Enviar búsqueda
Cargar
Tech Talk: Privileged Account Management Maturity Model
•
1 recomendación
•
2,797 vistas
CA Technologies
Seguir
Tech Talk: Privileged Account Management Maturity Model
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 18
Descargar ahora
Descargar para leer sin conexión
Recomendados
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
SOC 2 Compliance and Certification
SOC 2 Compliance and Certification
ControlCase
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
The Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
Cyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
Recomendados
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
SOC 2 Compliance and Certification
SOC 2 Compliance and Certification
ControlCase
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
The Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
Cyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
Certified SOC Analyst
Certified SOC Analyst
SagarNegi10
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Mark S. Mahre
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NetLockSmith
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
Sounil Yu
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
Governance risk and compliance
Governance risk and compliance
Magdalena Matell
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
Cyber security investments 2021
Cyber security investments 2021
Management Events
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
Building A Security Operations Center
Building A Security Operations Center
Siemplify
Roadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
Building Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
SOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
EmilyGladstoneCole
Strategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ControlCase
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Más contenido relacionado
La actualidad más candente
Certified SOC Analyst
Certified SOC Analyst
SagarNegi10
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Mark S. Mahre
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NetLockSmith
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
Sounil Yu
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
Governance risk and compliance
Governance risk and compliance
Magdalena Matell
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
Cyber security investments 2021
Cyber security investments 2021
Management Events
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
Building A Security Operations Center
Building A Security Operations Center
Siemplify
Roadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
Building Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
SOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
EmilyGladstoneCole
Strategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ControlCase
La actualidad más candente
(20)
Certified SOC Analyst
Certified SOC Analyst
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
Governance risk and compliance
Governance risk and compliance
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
Cyber security investments 2021
Cyber security investments 2021
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Building A Security Operations Center
Building A Security Operations Center
Roadmap to security operations excellence
Roadmap to security operations excellence
Building Security Operation Center
Building Security Operation Center
SOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
Strategy considerations for building a security operations center
Strategy considerations for building a security operations center
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
Destacado
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
ObserveIT
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Trish McGinity, CCSK
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
Security Maturity Models.
Security Maturity Models.
Priyanka Aash
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Privileged Access Management - 2016
Privileged Access Management - 2016
Lance Peterman
Destacado
(17)
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Privileged Access Management (PAM)
Privileged Access Management (PAM)
Security Maturity Models.
Security Maturity Models.
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Privileged Access Management - 2016
Privileged Access Management - 2016
Similar a Tech Talk: Privileged Account Management Maturity Model
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
CA Technologies
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
CA Technologies
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
CA Technologies
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
CA Technologies
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
CA Technologies
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
CA Technologies
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
CA Technologies
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
CA Technologies
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
Laurie Desautels
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
CA Technologies
Business Transformation Framework
Business Transformation Framework
Kunal Sharma
Choosing the right benefits tech webinar
Choosing the right benefits tech webinar
Thomsons Online Benefits
[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation
AIIM International
The President Of A Company
The President Of A Company
Navy Savchenko
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
CA Technologies
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
CA Technologies
Similar a Tech Talk: Privileged Account Management Maturity Model
(20)
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Business Transformation Framework
Business Transformation Framework
Choosing the right benefits tech webinar
Choosing the right benefits tech webinar
[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation
The President Of A Company
The President Of A Company
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Más de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Más de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Último
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Último
(20)
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Slack Application Development 101 Slides
Slack Application Development 101 Slides
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Tech Talk: Privileged Account Management Maturity Model
1.
