SlideShare a Scribd company logo
1 of 33
Download to read offline
Next Generation Access
Control
Urban Söderström
© Axiomatics 2016 2
Access Control is as easy as in the Middle Ages
Only 2 options:
•  Store data safely &
•  control access
•  Make data unusable
© Axiomatics 2016 3
But internal and external requirements makes the
picture much more complex …..
And the outside world where data is used ….. has changed How ?
Collaboration
Regulatory Compliance
and Governance
New business & mobile-
driven interactions
Time-to-market
© Axiomatics 2016 4
1) Diligent 24 x 7 cyber crime professionals around
•  Ransome ware for bitcoins
•  Advanced Persistent Threat
•  Spearfishing
•  National surveillance breaches
Night and day working on their
Continuing Professional Education
© Axiomatics 2016 5
2) Population of computer users has changed
Expert engineers
But also
•  Your grandma
•  Your todler
•  Your malware
•  Your fridge
•  ………
Everyone is a user
With digital identity
© Axiomatics 2016 6
3) Identity ontology for every individual
My ID as a….
Customer
Supplier
Partner
Private user
Administrator
Anonymous user
Machine
Fraudster, mule
Identity Federation
E-ID
E-Citizenship
Mobil-ID
Bank-ID
…….
© Axiomatics 2016 7
4) Rapid evolving usability requirements – “seven
any”
Any one
Any time
Any where
Any device
Any networg
Any app
Across any value chain
Easy and fast
© Axiomatics 2016 8
5) Purpose of data use has changed
Internet of Things
E-Municipality
E-Government
Smart cities
Mobility
Environment
Commodities
Medical
Safety
Living
Drone delivery
Robot distribution
Physical surveillance
© Axiomatics 2016 9
6) Globalisation & data correlation Connectivity across
Datasets
Applications
“Things”
Value chains
Companies
Continents
Jurisdictions
Platforms
Devices
Clouds
API´s
interoperability
© Axiomatics 2016 10
7) Big data analytics Visual data discovery
Automated decision-making
70% of large organizations
Purchase external data
100% by 2019 (Forbes)
180.000 data analysts in US 2018
E.g. fraud detection
Well combined with physical
security tools
This requires Access Management
BaaS = Back-end of IoT
as a service
© Axiomatics 2016 11
8) Increased control, legislation & regulation
Data protection - GDPR
1)  Consistency across European Union
1)  One-stop-shop for citizens and business
2)  Scope: service providers outside Europe delivering EU services
3)  Right to be forgotten-Right to erasure:
1)  “Privacy by design” & “privacy by default”
2)  Right to be forgotten also applicable to third parties
4)  Notification of breach mandatory
1)  High fines
5)  Payment Services Directive II
1)  Mandatory to share customers profiles and data with 3rd parties
2)  On request (with customers consent & still adhering to the
3)  data protecting regulation)
© Axiomatics 2016 12
Responding to all trends with old school static IAM ?
Transaction
request
Authorisation
Entitlements
For the ID
Assets
+
data
authentication
Identity
+
properties
Password
Token
PIN
Biometric
Multifactor
Behaviour
©	
  Axioma)cs	
  2016	
   13	
  
By 2020, 70 percent of enterprises will use ABAC as
the dominant mechanism to protect critical assets
“ 	
  
70%	
   ”	
  
Gartner, 2013
NO ! - Dynamic and fine-grained IAM on data level
required
© Axiomatics 2016 14
Application access = OUT Services, Big data, Federation = IN
Access control on application level falls short
RBAC is too static
Security is required on the level of datasets, data subject
Data Centric Security
Attibute Based Access Control
Transaction
request
© Axiomatics 2016 15
Every single transaction request…
The only thing persistent is
The request for a transaction
(with all its relevant properties)
© Axiomatics 2016 16
deserves an individual VIP treatment
Access decision
engine”
• real time
• context aware
• rule based
• customised
• flexible
• fine-grained
access decisions
©	
  Axioma)cs	
  2016	
   17	
  
