SlideShare a Scribd company logo
1 of 27
Protecting Our Cyber-Identity in a Physical and
Virtual World for IoT Ecosystem
Valmiki Mukherjee
Security
Cognizant
Chief Security Architect
SCX09S
@valmikim
#CAWorld
Gautam Dev
Cognizant
Venture Leader
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
We live and work in a cyber-world where our physical entity and logical identities
are disjointed and vulnerable. We don’t know how our logical identity and data is
being accessed and by who. With the advent of IoT and “Digitization of All Things”
business and the proliferation of data, there is even more exposure of this logical
persona and potential for a breach.
In this presentation we discuss with consideration to IoT:
• What really is at stake in terms of enterprise risk, security and privacy
• What challenges are experienced and what Security Controls can be put in
• What tangible security solutions exist and can be used in an IoT world
Gautam Dev
Cognizant
Venture Leader
Valmiki
Mukherjee
Cognizant
Chief Security Architect
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
INTERNET OF (SECURE/INSECURE) THINGS
WHY IS IOT IMPORTANT AND WHY ACT NOW
OPPORTUNITIES FOR IMPROVING IOT SECURITY
IOT AND SECURITY AT CROSSROADS
BUILDING SECURITY CONTROLS INTO IOT ECOSYSTEM
COMPREHENSIVE AND CONVERGED SECURITY - SMAAS
1
2
3
4
5
6
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What is Internet of Things
Credit: engineering.com
The Internet of Things (IoT) is
the network of physical
objects or "things" embedded
with electronics, software,
sensors, and network
connectivity, which enables
these objects to collect and
exchange data.
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IoT Technical Definition
 Let’s look at how ITU-T Y.2060 defines the IoT
– IoT: a “global infrastructure for the information society, enabling advanced
services by interconnecting (physical and virtual) things based on existing and
evolving interoperable information and communication technologies.”
– Device: ...“a piece of equipment with the mandatory capabilities of
communication and the optional capabilities of sensing, actuation, data
capture, data storage and data processing.”
– Thing: …“an object of the physical world (physical things) or the information
world (virtual things), which is capable of being identified and integrated into
communication networks.”
Source: ITU-T Y.2060
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Why do we Care About IoT?
Credit: IDC/McKinsey Analysis, Information Week
If you think you are already
living in a connected world, think
harder…
Chances are that we have
underestimated the size and scale of
the things to come – with IoT!
We are heading towards a
hyperconnected world that we have
never lived in or seen before
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IoT was not Made for Security
So we have - Internet of (Insecure) Things?
Constituents of IoT Universe are wildly diverse
ranging from simple to very complex
These devices were not made with security in
mind, or not today’s security in mind
Fixed function devices to perform a specific task
Despite connectivity reaching IoT devices for
anything such as security update is tough
Security was not Made for IoT
Enterprise Security is typically
multilayer/multicomponent
Enterprise security is also oriented towards PCs
and Servers which won’t even run on IoT devices
Basic protective components such as Firewalls
are absolutely absent from Embedded devices
IoT Devices rely on basic authentication
mechanisms & security protocols
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Internet of Things – Risks and Rewards
 Major concerns with IoT
– Does not implement
sufficient security
– IT Department is not aware
of IoT at Workplace
– IoT has reduced Privacy
– Cyberattack through hyper
connected IoT devices
Credit: ISACA Survey on Security in IoT
Organizations feel thoroughly underprepared for IoT Security
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What is the Risk with IoT Devices?
•Embedded Devices in IoT are not only about the Smart Watches and fitness devices, they manage
and monitor critical infrastructure in the industry and public lifeCritical functionality
•Embedded devices are mass produced and typically similarly configured, hence if a vulnerability is
exploited, it is easy to carry out large scale attacksReplication
•Embedded Device engineers rarely have security background and no one historically has assumed
that they would be targets of a cyberattack - not cool!Security Assumptions
•They are neither easily patched or upgraded, they have in fact very minimal computing and
storage footprint which is designed for efficiency and longevityNot easily patched
•Embedded devices in IoT ecosystem are designed to last, while vulnerabilities associated in the
cyberspace changes everydayLong lifecycle
•Embedded devices often use specialized protocols that are not recognized and protected by
