk.
Identify applications
that can be logically
separated from their
operational components
into micro-services
and events.
Consider how security
services can be shared
for reuse/consistency,
evaluate how they could be
more effectively applied to
micro-services and events,
and revisit security
requirements for business
functions and services.
Identify security functions
that can be provided as a virtual
service through serverless and
network virtualised functions of
software-defined networking.
Build a robust identity and
access management system
to detect and manage new and existing
assets—including users, devices, data
and communications—to dynamically
and continuously determine how trusted
they are.
14
VELOCITY DEVOPS allows
clients to build, deploy and
maintain IAM infrastructures with
pace, quality and consistency.
VELOCITY DEVOPS provides
automated end-to-end
capabilities and predictable,
repeatable outcomes
VELOCITY
AUTOMATION eliminates
repetitive human tasks for
IAM allowing
organisations to scale
while containing or
reducing operational
costs. VELOCITY
AUTOMATION increases
quality by the elimination
of human error.
VELOCITY ARTIFICIAL
INTELLIGENCE
communicates with the
customer using natural
language speech, online chat
and email and provides fact or
knowledge-based answers.
THE “NEW” PLUS
IDENTITY IS VELOCITY
Copyright © 2017 Accenture Security. All rights reserved.
Copyright 2017 Accenture. All rights reserved. 15
THANK YOU!
Come and continue the conversation over at our
stand, or contact me here:
Michael Dowling
APAC Digital Identity Lead, Accenture
michael.dowling@accenture.com
1 von 15

Recomendados

T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud. von
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
525 views13 Folien
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017 von
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017ForgeRock
987 views15 Folien
Security On The Edge - A New Way To Think About Securing the Internet of Things von
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
480 views19 Folien
Identity Live Sydney 2017 - Daniel Raskin von
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinForgeRock
352 views15 Folien
Identity Live London 2017 | Daniel Raskin von
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinForgeRock
313 views16 Folien
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C... von
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
945 views31 Folien

Más contenido relacionado

Was ist angesagt?

Connected Car: Putting Digital Identity Behind the Wheel von
Connected Car: Putting Digital Identity Behind the WheelConnected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the WheelForgeRock
414 views35 Folien
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance von
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
803 views38 Folien
Identity Live Paris 2017 | Mike Ellis von
Identity Live Paris 2017 | Mike EllisIdentity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike EllisForgeRock
215 views40 Folien
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release von
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
1.5K views41 Folien
Webinar: Three Steps to Transform Your Mobile App into a Security Factor von
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
462 views25 Folien
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018) von
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
1.1K views25 Folien

Was ist angesagt?(20)

Connected Car: Putting Digital Identity Behind the Wheel von ForgeRock
Connected Car: Putting Digital Identity Behind the WheelConnected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the Wheel
ForgeRock414 views
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance von Ping Identity
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity803 views
Identity Live Paris 2017 | Mike Ellis von ForgeRock
Identity Live Paris 2017 | Mike EllisIdentity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike Ellis
ForgeRock215 views
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release von ForgeRock
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
ForgeRock1.5K views
Webinar: Three Steps to Transform Your Mobile App into a Security Factor von Ping Identity
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Ping Identity462 views
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018) von Ping Identity
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Ping Identity1.1K views
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA... von Ping Identity
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Ping Identity1.4K views
Identity Live Sydney 2017 - Tim Sheedy von ForgeRock
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
ForgeRock465 views
Identity Live Sydney 2017 - Ian Sorbello von ForgeRock
Identity Live Sydney 2017 - Ian SorbelloIdentity Live Sydney 2017 - Ian Sorbello
Identity Live Sydney 2017 - Ian Sorbello
ForgeRock687 views
Identity Live Paris 2017 | Ian Sorbello, HSBC von ForgeRock
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
ForgeRock317 views
Identity Live Paris 2017 | Monetising Digital Customer Relationships von ForgeRock
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
ForgeRock207 views
Identity Gateway with the ForgeRock Identity Platform - So What’s New? von ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
ForgeRock1.7K views
The Future of Digital Identity in the Age of the Internet of Things von ForgeRock
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock1.3K views
Pimping the ForgeRock Identity Platform for a Billion Users von ForgeRock
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion Users
ForgeRock226 views
Securing Access to SaaS Apps with WSO2 Identity Server von WSO2
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity Server
WSO2372 views
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -... von ForgeRock
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
ForgeRock598 views
ForgeRock Platform Release - Summer 2016 von ForgeRock
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock1.3K views
Standard Based API Security, Access Control and AI Based Attack - API Days Pa... von Ping Identity
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity1.3K views
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf von ForgeRock
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock376 views