⁃  Policies to protect assets / IP
⁃  Policies to prevent fraud
⁃  Policies to comply with external regulations
⁃  Policies to be more efficient
⁃  Policies to enable new business
⁃  CEOs, CIOs, CISOs, CDOs and other CXOs have responsibilities to define and
implement these policies
⁃  Security and compliance are board-level issues: requires key policies in place to
protect the Enterprise’s interests, IP and to safeguard their investments
Modern Enterprises need to be policy-driven
© Axiomatics 2016 18
⁃  Modern dynamic enterprises need modern dynamic
authorization models to meet requirements for ease of change
and centralization
⁃  Authorizations to…
⁃  Protect sensitive data
⁃  Protect critical assets
⁃  Protect critical transactions
Attribute Based Access Control is the new dynamic model
Access Policies
© Axiomatics 2016 19
Security everywhere
Centralized Rules Management
Data Layer
Service Layer
Process layer
Presentation Layer
Distributed rules enforcement
© Axiomatics 2016 20
Finegrained context aware access mmnt - building blocks
user profile
database
identity federation trust level
framework
framework to manage
interaction of rule sets
e.g conflicting rules,
hierarchy, veto,
ownership
rulesets
in rule
engines
© Axiomatics 2016 21
Attribute Based Access Control
“Context Based”, or “Rule Based” Access Control:
• Fine-grained
• Additional authentication if reqiured (“step-up”)
• Flexible – Easy access if possible, complex when
required
• Configuration of rules in IAM: short time-to-market
(not programmed in applications)
• Risk level on dataset or transaction
• Trustlevel on authentication context
• Immediate intervention in case of compromise
(trustlevel attribute)
• From RBAC to ABAC or hybrid (role is also a rule!)
© Axiomatics 2016 22
Attribute-Based Access Control
A context-aware and dynamic authorization model
Who? What? When? Where? Why? How?
© Axiomatics 2016 23
GDPR or PSD-2 is a opportunity to start using
ABAC
⁃  DPR – GDPR requires changes in your rule and policy
governance
⁃  By using ABAC you don´t have to rework your rule and policy
governance in every application when changes are applied
⁃  You can include the Business in the process by using Business
processes when creating new policys
© Axiomatics 2016 24
Compared to legacy RBAC models…
⁃  Permissions assigned to roles
⁃  Roles assigned to users
⁃  Applications handle access
control intentionally
© Axiomatics 2016 25
Using ABAC to extend role definitions
⁃  ABAC uses attributes and
policies to implement precise
controls
⁃  ABAC extends roles with
⁃  Context and
⁃  Relationships
⁃  ABAC utilizes attributes of the
user as well as the resource to
represent relationships
©	
  Axioma)cs	
  2016	
   26	
  
Axiomatics provides enterprise
software for access control
© Axiomatics 2016 27
Who we are…
About Axiomatics...
Offices in USA
and Sweden
Venture-backed
since 2013
90% growth
in 2015
© Axiomatics 2016 28
Our Customers
⁃  Fortune 500
⁃  Government Agencies
⁃  Vertical market expertise
⁃  Financial services (banking, insurance)
⁃  Highly-regulated industries (pharmaceuticals, aerospace, automotive…)
⁃  Media companies
Success stories
⁃  Securing online payments for 200 million users
⁃  Securing exchange of clinical trial data in
pharmaceutical research
⁃  Millions of transactions a day secured for one of the
world’s largest banks
⁃  Protecting privacy for insurance company’s clients
⁃  Compliance with Export Control regulations for aircraft
manufacturers
⁃  Copyright-protected streaming media for authorized users only
⁃  Improving speed and quality of health IT systems for
veterans nationwide
© Axiomatics 2016 30
Axiomatics Solutions
⁃  Authorization for Applications
⁃  Business logic and middleware
⁃  APIs and web services
⁃  On-premise and cloud applications
⁃  Authorization for Databases
⁃  Relational databases
⁃  Big Data
⁃  Access Review on policies
⁃  Prove regulatory compliance and
permissions of users or groups
⁃  Real-time review of dynamic authorization
⁃  Internal reporting and auditing needed at
various levels of user
⁃  Review what your employees can do
© Axiomatics 2016 31
Structuring the Policies
The Authorization Policy Lifecycle
© Axiomatics 2016 32
Deploy the architecture – Defence in Depth
© Axiomatics 2016 33
Questions?