enterprise security tools. Traditional security components are not designed for such.Proprietary/industry specific protocols
•Many embedded devices are mobile or are deployed in the field. As a result, these devices may be
directly connected to the Internet with none of the protections found in a corporate environment.
Deployed outside of enterprise
security perimeter
Understanding the underlying problem with IoT ecosystem
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Device Registration Pub/SubDevice Bootstrapping
Understanding the IoT Ecosystem Security Protocols
Mapping Enterprise Security Components to IoT – Device Identity Interaction
Device Registration
Device Access
Owner Device
AuthN/AuthZ
Device Management
Data/Policy Check
LWM2M / COAP /
CREDENTIALS / ATTRIBUTES /
CERTS / JWTs
OAUTH2 / JWT /
CERT AUTHN / SCOPE /
TOKEN VALIDITY
Data Application and Management
USER
REGISTRATION
REST / JSON
3RD PARTY
REGISTRATION
OAUTH2 / OIDC
3RD PARTY
DATA SHARING
OAUTH2 / OIDC
APIs/OAUTH2
APIs REST /
JSON
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Risks Associated with IoT
Enterprise Users as Consumers
Enterprise Users as Employees
Enterprise Users as
Admins/Privileged Users
Consumer IoT User Privacy Risk
Enterprise/Industrial IoT Enterprise Risk
IoT Administration Infrastructure Risk
Identity
Activity
Access
Activity
Access
Activity
Access
PII Exposure
Malicious Access
to personal data
Malicious
usage of
sensor and
information
Unintended
Malicious use
of Admin
Access
How identity could be the key thread
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Integrated View of IoT Security Controls
IoT security controls need to span the
device itself as well as the environment
that the device operates within
Also this should be included in the overall
cybersecurity program with a converged
view of all domains interacting with the
IoT Devices
CSA Proposed IoT Controls
Guidance
Credit: CSA IoT Workgroup
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Top Recommendations for IoT Security Controls
1. Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design
approach to IoT development and deployment
2. Apply a Secure Systems Engineering approach to architecting and
deploying a new IoT System
3. Implement layered security protections to defend IoT assets
4. Implement data protection best-practices to protect sensitive
information
5. Define lifecycle controls for IoT devices
6. Define and implement an authentication/authorization framework for
the organization’s IoT Deployments
7. Define and implement a logging/audit framework for the organization’s
IoT ecosystem
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security Solution Framework for Recommended Controls
Control Solution Infrastructure ProtectionIdentity and Access Control
From Controls to a Practical Solution
Integrate IoT into existing
IAM and GRC platforms
Change Default passwords for
administrative access
AAA schemes based on
system-level threat models
Utilize Smart Phones for
Multifactor Authentication
Reference Architecture with ITU-T Y.2060
PKI Updates with rollout of
Device Certificates
Provide Consumer preference
and Consent Management
Integrate Physical Access
Control Systems with IAM
Restrictive Controls for
devices transactions
Implement Privileged Access
Mgmt. for administrators
Develop a well articulated Incident Response Plan
Establish People and Device
Relationships
Monitor devices and their
usage behavior
Develop context based AAA
for sensor nodes
Leverage IoT Std/protocols
for security controls
Use entity analytics to fine
tune control measures
build secure default
configuration
Enable kill switches to take
rogue devices off n/w
A comprehensive and converged view of security solution for the IoT ecosystem
Common Data Exchange Interface
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IAM
Data Protection
Application Security
Audit & Logging Management
Integrated Threat & Vulnerability Management
Cognizant’s Answer to Today’s Risk Landscape
Help Current Technologies Run Better
Entity, Access and Activity Warehouse
User & Resource
Behavior Profiling
Anomaly Detection
And Self Learning
Integrated Threat
Engine
Identity Centric
Access Analytics
Enterprise Policy
Enforcement
Governance Risk and Compliance
Actionable Risk Prevention and Remediation
Real time Activity
Monitoring
Risk Based Decision Support and 360o Validation
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
SMaaS Suite Technology Components
Critical Packs Powered by CA Security Solutions
Id Intelligence Pack Access Pack Federation Pack Control Pack
Actionable Risk Intelligence Risk Based Fine-grained
Access Mgmt.
Industry Wide Trusted
IdP & SP Services
Bottom Up GRC Policy
Enforcement
Anomaly Detection
Behavioral Patterns
Predictive Self Learning
Threat Intelligence
Enterprise Policies
Certified User Access
Dynamic Access
Policies
Finegrained
Authorization Policy
SMaaRT Role Based
Access Control
Risk Based Access
Control
Identity Proofed Users
SP and IdP Services
Standards based
Federated SSO
Cloud and on Premise