Destacado

OpenAM: An Introduction von
OpenAM: An IntroductionOpenAM: An Introduction
OpenAM: An IntroductionForgeRock
77.7K views31 Folien
Identity Live Sydney 2017 - Ashley Stevenson von
Identity Live Sydney 2017 - Ashley StevensonIdentity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley StevensonForgeRock
609 views39 Folien
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow von
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowIoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowForgeRock
996 views16 Folien
Identity Live London 2017 | Kenneth May von
Identity Live London 2017 | Kenneth MayIdentity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth MayForgeRock
394 views29 Folien
OpenAM - An Introduction von
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An IntroductionForgeRock
40.3K views33 Folien
Identity Live Sydney 2017 - Allan Foster & Eve Maler von
Identity Live Sydney 2017 - Allan Foster & Eve MalerIdentity Live Sydney 2017 - Allan Foster & Eve Maler
Identity Live Sydney 2017 - Allan Foster & Eve MalerForgeRock
357 views1 Folie

Destacado(15)

OpenAM: An Introduction von ForgeRock
OpenAM: An IntroductionOpenAM: An Introduction
OpenAM: An Introduction
ForgeRock77.7K views
Identity Live Sydney 2017 - Ashley Stevenson von ForgeRock
Identity Live Sydney 2017 - Ashley StevensonIdentity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
ForgeRock609 views
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow von ForgeRock
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowIoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
ForgeRock996 views
Identity Live London 2017 | Kenneth May von ForgeRock
Identity Live London 2017 | Kenneth MayIdentity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth May
ForgeRock394 views
OpenAM - An Introduction von ForgeRock
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
ForgeRock40.3K views
Identity Live Sydney 2017 - Allan Foster & Eve Maler von ForgeRock
Identity Live Sydney 2017 - Allan Foster & Eve MalerIdentity Live Sydney 2017 - Allan Foster & Eve Maler
Identity Live Sydney 2017 - Allan Foster & Eve Maler
ForgeRock357 views
Paradigmo. Rock Kit, the Rapid Deployment Toolkit for ForgeRock Identity Plat... von ForgeRock
Paradigmo. Rock Kit, the Rapid Deployment Toolkit for ForgeRock Identity Plat...Paradigmo. Rock Kit, the Rapid Deployment Toolkit for ForgeRock Identity Plat...
Paradigmo. Rock Kit, the Rapid Deployment Toolkit for ForgeRock Identity Plat...
ForgeRock351 views
DevOps Unleashed: Strategies that Speed Deployments von ForgeRock
DevOps Unleashed: Strategies that Speed DeploymentsDevOps Unleashed: Strategies that Speed Deployments
DevOps Unleashed: Strategies that Speed Deployments
ForgeRock1.1K views
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit von ForgeRock
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
ForgeRock617 views
Implications of GDPR in Conjunction with UMA von ForgeRock
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock508 views
Keynote: Tech, Trust, and Transformation - Paris Identity Summit 2016 von ForgeRock
Keynote: Tech, Trust, and Transformation - Paris Identity Summit 2016Keynote: Tech, Trust, and Transformation - Paris Identity Summit 2016
Keynote: Tech, Trust, and Transformation - Paris Identity Summit 2016
ForgeRock360 views
Identity Live London 2017 | Marko Orenius von ForgeRock
Identity Live London 2017 | Marko OreniusIdentity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko Orenius
ForgeRock371 views
Analyst Keynote: Putting Customers First Requires Innovation and Identity - P... von ForgeRock
Analyst Keynote: Putting Customers First Requires Innovation and Identity - P...Analyst Keynote: Putting Customers First Requires Innovation and Identity - P...
Analyst Keynote: Putting Customers First Requires Innovation and Identity - P...
ForgeRock496 views
A Backstage Tour of Identity - Paris Identity Summit 2016 von ForgeRock
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
ForgeRock240 views
The digital pains of retail von ForgeRock
The digital pains of retailThe digital pains of retail
The digital pains of retail
ForgeRock275 views

Similar a Identity Live Sydney 2017 - Michael Dowling

Aensis Cyber_Sec 2017 von
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017José Carlos Álvarez
58 views14 Folien
Mi health care - multi-tenant health care system von
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
30 views9 Folien
Practical Enterprise Security Architecture von
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
2.4K views48 Folien
Beyond Security Article_Cyber Security_April_2015 von
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
211 views1 Folie
Safeguarding the Enterprise von
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the EnterpriseADGP, Public Grivences, Bangalore
584 views9 Folien
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi von
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
715 views29 Folien

Similar a Identity Live Sydney 2017 - Michael Dowling(20)