More Related Content

What's hot

Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...Databricks
 
Change management success for data governance
Change management success for data governanceChange management success for data governance
Change management success for data governanceReid Elliott
 
Databricks for Dummies
Databricks for DummiesDatabricks for Dummies
Databricks for DummiesRodney Joyce
 
WhereScape, the pioneer in data warehouse automation software
WhereScape, the pioneer in data warehouse automation software WhereScape, the pioneer in data warehouse automation software
WhereScape, the pioneer in data warehouse automation software Patrick Van Renterghem
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesAlan McSweeney
 
Forging an Analytics Center of Excellence
Forging an Analytics Center of ExcellenceForging an Analytics Center of Excellence
Forging an Analytics Center of ExcellenceLewandog, Inc,
 
Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?DATAVERSITY
 
The art of implementing data lineage
The art of implementing data lineageThe art of implementing data lineage
The art of implementing data lineageLeigh Hill
 
Data governance
Data governanceData governance
Data governanceSambaSoup
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business EnablerSrinivasan Sankar
 
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...IDERA Software
 
Considerations for Data Access in the Lakehouse
Considerations for Data Access in the LakehouseConsiderations for Data Access in the Lakehouse
Considerations for Data Access in the LakehouseDatabricks
 
Building a Data Analytics Center of Excellence - Digital Transformation
Building a Data Analytics Center of Excellence - Digital TransformationBuilding a Data Analytics Center of Excellence - Digital Transformation
Building a Data Analytics Center of Excellence - Digital TransformationMarian Cook
 
Building Data Quality Audit Framework using Delta Lake at Cerner
Building Data Quality Audit Framework using Delta Lake at CernerBuilding Data Quality Audit Framework using Delta Lake at Cerner
Building Data Quality Audit Framework using Delta Lake at CernerDatabricks
 
Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013
Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013
Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013Dataiku
 
Data Lakehouse Symposium | Day 4
Data Lakehouse Symposium | Day 4Data Lakehouse Symposium | Day 4
Data Lakehouse Symposium | Day 4Databricks
 

What's hot (20)

Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
 
Change management success for data governance
Change management success for data governanceChange management success for data governance
Change management success for data governance
 
Databricks for Dummies
Databricks for DummiesDatabricks for Dummies
Databricks for Dummies
 
WhereScape, the pioneer in data warehouse automation software
WhereScape, the pioneer in data warehouse automation software WhereScape, the pioneer in data warehouse automation software
WhereScape, the pioneer in data warehouse automation software
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management Initiatives
 
Forging an Analytics Center of Excellence
Forging an Analytics Center of ExcellenceForging an Analytics Center of Excellence
Forging an Analytics Center of Excellence
 
Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?
 
The art of implementing data lineage
The art of implementing data lineageThe art of implementing data lineage
The art of implementing data lineage
 
Zdlra copy to cloud
Zdlra copy to cloudZdlra copy to cloud
Zdlra copy to cloud
 
Data governance
Data governanceData governance
Data governance
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business Enabler
 
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
 
Considerations for Data Access in the Lakehouse
Considerations for Data Access in the LakehouseConsiderations for Data Access in the Lakehouse
Considerations for Data Access in the Lakehouse
 
Building a Data Analytics Center of Excellence - Digital Transformation
Building a Data Analytics Center of Excellence - Digital TransformationBuilding a Data Analytics Center of Excellence - Digital Transformation
Building a Data Analytics Center of Excellence - Digital Transformation
 
Data Mesh 101
Data Mesh 101Data Mesh 101
Data Mesh 101
 
Anatomy of a Cloud Hack
Anatomy of a Cloud HackAnatomy of a Cloud Hack
Anatomy of a Cloud Hack
 