integration
Multifactor and Risk
based AuthN/AuthZ
Pre-packaged
Compliance Standards
Integrated Policy
Management
Framework
Bottom up Policy
mapping
and enforcement
Actionable GRC Index
Identity Activity and
Access Warehouse
Certified and Trusted
Users and Entitlements
Certified and Trusted
Users and Entitlements
Controls and Policy
Repository
Data Pack
Risk based Data Protection
Data at rest Protection
(obfuscation &
encryption)
Realtime and Runtime
data protection
Data desensitization
and redaction
Application based data
solutions
Data Controls and
Access Policy
Repository
End Point Pack
Risk based End Point
Protection
Cyber Threat
Intelligence
Asset Inventory and
Policy Repository
Endpoint System
Management
Advanced Threat
Prevention
Endpoint Remediation
Endpoint Incident
Response
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Next Generation MSSP Follows Assurance
Traditional MSSP Model Follow
Operations
Supported by Cognizant Security Assurance Center Model
Security Operations
Center
Security Assurance Center
Focus on
Assurance based
on Prevention and
Remediation
IT Security Assurance Services
Data Assurance Service
NextGen SOC Services
GRC Assurance Services
Application Security Maturity
Center
Risk Prevention and Information Security Platforms
SMaaS Data Obscure
Realtime Assurance Dashboards
C-Level
Dashboard
Operational
Dashboard
Investigative
Dashboard
Analyst
Dashboard
Customer IT and Security Operations Data
Authoritative
Sources
Application
Data
Security Data IT Infra Data
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IoT Security needs
comprehensive support
IoT is an ecosystem and there
needs to be a conscious and
concerted support towards
convergence of security
protocols and approaches
Cognizant and CA combined
have a comprehensive solution
IoT Security is Key Issue
and real Challenge
IoT devices and ecosystem was
not build with Security in mind
Enterprise security needs to be
adapted to embrace IoT
IoT Security can be
Improved significantly
IoT Security can be significantly
improved by partnering with
device engineers and
supporting the ecosystem with
adopting converged security
view with identity at center
Summary
A Few Words to Review
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
About Cognizant
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Who we are
Founded in 1994
(CTSH, Nasdaq)
………………………..
Headquarters
Teaneck, NJ
……………….…….
………………….…………..….….. 75+ Global Delivery
Centers
20,000+ Projects in
40 countries
……………….…....……………………
Revenue
$10.26b in 2014 (up 20.4% YOY)
Q2 2014 – $2.52b
25+ Regional
sales offices
…………….…...
Revenue Mix (H1 2014)
NA: 76.2%, Europe:19%,
RoW: 4.8%
. . . .…………………..
……………………….220,000+
employees (Sep 2015)
.……………………….. 1,242
active customers
.
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security Service Lines
10+
1300+
300+
Avg. Years Experience
Security Consultants
Project Executed
SMaaS
ASMC
Data Obscure 300+ CISA, CISM, CISSP, CEH and vendor certified associates
250+ Network Security trained associates
80+ Data Security Analysis, Architects and Consultants
100+ GRC Vendor Certified Security Analysts, Architects and Consultants
Enterprise
Partnerships
Service
Partnerships
Enterprise Risk and Security Solutions (ERSS) Venture is the EBA
Business Unit focused on delivering Security and Risk Management
solutions at Cognizant
Data SecuritySecurity Assessment
Integrated Threat
Management
Identity and Access
Management
GRC
UMaaS
ACCERT
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
SMaaS
Accreditation
Event
PresenceAnalyst
Briefing
Endorsements
Credentials in the Market
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCT31T Tech Talk: Knock, Knock – the IoT wants to come in? 11/18/2015 at 03:45 pm
SCT05S
Roadmap: CA Advanced Authentication and CA Single Sign-
On
11/18/2015 at 04:30pm
SCT02S Keynote: Looking Beyond the Threat 11/19/2015 at 10:30 am
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Security
Innovations
Security Theater
Enable a Secure
Digital Workspace
CA SSO, APIM
Security Theater
Engage
Customers
CA SSO
Security Theater
Protect Against
Fraud & Breaches
CA Advanced Auth
Security Theater
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideCA Technologies
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsCA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationCA Technologies
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 
Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of ThingsHello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of ThingsCA Technologies
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring BattlesCA Technologies
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...CA Technologies
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsCA Technologies
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital EconomyCA Technologies
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryCA Technologies
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 