Mi health care - multi-tenant health care system von Conference Papers
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Practical Enterprise Security Architecture von Priyanka Aash
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash2.4K views
Beyond Security Article_Cyber Security_April_2015 von RAVI PRAKASH
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
RAVI PRAKASH211 views
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi von IBM Switzerland
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland715 views
Intelligence Driven Identity and Access Management von EMC
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
EMC676 views
Cloud based security threats with present challenges and opportunities for ma... von eSAT Publishing House
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks von Mighty Guides, Inc.
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Securely access and audit the cloud von Novell
Securely access and audit the cloudSecurely access and audit the cloud
Securely access and audit the cloud
Novell486 views
Accenture Security Services: Defending and empowering the resilient digital b... von Accenture Technology
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Cisco Connect Halifax 2018 Simple IT von Cisco Canada
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
Cisco Canada135 views
MILCOM 2013 Keynote Presentation: Larry Payne von AFCEA International
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
AFCEA International2.2K views
CE Cybersecurity Trends and Strategies for Hosting in the Cloud von Case IQ
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ582 views
A New And Efficient Hybrid Technique For The Automatic... von Amber Wheeler
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
Amber Wheeler2 views

Más de ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale von
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
1.6K views23 Folien
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond von
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
572 views18 Folien
Identity Live Sydney: Identity Management - A Strategic Opportunity von
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
456 views17 Folien
Identity Live Singapore: Transform Your Cybersecurity Capability von
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
438 views48 Folien
Identity Live Singapore 2018 Keynote Presentation von
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
435 views41 Folien
Identity Live Sydney 2018 Keynote Presentation von
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
340 views42 Folien

Más de ForgeRock(20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale von ForgeRock
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock1.6K views
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond von ForgeRock
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
ForgeRock572 views
Identity Live Sydney: Identity Management - A Strategic Opportunity von ForgeRock
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
ForgeRock456 views
Identity Live Singapore: Transform Your Cybersecurity Capability von ForgeRock
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock438 views
Identity Live Singapore 2018 Keynote Presentation von ForgeRock
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock435 views
Identity Live Sydney 2018 Keynote Presentation von ForgeRock
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
ForgeRock340 views
Identity Live Singapore: Just Ask 'Em von ForgeRock
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
ForgeRock239 views
Identity Live Singapore: Building Trust & Privacy in a Connected Society von ForgeRock
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
ForgeRock205 views
Identity Live Sydney: Intelligent Authentication von ForgeRock
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock160 views
Identity Live Sydney: Building Trust and Privacy in a Connected Society von ForgeRock
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock120 views
Get the Exact Identity Solution you Need in the Cloud - Deep Dive von ForgeRock
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
ForgeRock236 views
Get the Exact Identity Solution You Need - In the Cloud - Overview von ForgeRock
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock437 views
ForgeRock and Trusona - Simplifying the Multi-factor User Experience von ForgeRock
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock581 views
Opening Keynote (Identity Live Berlin 2018) von ForgeRock
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
ForgeRock355 views
Steinberg - Customer identity as the cornerstone of our approach to digitaliz... von ForgeRock
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock478 views
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018) von ForgeRock
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
ForgeRock1.9K views
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden... von ForgeRock
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
ForgeRock216 views
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident... von ForgeRock
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock302 views
Shift from GDPR readiness to sustained compliance to improve your business an... von ForgeRock
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock1.3K views
Intelligent Authentication (Identity Live Berlin 2018) von ForgeRock
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock252 views

Último

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
114 views12 Folien
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... von
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
113 views18 Folien
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
75 views23 Folien
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
103 views59 Folien
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...ShapeBlue
121 views15 Folien
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueShapeBlue
68 views13 Folien

Último(20)

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue114 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... von ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue113 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue75 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash103 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue121 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue63 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue von ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue147 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue105 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue56 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 views
Data Integrity for Banking and Financial Services von Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely76 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays49 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty54 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 views
NTGapps NTG LowCode Platform von Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 views