Building Data Quality Audit Framework using Delta Lake at Cerner
Building Data Quality Audit Framework using Delta Lake at CernerBuilding Data Quality Audit Framework using Delta Lake at Cerner
Building Data Quality Audit Framework using Delta Lake at Cerner
 
Data Quality Management
Data Quality ManagementData Quality Management
Data Quality Management
 
Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013
Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013
Dataiku, Pitch at Data-Driven NYC, New York City, September 17th 2013
 
Data Lakehouse Symposium | Day 4
Data Lakehouse Symposium | Day 4Data Lakehouse Symposium | Day 4
Data Lakehouse Symposium | Day 4
 

Viewers also liked

Åtgärder mot penningtvätt och kommande förändringar
Åtgärder mot penningtvätt och kommande förändringarÅtgärder mot penningtvätt och kommande förändringar
Åtgärder mot penningtvätt och kommande förändringarTranscendent Group
 
Vad innebär den nya penningtvättslagen
Vad innebär den nya penningtvättslagenVad innebär den nya penningtvättslagen
Vad innebär den nya penningtvättslagenTranscendent Group
 
Frukostseminarium om finansiell brottslighet
Frukostseminarium om finansiell brottslighetFrukostseminarium om finansiell brottslighet
Frukostseminarium om finansiell brottslighetTranscendent Group
 
Ta kontroll över personuppgiftshanteringen på ett effektivt sätt
Ta kontroll över personuppgiftshanteringen på ett effektivt sättTa kontroll över personuppgiftshanteringen på ett effektivt sätt
Ta kontroll över personuppgiftshanteringen på ett effektivt sättTranscendent Group
 
Cybersecurity inom bilindustrin
Cybersecurity inom bilindustrinCybersecurity inom bilindustrin
Cybersecurity inom bilindustrinTranscendent Group
 
Måling og visualisering av informasjonssikkerhet
Måling og visualisering av informasjonssikkerhetMåling og visualisering av informasjonssikkerhet
Måling og visualisering av informasjonssikkerhetTranscendent Group
 
Projektstyrning i en komplex miljö
Projektstyrning i en komplex miljöProjektstyrning i en komplex miljö
Projektstyrning i en komplex miljöTranscendent Group
 
Fem dataanalyser varje internrevisor bör ha med i sin revisionsplan
Fem dataanalyser varje internrevisor bör ha med i sin revisionsplanFem dataanalyser varje internrevisor bör ha med i sin revisionsplan
Fem dataanalyser varje internrevisor bör ha med i sin revisionsplanTranscendent Group
 
Frukostseminarium om informationssäkerhet
Frukostseminarium om informationssäkerhetFrukostseminarium om informationssäkerhet
Frukostseminarium om informationssäkerhetTranscendent Group
 
Mobila enheter och informationssäkerhetsrisker för nybörjaren
Mobila enheter och informationssäkerhetsrisker för nybörjarenMobila enheter och informationssäkerhetsrisker för nybörjaren
Mobila enheter och informationssäkerhetsrisker för nybörjarenTranscendent Group
 
Hur kan kvaliten förbättras på din internrevisionsaktivitet vad fungerar
Hur kan kvaliten förbättras på din internrevisionsaktivitet   vad fungerarHur kan kvaliten förbättras på din internrevisionsaktivitet   vad fungerar
Hur kan kvaliten förbättras på din internrevisionsaktivitet vad fungerarTranscendent Group
 
Vem är personen bakom masken hur man hanterar interna bedrägerier
Vem är personen bakom masken hur man hanterar interna bedrägerierVem är personen bakom masken hur man hanterar interna bedrägerier
Vem är personen bakom masken hur man hanterar interna bedrägerierTranscendent Group
 
Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...
Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...
Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...Transcendent Group
 
Frukostseminarium om återhämtningsplaner
Frukostseminarium om återhämtningsplanerFrukostseminarium om återhämtningsplaner
Frukostseminarium om återhämtningsplanerTranscendent Group
 