What's hot (20)

Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIs
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 
Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of ThingsHello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring Battles
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 

Viewers also liked

"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills AuditVilius Benetis
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedMike Chapple
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controlsEnclaveSecurity
 
Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Raul Soto
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB
 
Designing for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemMaurizio Caporali
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Martin Tom-Petersen
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityNeil Parker
 
Meet You GxP Compliance in the Cloud
Meet You GxP Compliance in the CloudMeet You GxP Compliance in the Cloud
Meet You GxP Compliance in the CloudAppian
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls Dyan Cornacchio
 

Viewers also liked (20)

"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk 7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
 
Company Product Sheet
Company Product SheetCompany Product Sheet
Company Product Sheet
 
Deft
DeftDeft
Deft
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)
 
Ispe Article
Ispe ArticleIspe Article
Ispe Article
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Designing for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical System
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
Meet You GxP Compliance in the Cloud
Meet You GxP Compliance in the CloudMeet You GxP Compliance in the Cloud
Meet You GxP Compliance in the Cloud
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
 
Virtual infrastructure qualification
Virtual infrastructure qualificationVirtual infrastructure qualification
Virtual infrastructure qualification
 

Similar to Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device ManagementFriendlyTech1
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 

Similar to Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem (20)

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
sample assignment
sample assignmentsample assignment
sample assignment
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device Management
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem

