SlideShare una empresa de Scribd logo
1 de 15
Try Purchase Use Engage
Customer Journey - The effects of IAM transformation
Acting
Doing
Thinking
Feeling
Overall
Downloading trial software
Register contact profile
Activate account with 2-Step registration
Online checkout
Contact Sales
Click to chat
Buy more licenses
Activate a new service subscription
Become a enterprise customer
Install & register software
Manage On-prem to cloud
Migrate AD to cloud/SaaS portal
Delegate administration
Promote user to Admin role
Register for Support Forums
Contact Support
Register for Conference
Become a partner
Do I have to register to download this?
Does my login ID from 2 years ago still
work?
Does my cloud login work for this?
Is this a global ID?
Do I login in order to obtain a license or
activate my subscription?
Will tenant cloud know who I am or do I
have to register again?
How will I sync or migrate my users to
tenant cloud?
Do I use my local account or my
enterprise credentials to login to cloud?
How will I login to tenant cloud?
How can I assign access to others within
my organization?
Can I audit who has access to my tenant?
Does my enterprise login ID work for
support?
Do I have to register a new account for
conference attendance?
How do I access my Partner content?
Consistent messaging & UI and central
Login builds confidence and trust
Enterprise respected my privacy and did
not ask for too much information
My authentication experience is the same
now as it was during Trial Eval
I have visibility into new products and
services that my identity is allowed to see
and purchase
Happy that Enterprise recognizes my
global ID and credentials across all of its
products and services
Enterprise provides me with the tools I
need to monitor and manage my users
Excited that the enterprise really knows
me and correctly identifies me in every
context of interaction
I will recommend to my colleagues based
on my experiences
Trust
Helpfulness
Trust
Helpfulness
Trust
Helpfulness
Trust
Helpfulness
Business Driven IAM
Typical Approach Typical Challenges
• Focused within the
perimeter
• Static protection (rule
based)
• Isolated from SOC & GRC
controls
• Legacy systems and
applications
• Too many silos
Intelligent
IAM
SSO
Dynamic user
provisioning
Automated
access
governance
Event/activity
monitoring
Business
Concerns
• We don’t want to
be the next
massive data
breach
• We want to make
sure our identity
providers are as
secure as it can
be
• We are prioritizing
our security spend
around that
Risk Aware IAM
is the new black
Risk Aware IAM
• Quantify user risk scores
over time to enhance
adaptive authentication
• Connect risk insight into
meaningful and rapid
response
• Addresses the biggest
cause of modern day
data breaches
UEBA
Detect risky
behaviors
SIEM
Single pane of
glass for on-prem
and cloud
Credential
Verification
Detect leaked
credentials during
logon
Detect & Verify
Compromised
Credentials
• Prevent stolen credentials
from being used during
logon
• Automate response &
remediation
• Outsource liabilities & risk
• Support for NIST 800-63B
• Complement 2FA and MFA
2FA & MFA
≠ Modern IAM
L1 Risk
15 – 40%
When When a compromised credential is
linked to the username (E.g. email
address)
When only either compromised
credential or account is known
Where During login and self-service
password reset
Risk score, user and domain
dashboard
Action Taken Force change password; step-up
authentication; revoke user access
Assess degree of risk; display a
warning
L2 Risk
87%
My.VeriClouds.com
• Check if your credentials have been
leaked
• Check how many credentials are
leaked in your business domain
• Search against more than 6B leaked
accounts
• Your information stays private
• Mobile friendly
How do you get there?
• Integrating and uniting these platforms
—Begin using CASB, SIEM and credential verification services
• Start small – increase the scope of “risk aware IAM”
every quarter
—Begin with the end in mind, and work backwards
• Avoid silo’d thinking
—Connect your IAG/IAM initiatives to other SOC and GRC
initiatives
The Future
• Not as simple as enabling MFA and creating a dashboard
—Analytics, reports, dashboards – potential data overload!
• The industry will move more towards risk aware IAM that:
— Automates risk insight into actionable policy enforcement
• Assume you have been breached already
— Good enough usually isn’t
Thank you!
@stevetout
For more information visit www.vericlouds.com

Más contenido relacionado

La actualidad más candente

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Get Safer and efficient accounts with Alrasmyat Cloud Accounting Software
Get Safer and efficient accounts with Alrasmyat Cloud Accounting SoftwareGet Safer and efficient accounts with Alrasmyat Cloud Accounting Software
Get Safer and efficient accounts with Alrasmyat Cloud Accounting SoftwareEricAustin012
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
WiFi Hotspot Password
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot PasswordMaryam Namira
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Microsoft Tech Community
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerGigya
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor AuthenticationKalyana Sundaram
 

La actualidad más candente (11)

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Security
SecuritySecurity
Security
 
Get Safer and efficient accounts with Alrasmyat Cloud Accounting Software
Get Safer and efficient accounts with Alrasmyat Cloud Accounting SoftwareGet Safer and efficient accounts with Alrasmyat Cloud Accounting Software
Get Safer and efficient accounts with Alrasmyat Cloud Accounting Software
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
WiFi Hotspot Password
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot Password
 