Dataanalys som möjliggörare inom GRC
Dataanalys som möjliggörare inom GRCDataanalys som möjliggörare inom GRC
Dataanalys som möjliggörare inom GRCTranscendent Group
 
Är kris en förutsättning för compliance.pptx
Är kris en förutsättning för compliance.pptxÄr kris en förutsättning för compliance.pptx
Är kris en förutsättning för compliance.pptxTranscendent Group
 
Penningtvättsgranskning i finansiella institut
Penningtvättsgranskning i finansiella institutPenningtvättsgranskning i finansiella institut
Penningtvättsgranskning i finansiella institutTranscendent Group
 
Hur skyddar vi oss mot oegentligheter?
Hur skyddar vi oss mot oegentligheter?Hur skyddar vi oss mot oegentligheter?
Hur skyddar vi oss mot oegentligheter?Transcendent Group
 

Viewers also liked (20)

Åtgärder mot penningtvätt och kommande förändringar
Åtgärder mot penningtvätt och kommande förändringarÅtgärder mot penningtvätt och kommande förändringar
Åtgärder mot penningtvätt och kommande förändringar
 
Vad innebär den nya penningtvättslagen
Vad innebär den nya penningtvättslagenVad innebär den nya penningtvättslagen
Vad innebär den nya penningtvättslagen
 
Value added security services
Value added security servicesValue added security services
Value added security services
 
Frukostseminarium om finansiell brottslighet
Frukostseminarium om finansiell brottslighetFrukostseminarium om finansiell brottslighet
Frukostseminarium om finansiell brottslighet
 
Ta kontroll över personuppgiftshanteringen på ett effektivt sätt
Ta kontroll över personuppgiftshanteringen på ett effektivt sättTa kontroll över personuppgiftshanteringen på ett effektivt sätt
Ta kontroll över personuppgiftshanteringen på ett effektivt sätt
 
Cybersecurity inom bilindustrin
Cybersecurity inom bilindustrinCybersecurity inom bilindustrin
Cybersecurity inom bilindustrin
 
Måling og visualisering av informasjonssikkerhet
Måling og visualisering av informasjonssikkerhetMåling og visualisering av informasjonssikkerhet
Måling og visualisering av informasjonssikkerhet
 
Projektstyrning i en komplex miljö
Projektstyrning i en komplex miljöProjektstyrning i en komplex miljö
Projektstyrning i en komplex miljö
 
Fem dataanalyser varje internrevisor bör ha med i sin revisionsplan
Fem dataanalyser varje internrevisor bör ha med i sin revisionsplanFem dataanalyser varje internrevisor bör ha med i sin revisionsplan
Fem dataanalyser varje internrevisor bör ha med i sin revisionsplan
 
Frukostseminarium om informationssäkerhet
Frukostseminarium om informationssäkerhetFrukostseminarium om informationssäkerhet
Frukostseminarium om informationssäkerhet
 
Mobila enheter och informationssäkerhetsrisker för nybörjaren
Mobila enheter och informationssäkerhetsrisker för nybörjarenMobila enheter och informationssäkerhetsrisker för nybörjaren
Mobila enheter och informationssäkerhetsrisker för nybörjaren
 
Hur kan kvaliten förbättras på din internrevisionsaktivitet vad fungerar
Hur kan kvaliten förbättras på din internrevisionsaktivitet   vad fungerarHur kan kvaliten förbättras på din internrevisionsaktivitet   vad fungerar
Hur kan kvaliten förbättras på din internrevisionsaktivitet vad fungerar
 
Vem är personen bakom masken hur man hanterar interna bedrägerier
Vem är personen bakom masken hur man hanterar interna bedrägerierVem är personen bakom masken hur man hanterar interna bedrägerier
Vem är personen bakom masken hur man hanterar interna bedrägerier
 
Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...
Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...
Rundabordssamtal kring FISK:en - hur tillämpas förordningen i praktiken och t...
 