  • 1. Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem Valmiki Mukherjee Security Cognizant Chief Security Architect SCX09S @valmikim #CAWorld Gautam Dev Cognizant Venture Leader
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract We live and work in a cyber-world where our physical entity and logical identities are disjointed and vulnerable. We don’t know how our logical identity and data is being accessed and by who. With the advent of IoT and “Digitization of All Things” business and the proliferation of data, there is even more exposure of this logical persona and potential for a breach. In this presentation we discuss with consideration to IoT: • What really is at stake in terms of enterprise risk, security and privacy • What challenges are experienced and what Security Controls can be put in • What tangible security solutions exist and can be used in an IoT world Gautam Dev Cognizant Venture Leader Valmiki Mukherjee Cognizant Chief Security Architect
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda INTERNET OF (SECURE/INSECURE) THINGS WHY IS IOT IMPORTANT AND WHY ACT NOW OPPORTUNITIES FOR IMPROVING IOT SECURITY IOT AND SECURITY AT CROSSROADS BUILDING SECURITY CONTROLS INTO IOT ECOSYSTEM COMPREHENSIVE AND CONVERGED SECURITY - SMAAS 1 2 3 4 5 6
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is Internet of Things Credit: engineering.com The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IoT Technical Definition  Let’s look at how ITU-T Y.2060 defines the IoT – IoT: a “global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.” – Device: ...“a piece of equipment with the mandatory capabilities of communication and the optional capabilities of sensing, actuation, data capture, data storage and data processing.” – Thing: …“an object of the physical world (physical things) or the information world (virtual things), which is capable of being identified and integrated into communication networks.” Source: ITU-T Y.2060
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Why do we Care About IoT? Credit: IDC/McKinsey Analysis, Information Week If you think you are already living in a connected world, think harder… Chances are that we have underestimated the size and scale of the things to come – with IoT! We are heading towards a hyperconnected world that we have never lived in or seen before
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IoT was not Made for Security So we have - Internet of (Insecure) Things? Constituents of IoT Universe are wildly diverse ranging from simple to very complex These devices were not made with security in mind, or not today’s security in mind Fixed function devices to perform a specific task Despite connectivity reaching IoT devices for anything such as security update is tough Security was not Made for IoT Enterprise Security is typically multilayer/multicomponent Enterprise security is also oriented towards PCs and Servers which won’t even run on IoT devices Basic protective components such as Firewalls are absolutely absent from Embedded devices IoT Devices rely on basic authentication mechanisms & security protocols
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Internet of Things – Risks and Rewards  Major concerns with IoT – Does not implement sufficient security – IT Department is not aware of IoT at Workplace – IoT has reduced Privacy – Cyberattack through hyper connected IoT devices Credit: ISACA Survey on Security in IoT Organizations feel thoroughly underprepared for IoT Security
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is the Risk with IoT Devices? •Embedded Devices in IoT are not only about the Smart Watches and fitness devices, they manage and monitor critical infrastructure in the industry and public lifeCritical functionality •Embedded devices are mass produced and typically similarly configured, hence if a vulnerability is exploited, it is easy to carry out large scale attacksReplication •Embedded Device engineers rarely have security background and no one historically has assumed that they would be targets of a cyberattack - not cool!Security Assumptions •They are neither easily patched or upgraded, they have in fact very minimal computing and storage footprint which is designed for efficiency and longevityNot easily patched •Embedded devices in IoT ecosystem are designed to last, while vulnerabilities associated in the cyberspace changes everydayLong lifecycle •Embedded devices often use specialized protocols that are not recognized and protected by enterprise security tools. Traditional security components are not designed for such.Proprietary/industry specific protocols •Many embedded devices are mobile or are deployed in the field. As a result, these devices may be directly connected to the Internet with none of the protections found in a corporate environment. Deployed outside of enterprise security perimeter Understanding the underlying problem with IoT ecosystem
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Device Registration Pub/SubDevice Bootstrapping Understanding the IoT Ecosystem Security Protocols Mapping Enterprise Security Components to IoT – Device Identity Interaction Device Registration Device Access Owner Device AuthN/AuthZ Device Management Data/Policy Check LWM2M / COAP / CREDENTIALS / ATTRIBUTES / CERTS / JWTs OAUTH2 / JWT / CERT AUTHN / SCOPE / TOKEN VALIDITY Data Application and Management USER REGISTRATION REST / JSON 3RD PARTY REGISTRATION OAUTH2 / OIDC 3RD PARTY DATA SHARING OAUTH2 / OIDC APIs/OAUTH2 APIs REST / JSON
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Risks Associated with IoT Enterprise Users as Consumers Enterprise Users as Employees Enterprise Users as Admins/Privileged Users Consumer IoT User Privacy Risk Enterprise/Industrial IoT Enterprise Risk IoT Administration Infrastructure Risk Identity Activity Access Activity Access Activity Access PII Exposure Malicious Access to personal data Malicious usage of sensor and information Unintended Malicious use of Admin Access How identity could be the key thread
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Integrated View of IoT Security Controls IoT security controls need to span the device itself as well as the environment that the device operates within Also this should be included in the overall cybersecurity program with a converged view of all domains interacting with the IoT Devices CSA Proposed IoT Controls Guidance Credit: CSA IoT Workgroup
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Top Recommendations for IoT Security Controls 1. Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment 2. Apply a Secure Systems Engineering approach to architecting and deploying a new IoT System 3. Implement layered security protections to defend IoT assets 4. Implement data protection best-practices to protect sensitive information 5. Define lifecycle controls for IoT devices 6. Define and implement an authentication/authorization framework for the organization’s IoT Deployments 7. Define and implement a logging/audit framework for the organization’s IoT ecosystem
