Soumettre la recherche
Mettre en ligne
Tech Talk: Privileged Account Management Maturity Model
•
1 j'aime
•
2,797 vues
CA Technologies
Suivre
Tech Talk: Privileged Account Management Maturity Model
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 18
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
SOC 2 Compliance and Certification
SOC 2 Compliance and Certification
ControlCase
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
The Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
Cyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
Recommandé
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
SOC 2 Compliance and Certification
SOC 2 Compliance and Certification
ControlCase
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
The Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
Cyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
Certified SOC Analyst
Certified SOC Analyst
SagarNegi10
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Mark S. Mahre
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NetLockSmith
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
Sounil Yu
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
Governance risk and compliance
Governance risk and compliance
Magdalena Matell
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
Cyber security investments 2021
Cyber security investments 2021
Management Events
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
Building A Security Operations Center
Building A Security Operations Center
Siemplify
Roadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
Building Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
SOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
EmilyGladstoneCole
Strategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ControlCase
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Contenu connexe
Tendances
Certified SOC Analyst
Certified SOC Analyst
SagarNegi10
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Mark S. Mahre
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NetLockSmith
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
Sounil Yu
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
Governance risk and compliance
Governance risk and compliance
Magdalena Matell
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
Cyber security investments 2021
Cyber security investments 2021
Management Events
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
Building A Security Operations Center
Building A Security Operations Center
Siemplify
Roadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
Building Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
SOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
EmilyGladstoneCole
Strategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ControlCase
Tendances
(20)
Certified SOC Analyst
Certified SOC Analyst
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
Governance risk and compliance
Governance risk and compliance
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
Cyber security investments 2021
Cyber security investments 2021
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Building A Security Operations Center
Building A Security Operations Center
Roadmap to security operations excellence
Roadmap to security operations excellence
Building Security Operation Center
Building Security Operation Center
SOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
Strategy considerations for building a security operations center
Strategy considerations for building a security operations center
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
En vedette
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
ObserveIT
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Trish McGinity, CCSK
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
Security Maturity Models.
Security Maturity Models.
Priyanka Aash
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Privileged Access Management - 2016
Privileged Access Management - 2016
Lance Peterman
En vedette
(17)
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Privileged Access Management (PAM)
Privileged Access Management (PAM)
Security Maturity Models.
Security Maturity Models.
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Privileged Access Management - 2016
Privileged Access Management - 2016
Similaire à Tech Talk: Privileged Account Management Maturity Model
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
CA Technologies
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
CA Technologies
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
CA Technologies
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
CA Technologies
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
CA Technologies
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
CA Technologies
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
CA Technologies
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
CA Technologies
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
Laurie Desautels
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
CA Technologies
Business Transformation Framework
Business Transformation Framework
Kunal Sharma
Choosing the right benefits tech webinar
Choosing the right benefits tech webinar
Thomsons Online Benefits
[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation
AIIM International
The President Of A Company
The President Of A Company
Navy Savchenko
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
CA Technologies
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
CA Technologies
Similaire à Tech Talk: Privileged Account Management Maturity Model
(20)
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Business Transformation Framework
Business Transformation Framework
Choosing the right benefits tech webinar
Choosing the right benefits tech webinar
[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation
The President Of A Company
The President Of A Company
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Plus de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Plus de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Dernier
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Dernier
(20)
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Tech Talk: Privileged Account Management Maturity Model
1.