How to Create a Service Desk Triage Process
How to Create a Service Desk Triage ProcessHow to Create a Service Desk Triage Process
How to Create a Service Desk Triage Process
 
Integrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.FormsIntegrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.Forms
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 

Similar a Customer Journey - The effects of IAM transformation

KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...Jean-François LOMBARDO
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!Caroline Johnson
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessIvan Dwyer
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCloudIDSummit
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 

Similar a Customer Journey - The effects of IAM transformation (20)

KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground Up
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
March Boston Cloud Security Alliance Meetup
March Boston Cloud Security Alliance MeetupMarch Boston Cloud Security Alliance Meetup
March Boston Cloud Security Alliance Meetup
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Cybersecurity Leadership Forum - Cincinnati
Cybersecurity Leadership Forum - CincinnatiCybersecurity Leadership Forum - Cincinnati
Cybersecurity Leadership Forum - Cincinnati
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Customer Journey - The effects of IAM transformation

  • 1.
  • 2.
  • 3. Try Purchase Use Engage Customer Journey - The effects of IAM transformation Acting Doing Thinking Feeling Overall Downloading trial software Register contact profile Activate account with 2-Step registration Online checkout Contact Sales Click to chat Buy more licenses Activate a new service subscription Become a enterprise customer Install & register software Manage On-prem to cloud Migrate AD to cloud/SaaS portal Delegate administration Promote user to Admin role Register for Support Forums Contact Support Register for Conference Become a partner Do I have to register to download this? Does my login ID from 2 years ago still work? Does my cloud login work for this? Is this a global ID? Do I login in order to obtain a license or activate my subscription? Will tenant cloud know who I am or do I have to register again? How will I sync or migrate my users to tenant cloud? Do I use my local account or my enterprise credentials to login to cloud? How will I login to tenant cloud? How can I assign access to others within my organization? Can I audit who has access to my tenant? Does my enterprise login ID work for support? Do I have to register a new account for conference attendance? How do I access my Partner content? Consistent messaging & UI and central Login builds confidence and trust Enterprise respected my privacy and did not ask for too much information My authentication experience is the same now as it was during Trial Eval I have visibility into new products and services that my identity is allowed to see and purchase Happy that Enterprise recognizes my global ID and credentials across all of its products and services Enterprise provides me with the tools I need to monitor and manage my users Excited that the enterprise really knows me and correctly identifies me in every context of interaction I will recommend to my colleagues based on my experiences Trust Helpfulness Trust Helpfulness Trust Helpfulness Trust Helpfulness
  • 4. Business Driven IAM Typical Approach Typical Challenges • Focused within the perimeter • Static protection (rule based) • Isolated from SOC & GRC controls • Legacy systems and applications • Too many silos Intelligent IAM SSO Dynamic user provisioning Automated access governance Event/activity monitoring
  • 5. Business Concerns • We don’t want to be the next massive data breach • We want to make sure our identity providers are as secure as it can be • We are prioritizing our security spend around that
  • 6. Risk Aware IAM is the new black
  • 7. Risk Aware IAM • Quantify user risk scores over time to enhance adaptive authentication • Connect risk insight into meaningful and rapid response • Addresses the biggest cause of modern day data breaches UEBA Detect risky behaviors SIEM Single pane of glass for on-prem and cloud Credential Verification Detect leaked credentials during logon
  • 8. Detect & Verify Compromised Credentials • Prevent stolen credentials from being used during logon • Automate response & remediation • Outsource liabilities & risk • Support for NIST 800-63B • Complement 2FA and MFA
  • 9. 2FA & MFA ≠ Modern IAM
  • 10.
  • 11. L1 Risk 15 – 40% When When a compromised credential is linked to the username (E.g. email address) When only either compromised credential or account is known Where During login and self-service password reset Risk score, user and domain dashboard Action Taken Force change password; step-up authentication; revoke user access Assess degree of risk; display a warning L2 Risk 87%
  • 12. My.VeriClouds.com • Check if your credentials have been leaked • Check how many credentials are leaked in your business domain • Search against more than 6B leaked accounts • Your information stays private • Mobile friendly
  • 13. How do you get there? • Integrating and uniting these platforms —Begin using CASB, SIEM and credential verification services • Start small – increase the scope of “risk aware IAM” every quarter —Begin with the end in mind, and work backwards • Avoid silo’d thinking —Connect your IAG/IAM initiatives to other SOC and GRC initiatives
  • 14. The Future • Not as simple as enabling MFA and creating a dashboard —Analytics, reports, dashboards – potential data overload! • The industry will move more towards risk aware IAM that: — Automates risk insight into actionable policy enforcement • Assume you have been breached already — Good enough usually isn’t
  • 15. Thank you! @stevetout For more information visit www.vericlouds.com

Notas del editor

  1. Today, IAM (and even security) is not secure Recent data breaches – most all of them involve compromised credentials, exploit human weakness What I’ve spent time doing Specifically from my perspective, I’m going to share what I see the forward-thinking companies are doing to make IAM more secure by making it more risk aware.
  2. Balance between convenience and privacy and better security
  3. Story about using IAM to drive customer experience in CTO working group at VMWare
  4. Closes the gap on risk (mostly)
  5. Every year data breaches expose billions of account credentials