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security Solution Framework for Recommended Controls Control Solution Infrastructure ProtectionIdentity and Access Control From Controls to a Practical Solution Integrate IoT into existing IAM and GRC platforms Change Default passwords for administrative access AAA schemes based on system-level threat models Utilize Smart Phones for Multifactor Authentication Reference Architecture with ITU-T Y.2060 PKI Updates with rollout of Device Certificates Provide Consumer preference and Consent Management Integrate Physical Access Control Systems with IAM Restrictive Controls for devices transactions Implement Privileged Access Mgmt. for administrators Develop a well articulated Incident Response Plan Establish People and Device Relationships Monitor devices and their usage behavior Develop context based AAA for sensor nodes Leverage IoT Std/protocols for security controls Use entity analytics to fine tune control measures build secure default configuration Enable kill switches to take rogue devices off n/w A comprehensive and converged view of security solution for the IoT ecosystem Common Data Exchange Interface
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IAM Data Protection Application Security Audit & Logging Management Integrated Threat & Vulnerability Management Cognizant’s Answer to Today’s Risk Landscape Help Current Technologies Run Better Entity, Access and Activity Warehouse User & Resource Behavior Profiling Anomaly Detection And Self Learning Integrated Threat Engine Identity Centric Access Analytics Enterprise Policy Enforcement Governance Risk and Compliance Actionable Risk Prevention and Remediation Real time Activity Monitoring Risk Based Decision Support and 360o Validation
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD SMaaS Suite Technology Components Critical Packs Powered by CA Security Solutions Id Intelligence Pack Access Pack Federation Pack Control Pack Actionable Risk Intelligence Risk Based Fine-grained Access Mgmt. Industry Wide Trusted IdP & SP Services Bottom Up GRC Policy Enforcement Anomaly Detection Behavioral Patterns Predictive Self Learning Threat Intelligence Enterprise Policies Certified User Access Dynamic Access Policies Finegrained Authorization Policy SMaaRT Role Based Access Control Risk Based Access Control Identity Proofed Users SP and IdP Services Standards based Federated SSO Cloud and on Premise integration Multifactor and Risk based AuthN/AuthZ Pre-packaged Compliance Standards Integrated Policy Management Framework Bottom up Policy mapping and enforcement Actionable GRC Index Identity Activity and Access Warehouse Certified and Trusted Users and Entitlements Certified and Trusted Users and Entitlements Controls and Policy Repository Data Pack Risk based Data Protection Data at rest Protection (obfuscation & encryption) Realtime and Runtime data protection Data desensitization and redaction Application based data solutions Data Controls and Access Policy Repository End Point Pack Risk based End Point Protection Cyber Threat Intelligence Asset Inventory and Policy Repository Endpoint System Management Advanced Threat Prevention Endpoint Remediation Endpoint Incident Response
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Next Generation MSSP Follows Assurance Traditional MSSP Model Follow Operations Supported by Cognizant Security Assurance Center Model Security Operations Center Security Assurance Center Focus on Assurance based on Prevention and Remediation IT Security Assurance Services Data Assurance Service NextGen SOC Services GRC Assurance Services Application Security Maturity Center Risk Prevention and Information Security Platforms SMaaS Data Obscure Realtime Assurance Dashboards C-Level Dashboard Operational Dashboard Investigative Dashboard Analyst Dashboard Customer IT and Security Operations Data Authoritative Sources Application Data Security Data IT Infra Data
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IoT Security needs comprehensive support IoT is an ecosystem and there needs to be a conscious and concerted support towards convergence of security protocols and approaches Cognizant and CA combined have a comprehensive solution IoT Security is Key Issue and real Challenge IoT devices and ecosystem was not build with Security in mind Enterprise security needs to be adapted to embrace IoT IoT Security can be Improved significantly IoT Security can be significantly improved by partnering with device engineers and supporting the ecosystem with adopting converged security view with identity at center Summary A Few Words to Review
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD About Cognizant
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Who we are Founded in 1994 (CTSH, Nasdaq) ……………………….. Headquarters Teaneck, NJ ……………….……. ………………….…………..….….. 75+ Global Delivery Centers 20,000+ Projects in 40 countries ……………….…....…………………… Revenue $10.26b in 2014 (up 20.4% YOY) Q2 2014 – $2.52b 25+ Regional sales offices …………….…... Revenue Mix (H1 2014) NA: 76.2%, Europe:19%, RoW: 4.8% . . . .………………….. ……………………….220,000+ employees (Sep 2015) .……………………….. 1,242 active customers .
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security Service Lines 10+ 1300+ 300+ Avg. Years Experience Security Consultants Project Executed SMaaS ASMC Data Obscure 300+ CISA, CISM, CISSP, CEH and vendor certified associates 250+ Network Security trained associates 80+ Data Security Analysis, Architects and Consultants 100+ GRC Vendor Certified Security Analysts, Architects and Consultants Enterprise Partnerships Service Partnerships Enterprise Risk and Security Solutions (ERSS) Venture is the EBA Business Unit focused on delivering Security and Risk Management solutions at Cognizant Data SecuritySecurity Assessment Integrated Threat Management Identity and Access Management GRC UMaaS ACCERT
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD SMaaS Accreditation Event PresenceAnalyst Briefing Endorsements Credentials in the Market
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCT31T Tech Talk: Knock, Knock – the IoT wants to come in? 11/18/2015 at 03:45 pm SCT05S Roadmap: CA Advanced Authentication and CA Single Sign- On 11/18/2015 at 04:30pm SCT02S Keynote: Looking Beyond the Threat 11/19/2015 at 10:30 am
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Security Innovations Security Theater Enable a Secure Digital Workspace CA SSO, APIM Security Theater Engage Customers CA SSO Security Theater Protect Against Fraud & Breaches CA Advanced Auth Security Theater
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15