World® ’16 Tech Talk: How Do You Measure Up? A Maturity Model for Privileged Access Management Shawn W. Hank – Sr. Principal Consultant, Cybersecurity CA Technologies SCT41T SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract As security and risk professionals increasingly focus on the need for privileged access management within their organizations, a number of questions arise. Are critical functions being addressed? Are the appropriate processes and management oversight in place? How can the overall privileged access management program be improved? What areas need more focus to improve program effectiveness? In this session, we’ll discuss a privileged access management maturity model – focused on key technology, process, and management activities and capabilities –
that security teams can use to baseline their privileged access management program and identify areas for improvement and future refinement. Shawn W. Hank CA Technologies, Inc. Sr. Principal Consultant Cybersecurity
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The risk and potential for security breaches exist anywhere there are privileged accounts. Privileged Accounts are everywhere; ergo potential vectors of compromise exist everywhere. Your Privileged Accounts Are valuable Targets! And they are a critical component of your overall security posture. Privileged Accounts Grow in Numbers Everyday. They exist in all layers of any organizations IT stack: -
Infrastructure - Front End - Middleware - Backend Existing Models of Managing Privileged Accounts Fall Short. Every Major Breach Has Involved A Privileged Account Privileged Account Management Facts
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Maturity – Level 0/1
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 1 §
Examples – root, oradba, sapadmin, cisco enable, Windows local admin, named admin accounts, SaaS/IaaS/PaaS admin accounts § Why – If you control access to the accounts as well as their passwords, you can control privileged actions and who can make them § Hint – Public discussions about monitoring and audit are a big deterrent of unwanted behavior Privileged Users / Shared Accounts
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Maturity – Level 1/2
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 2 §
Examples – SIEM, Network Monitoring, Change Management, Session Recording, Analytics § Why – Proactive vs. Reactive § Hint – Automated remediation is faster than human action. Think SecOps or DevSecOps Activity Monitoring
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 2/3 §
Examples – COTS applications, application & middleware Servers, DevOps (CI and/or Orchestration) Systems, Scheduled Tasks, Batch Jobs, Scripts § Why – Our experience tells us there are 5 to 7 times as many application accounts as there are human, interactive accounts. The threat is larger in this context. § Hint – Start small and build over time, incorporating with SDLC Service & Application Accounts
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 3/4 §
Examples – CA Identity Suite, CA Identity Service, Oracle IAM, SailPoint, IBM Security Identity Manager § Why – PAM solutions should not provision accounts. – Integration with IDM tools allows for programmatic provisioning and removal of accounts and credentials as well as certification and accreditation when needed. Identity Management Integration
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas Level 3/4 § Examples –
CA PAM SC, Symantec CSP, Dell UPM, PowerBroker, ViewFinity § Why – PAM focus has been primarily on the server side of the equation. – Most privileged accounts compromises happened on client endpoint systems (i.e., managed and unmanaged laptops, etc.) – Moving the PAM function closer to the user environment (aka endpoint) is a logical progression. Fine Grained Controls
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Privileged Access Management Maturity Model Level 0 Level 1 Ad Hoc / Manual Level
2 Baseline Level 3 Managed Level 4 Advanced Privileged User/Shared Accounts Not managing or rotating credentials Manual Controls For Privileged Accounts Basic Vault Structured Controls Account Inventory SDLC Integration Credential Vault w/ RBAC Central Password Policies Account Discovery MFA Password-less (SAML/OAUTH/TGS) Cloud/SaaS/SDN & HSM Integration Service & Application Accounts No knowledge of Application accounts Ad Hoc Application Account Management Hard Coded Passwords Manual Application Account Management Centralized A2A Mgmt. No Hardcoded Creds. REST API Integration Governed A2A DevOps Integration Monitoring & Threat Detection No monitoring of account usage Ad Hoc Audit & Controls Activity Monitoring Decentralized logging SIEM Integration Account Attribution SNMP Alerting Session Recording Meta-Data Service Desk Workflow & Analytics Integration Identity Management Integration Manual provision, no certification or accreditation Manual Process For Privileged Access Automated Privileged Identity Mgmt. Integrated Privileged Access Requests Basic Governance Fully Delegated Administration Governed Privileged Access w/SoD Fine-grained Controls/SoD Non existent Open Source Tools and Scripts Decentralized Tools (Silos) Command Filtering Restricted Shell Leap Frog Prevention Centrally Managed Kernel Interceptor with Cred Vault Integration
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Do you have a record of credential access? - The 5 W's: Who, What, When, Where, Why? Questions to Consider How is privileged account access granted? Do you have an inventory of Privileged Accounts? -
Interactive & Programmatic? Are privileged accounts included in the SDLC process? - for 3rd Party Developers and Contractors? How do you grant emergency access to privileged accounts? How to you track the usage of privileged accounts? If yes, how often are you rotating privileged account credentials? Do you have a policy and process for rotating privileged account credentials? Do you require a change ticket for privileged account use? Do you have SoD for privileged accounts? - How is SoD enforced? What is the current certification process for privileged accounts? How are new privileged accounts created? - What does the workflow look like? What is your approach for managing privileged accounts that live in the cloud? - IaaS, PaaS, Saas? Is Multi-Factor Authentication a requirement to access privileged accounts? Is privileged account access monitored for suspicious activity? Are fine-grained controls in place to restrict the scope of privileged accounts? - How is this managed?
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PAM Focus Areas – Level 3/4 ADVANCED Review Redefine Optimize
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Privileged Account Management Maturity Model Whether you haven't started, have just begun, or are in the throes of a Privileged Access Management project, there are several items to consider. It is our hope that the framework we have provided here will start a discussion and assist you as you move forward. Let us know how we can help! Summary
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME SCT39T PAM for Hybrid Enterprises 11/17/2016 at 1:45 pm SCT36T Real-time Identity Analytics 11/16/2016 at 3:00 pm SCT43T Threat Analytics for PAM 11/17/2016 at 4:30 pm
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Télécharger maintenant