Taking Lessons from End Users, “Convergence” Rises from the Ashes

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
IBM Corporate Environmental Affairs and Product Safety
BENEFITS OF SUCCESSFUL IT MODERNIZATION
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
1 1 Risk Management: How to Comply with Everything July 11, 2013.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
COBIT - II.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Viewpoint Consulting – Committed to your success.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Business Analysis: A Business Unit Perspective International Institute of Business Analysis January 18, 2012.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Supporting tools in an IT Project & Portfolio Management environment Ann Van Belle -
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Best Practices: Aligning Process, Culture and Tools Michael Jordan Senior Project Manager - Microsoft Consulting Services
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
Unit 8.2: Effective Implementation Planning HIT Implementation Planning for Quality and Safety Component 12/Unit 81 Health IT Workforce Curriculum Version.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Serving IT up with ITIL By Thane Price. IT is the laboratory’s pit crew  Goal : Make technology transparent while accomplishing valuable internal customer.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Transition/Change Management How You Can Improve Project Success
Cisco Compliance Management and Configuration Service
Cybersecurity - What’s Next? June 2017
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Team 1 – Incident Response
CIM Modeling for E&U - (Short Version)
BANKING INFORMATION SYSTEMS
Integrated Management System and Certification
Risk Management for Technology Projects
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Driving Digital Business with SAP Digital Business Services
CCNET Managed Services
Sonoma Partners – Accounting Overview
Business Drivers and Requirements
Mobile workforce management solution
Transforming IT Management
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
I have many checklists: how do I get started with cyber security?
BU IS GIG Chemical, Oil & Gas
Making Information Security Manageable with GRC
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Making Information Security Actionable with GRC
Welcome: How to use this presentation
Where is Your Organization on the Accessibility Maturity Scale
Moving from “Bolt-on” to “Build-in” Security Controls
Contact Center Security Strategies
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
ESA's TEC Directorate Asset Management - Present and Future
Managing IT Risk in a digital Transformation AGE
GRC - A Strategic Approach
TECHNOLOGY EXPLOSION TECHNOLOGY EXPLOSION. TECHNOLOGY EXPLOSION TECHNOLOGY EXPLOSION.
Capitalize on Your Business’s Technology
IT Management Services Infrastructure Services
Plan and design the solution
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Taking Lessons from End Users, “Convergence” Rises from the Ashes Bassam Al-Khalidi Co-CEO and Principal Consultant Axiad IDS ISCW April 6, 2017 (10:00-11:00am PT)

Convergence: A New Day “Convergence”: what has changed Why we need convergence more than ever What went wrong Lessons learned are the new benchmarks IT & Corporate Security are in this together: Impacting success or failure Issuance and personalization Lifecycle events leading to success or failure Policies Bandwidth/Skills and Resources From Understanding to Action )

CONVERGENCE Lots of buzz Deployment teams didn’t embrace 1-click build CONVERGENCE Lots of buzz Deployment teams didn’t embrace Adoption failed A negative experience for all Skepticism abounds

auto build ALIVE OR DEAD? Is the convergence of physical and logical identity credentials just a relic of the past?

And the stakes are higher. 2-click build Convergence is NOT dead. We’ve learned many lessons. And the stakes are higher. The way it was delivered didn’t work. We’ve been listening.

A New Reality We can’t ignore it. Convergence is NOT dead. auto build A New Reality We can’t ignore it. Convergence is NOT dead. We’ve learned many lessons. Align with Corporate & IT security needs and today’s risks. The way it was delivered didn’t work. We’ve been listening. .

A lot has changed and the stakes got higher. auto build A lot has changed and the stakes got higher.

Engine and dash computer systems A lot has changed: The stakes are higher No Industry is immune Broader avenues of attack Everything is connected (IoT) Mobile-everything 24/7 web connections Troublesome consequences The Usuals: Brand | Financial | Identity | Legal Auto Engine and dash computer systems Healthcare Medical devices New breed: Government Cyber terrorism Financial Point of Sale

A lot has changed: We need converged solutions more than ever People AND connected devices must be protected…across the physical and logical spectrum.

Where did we go wrong? IT had misconceptions HR LEGAL IT SECURITY IT vision of ‘leapfrogging’ to a converged solution wasn’t achievable (software upgrades not the same for PACS) Functional silos led to security gaps Issuance and personalization impacted

What round 1 taught us Round 1 challenges Lessons learned = new benchmarks Frustrated both Corporate Security and IT Security functions The experience of deployment team matters Gaps in Security One size fits all Piecemeal Infrastructure not considered Must address gaps and frustrations Customized Comprehensive Match skill set/resources Complex to install, upgrade, maintain Less complex – more manageable Inefficient lifecycle management Maintainable across the lifecycle Security business objectives not met Must achieve multiple business objectives Reduced costs & inefficiencies Improved controls Compliance 1 2 3 4 5

Elements of an Integrated Solution auto build Elements of an Integrated Solution SECURE EVERYTHING MONITOR EVERYTHING NOTIFY EVERYTHING

Recap: State of Convergence auto build Recap: State of Convergence New reality Higher stakes Affects all industries

IT and Corporate Security: Shared Concerns Security: Reduce risk of breach Cost-effective: Implement and manage a mix of user credentials Flexibility: Choose from a range of assurance and authentication levels Customized: Map to unique needs (protection, workflow, reporting, policies) Business value: Prove security to stakeholders Compliant: Meet compliance needs and mandates Unified: Approach as a single organization (HR, Legal, IT, Facilities) Efficient: Leverage limited cyber-expert resources and skills

Decisions Impacting Success or Failure: Policies Issuance & Personalization Lifecycle Management Bandwidth and Skill Sets

A New Vision for Issuance and Personalization IT approach must integrate with Corporate Security reality Credentials must be future-proofed to upgrade with Corporate Security changes Must align with processes and procedures must align with business objectives/ compliance needs of organization INTEGRATION ALIGNMENT IT and Corporate Security must each have control over day to day domains Don’t want disruptions/ownership questions (provisioning/de-provisioning) Compliance needs differ Each needs proper tools RESPECTING FUNCTIONAL ROLES

Lifecycle Management Impacts Success or Failure FUTURE PROOFING ASSESSMENT Is the platform extensible? Understand current situation and future needs? ENABLEMENT METHODOLOGY | PLANNING Have all uses been considered? (PKI @ the door wasn’t fully analyzed . . not fast enough) Strategy - use best-of-breed products or single solution? Bandwidth/skill set – host in-house or prefer hosted solution?

Converged Project Approach BUSINESS ANALYSIS OPERATIONAL ASSESSMENT PROGRAM DEFINITION DEPLOYMENT ONGOING SERVICES

Policies and Compliance auto build Policies and Compliance External Policies Internal Policies Obtain Support Find Balance Enforce Policies HIPAA 800-171 800-53 PCI Access rights, permissions, data retention etc. Across all stakeholders Realize ties between internal and external - what’s achievable Deploy solutions. Internal training

CONTROL Audit and Accountability Access Awareness Control and Training Identification and Authentication Configuration Management Incident Response CONTROL Maintenance Media Protection Personnel Security Risk Assessment Physical Protection Security Assessment System and Information Security System and Communication Protection

From Understanding to Action STILL NEED to refine Understand the benefits of a converged approach and position it to your executive team Determine the effort and investment required for your organization Look at the value vs complexity of a converged program and understand trade-offs for your organization Map out a phased approach on the back-end Embrace best practices that help ensure success; and avoid common pitfalls that undermine projects

Thank You