Identity Live Sydney 2017 - Michael Dowling

  • 1. Michael Dowling APAC Digital Identity Lead Accenture Australia Identity Live Sydney August 15th 2017
  • 2. Copyright 2017 Accenture. All rights reserved. 2 NAVIGATING COMPLEX ECOSYSTEMS Businesses operate in a digital ecosystem that is becoming ever more connected, collaborative and complex. Think about your ecosystem as a neighbourhood…
  • 3. Copyright 2017 Accenture. All rights reserved. 3 WHO IS IN YOUR NEIGHBOURHOOD?
  • 4. Copyright 2017 Accenture. All rights reserved. 4 A SELF-SUSTAINING ENTERPRISE UNDERSTANDS AND RESPONDS TO WHO’S MOVING IN AND OUT, WHAT THEY’RE DOING, AND WHAT THREATS THEY PRESENT.
  • 5. Has the agility to sense & respond to threats and vulnerabilities as they present themselves THE SELF-SUSTAINING ENTERPRISE Copyright 2017 Accenture. All rights reserved. 5 Infrastructure shifts security postures in response to ecosystem changes. Uses predictive analytics and cognitive modelling to automate how enterprise security “thinks” about threats or risks. Infrastructure paradigms such as network functions virtualisation (NFV) and serverless architectures introduce the agility needed to “react”.
  • 6. Copyright 2017 Accenture. All rights reserved. 6 Proliferation of insecure devices Merging of personal and professional lives and data Attackers “weaponising” the internet CYBER RISKS IN A NEW BUSINESS ECOSYSTEM Businesses operate in a digital ecosystem that is becoming ever more connected, collaborative and complex.
  • 7. Copyright 2017 Accenture. All rights reserved. 7 THE NECESSARY FUNDAMENTALS OF SELF-SUSTAINING ENTERPRISES Continuous discovery and classification of new assets (user, device or data) Trust-based authentication assigns a “trust-level” to each device An adaptive, intelligent security platform will streamline security operations and reduce complexity
  • 8. Copyright 2017 Accenture. All rights reserved. 8 THE EVOLUTION OF TRUST PRINCIPLES Digital Trust Think digital trust is cornerstone of digital economy 33% Proactively brought ethics into Tech Vision discussion 83%
  • 9. A self-sustaining approach enhances existing cybersecurity capabilities through automation, machine learning, software-defined networking and new approaches to infrastructure. ENABLING THE SELF-SUSTAINING ENTERPRISE Copyright 2017 Accenture. All rights reserved. 9 An adaptive, intelligent platform that can deliver a self-healing, scalable security environment
  • 10. More sophisticated identity methods for seamless integration Consistent user experience across applications, devices and internet-connected things to manage persistent identity. Going serverless Applications built within a serverless architecture exist as individual functions, with a strong definition for how data needs to flow between them. It required operational discipline--triggers and microservices--which can be leveraged for cyber defense. Thinking about infrastructure and security as code Software-defined security has controls designed independently of the physical infrastructure. Virtualising in this way provides the flexibility and agility to control and quarantine small parts of the network/device. Becoming dynamic As threats or risks change, the self-sustaining enterprise responds by segmenting, moving and morphing assets with a much more fluid and unpredictable approach to managing business risks, protecting assets or containing incidents. ENABLING THE SELF-SUSTAINING ENTERPRISE Copyright 2017 Accenture. All rights reserved. 10
  • 11. Copyright 2017 Accenture. All rights reserved. 11 Continuous Integration through DevOps Continuous / Persistent Authorisation Micro-services / Serverless Customer Driven Authentication Experiences Data Privacy Device / Phone as Token Robotic Provisioning Biometrics Blockchain IOT Asset and Trust IDENTITY “By 2020, a typical small enterprise's IAM program will span a million people, 10 million things and billions of relationships, driving significant simplification of its approach to IAM.” Source: Gartner (May 2015) Trends that promise to disrupt how we think about Identity
  • 12. THE OPPORTUNITY Rapid enablement of cloud, mobile and IoT Digital Identity service delivers a richer, seamless user experience across applications, devices and internet- connected things. New Channels Single View Personalisation Relationships Privacy Regulatory Compliance Operational Efficiencies Security Seamless User Experience RETURN ON IDENTITY The business challenge: getting the math right on ROI Copyright 2017 Accenture. All rights reserved. 12
  • 13. Integrate products and/or techniques that “think” and “react” with minimal human effort (for example, AI and advanced analytics) to enable the self-sustaining environment. THE SELF-SUSTAINING ENTERPRISE JOURNEY Copyright 2017 Accenture. All rights reserved. 13 Understand the availability and sustainability goals for key business processes based on acceptable levels of risk. Identify applications that can be logically separated from their operational components into micro-services and events. Consider how security services can be shared for reuse/consistency, evaluate how they could be more effectively applied to micro-services and events, and revisit security requirements for business functions and services. Identify security functions that can be provided as a virtual service through serverless and network virtualised functions of software-defined networking. Build a robust identity and access management system to detect and manage new and existing assets—including users, devices, data and communications—to dynamically and continuously determine how trusted they are.
  • 14. 14 VELOCITY DEVOPS allows clients to build, deploy and maintain IAM infrastructures with pace, quality and consistency. VELOCITY DEVOPS provides automated end-to-end capabilities and predictable, repeatable outcomes VELOCITY AUTOMATION eliminates repetitive human tasks for IAM allowing organisations to scale while containing or reducing operational costs. VELOCITY AUTOMATION increases quality by the elimination of human error. VELOCITY ARTIFICIAL INTELLIGENCE communicates with the customer using natural language speech, online chat and email and provides fact or knowledge-based answers. THE “NEW” PLUS IDENTITY IS VELOCITY Copyright © 2017 Accenture Security. All rights reserved.
  • 15. Copyright 2017 Accenture. All rights reserved. 15 THANK YOU! Come and continue the conversation over at our stand, or contact me here: Michael Dowling APAC Digital Identity Lead, Accenture michael.dowling@accenture.com