World® ’16 Tech Talk: How Do You Measure Up? A Maturity Model for Privileged Access Management Shawn W. Hank – Sr. Principal Consultant, Cybersecurity CA Technologies SCT41T SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract As security and risk professionals increasingly focus on the need for privileged access management within their organizations, a number of questions arise. Are critical functions being addressed? Are the appropriate processes and management oversight in place? How can the overall privileged access management program be improved? What areas need more focus to improve program effectiveness? In this session, we’ll discuss a privileged access management maturity model – focused on key technology, process, and management activities and capabilities –
that security teams can use to baseline their privileged access management program and identify areas for improvement and future refinement. Shawn W. Hank CA Technologies, Inc. Sr. Principal Consultant Cybersecurity
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The risk and potential for security breaches exist anywhere there are privileged accounts. Privileged Accounts are everywhere; ergo potential vectors of compromise exist everywhere. Your Privileged Accounts Are valuable Targets! And they are a critical component of your overall security posture. Privileged Accounts Grow in Numbers Everyday. They exist in all layers of any organizations IT stack: -
Infrastructure - Front End - Middleware - Backend Existing Models of Managing Privileged Accounts Fall Short. Every Major Breach Has Involved A Privileged Account Privileged Account Management Facts
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Maturity – Level 0/1
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 1 §
Examples – root, oradba, sapadmin, cisco enable, Windows local admin, named admin accounts, SaaS/IaaS/PaaS admin accounts § Why – If you control access to the accounts as well as their passwords, you can control privileged actions and who can make them § Hint – Public discussions about monitoring and audit are a big deterrent of unwanted behavior Privileged Users / Shared Accounts
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Maturity – Level 1/2
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 2 §
Examples – SIEM, Network Monitoring, Change Management, Session Recording, Analytics § Why – Proactive vs. Reactive § Hint – Automated remediation is faster than human action. Think SecOps or DevSecOps Activity Monitoring
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 2/3 §
Examples – COTS applications, application & middleware Servers, DevOps (CI and/or Orchestration) Systems, Scheduled Tasks, Batch Jobs, Scripts § Why – Our experience tells us there are 5 to 7 times as many application accounts as there are human, interactive accounts. The threat is larger in this context. § Hint – Start small and build over time, incorporating with SDLC Service & Application Accounts
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 3/4 §
Examples – CA Identity Suite, CA Identity Service, Oracle IAM, SailPoint, IBM Security Identity Manager § Why – PAM solutions should not provision accounts. – Integration with IDM tools allows for programmatic provisioning and removal of accounts and credentials as well as certification and accreditation when needed. Identity Management Integration
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas Level 3/4 § Examples –
CA PAM SC, Symantec CSP, Dell UPM, PowerBroker, ViewFinity § Why – PAM focus has been primarily on the server side of the equation. – Most privileged accounts compromises happened on client endpoint systems (i.e., managed and unmanaged laptops, etc.) – Moving the PAM function closer to the user environment (aka endpoint) is a logical progression. Fine Grained Controls
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Privileged Access Management Maturity Model Level 0 Level 1 Ad Hoc / Manual Level
2 Baseline Level 3 Managed Level 4 Advanced Privileged User/Shared Accounts Not managing or rotating credentials Manual Controls For Privileged Accounts Basic Vault Structured Controls Account Inventory SDLC Integration Credential Vault w/ RBAC Central Password Policies Account Discovery MFA Password-less (SAML/OAUTH/TGS) Cloud/SaaS/SDN & HSM Integration Service & Application Accounts No knowledge of Application accounts Ad Hoc Application Account Management Hard Coded Passwords Manual Application Account Management Centralized A2A Mgmt. No Hardcoded Creds. REST API Integration Governed A2A DevOps Integration Monitoring & Threat Detection No monitoring of account usage Ad Hoc Audit & Controls Activity Monitoring Decentralized logging SIEM Integration Account Attribution SNMP Alerting Session Recording Meta-Data Service Desk Workflow & Analytics Integration Identity Management Integration Manual provision, no certification or accreditation Manual Process For Privileged Access Automated Privileged Identity Mgmt. Integrated Privileged Access Requests Basic Governance Fully Delegated Administration Governed Privileged Access w/SoD Fine-grained Controls/SoD Non existent Open Source Tools and Scripts Decentralized Tools (Silos) Command Filtering Restricted Shell Leap Frog Prevention Centrally Managed Kernel Interceptor with Cred Vault Integration
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Do you have a record of credential access? - The 5 W's: Who, What, When, Where, Why? Questions to Consider How is privileged account access granted? Do you have an inventory of Privileged Accounts? -
Interactive & Programmatic? Are privileged accounts included in the SDLC process? - for 3rd Party Developers and Contractors? How do you grant emergency access to privileged accounts? How to you track the usage of privileged accounts? If yes, how often are you rotating privileged account credentials? Do you have a policy and process for rotating privileged account credentials? Do you require a change ticket for privileged account use? Do you have SoD for privileged accounts? - How is SoD enforced? What is the current certification process for privileged accounts? How are new privileged accounts created? - What does the workflow look like? What is your approach for managing privileged accounts that live in the cloud? - IaaS, PaaS, Saas? Is Multi-Factor Authentication a requirement to access privileged accounts? Is privileged account access monitored for suspicious activity? Are fine-grained controls in place to restrict the scope of privileged accounts? - How is this managed?
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 3/4 ADVANCED Review Redefine Optimize
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Privileged Account Management Maturity Model Whether you haven't started, have just begun, or are in the throes of a Privileged Access Management project, there are several items to consider. It is our hope that the framework we have provided here will start a discussion and assist you as you move forward. Let us know how we can help! Summary
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME SCT39T PAM for Hybrid Enterprises 11/17/2016 at 1:45 pm SCT36T Real-time Identity Analytics 11/16/2016 at 3:00 pm SCT43T Threat Analytics for PAM 11/17/2016 at 4:30 pm
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Descargar ahora