Frukostseminarium om återhämtningsplaner
Frukostseminarium om återhämtningsplanerFrukostseminarium om återhämtningsplaner
Frukostseminarium om återhämtningsplaner
 
Dataanalys som möjliggörare inom GRC
Dataanalys som möjliggörare inom GRCDataanalys som möjliggörare inom GRC
Dataanalys som möjliggörare inom GRC
 
Är kris en förutsättning för compliance.pptx
Är kris en förutsättning för compliance.pptxÄr kris en förutsättning för compliance.pptx
Är kris en förutsättning för compliance.pptx
 
Finansiering av terrorism
Finansiering av terrorismFinansiering av terrorism
Finansiering av terrorism
 
Penningtvättsgranskning i finansiella institut
Penningtvättsgranskning i finansiella institutPenningtvättsgranskning i finansiella institut
Penningtvättsgranskning i finansiella institut
 
Hur skyddar vi oss mot oegentligheter?
Hur skyddar vi oss mot oegentligheter?Hur skyddar vi oss mot oegentligheter?
Hur skyddar vi oss mot oegentligheter?
 

Similar to Next generation access controls

OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?David Brossard
 
Data engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdfData engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdfshreyathaker
 
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...Bomgar
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...SaaStock
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessBomgar
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Kehinde Tolude
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
 
SecTMS -Android Based Handheld Toll Collection System
SecTMS -Android Based Handheld Toll Collection SystemSecTMS -Android Based Handheld Toll Collection System
SecTMS -Android Based Handheld Toll Collection SystemManan Bhavsar
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsPluribus Networks
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_DeckEtheralabs
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Trends that will Impact the Fintech Realm in 2023
Trends that will Impact the Fintech Realm in 2023Trends that will Impact the Fintech Realm in 2023
Trends that will Impact the Fintech Realm in 2023Panamax, Inc
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointDr Rachel O'Connell
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Scott Satterwhite
 
Webinar: Unlocking the potential of io t data
Webinar: Unlocking the potential of io t dataWebinar: Unlocking the potential of io t data
Webinar: Unlocking the potential of io t dataXoriant Corporation
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyElena Oliveira
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...FinTechLabs.io
 

Similar to Next generation access controls (20)

OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
 
Data engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdfData engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdf
 
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged Access
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
SecTMS -Android Based Handheld Toll Collection System
SecTMS -Android Based Handheld Toll Collection SystemSecTMS -Android Based Handheld Toll Collection System
SecTMS -Android Based Handheld Toll Collection System
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network Analytics
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Trends that will Impact the Fintech Realm in 2023
Trends that will Impact the Fintech Realm in 2023Trends that will Impact the Fintech Realm in 2023
Trends that will Impact the Fintech Realm in 2023
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]
 
Webinar: Unlocking the potential of io t data
Webinar: Unlocking the potential of io t dataWebinar: Unlocking the potential of io t data
Webinar: Unlocking the potential of io t data
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury Technology
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 

More from Transcendent Group

Penetration testing as an internal audit activity
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activityTranscendent Group
 
Sensommarmingel på temat finansiell brottslighet
Sensommarmingel på temat finansiell brottslighetSensommarmingel på temat finansiell brottslighet
Sensommarmingel på temat finansiell brottslighetTranscendent Group
 
Star strategy en inspirerande metod för mål och verksamhetsstyrning
Star strategy en inspirerande metod för mål och verksamhetsstyrningStar strategy en inspirerande metod för mål och verksamhetsstyrning
Star strategy en inspirerande metod för mål och verksamhetsstyrningTranscendent Group
 
Har ditt företag implementerat en process för att identifiera och hantera int...
Har ditt företag implementerat en process för att identifiera och hantera int...Har ditt företag implementerat en process för att identifiera och hantera int...
Har ditt företag implementerat en process för att identifiera och hantera int...Transcendent Group
 
Varför kostnadskontroll och riskhantering av programvara blir allt viktigare
Varför kostnadskontroll och riskhantering av programvara blir allt viktigareVarför kostnadskontroll och riskhantering av programvara blir allt viktigare
Varför kostnadskontroll och riskhantering av programvara blir allt viktigareTranscendent Group
 
Hur etablerar man en effektiv kris och kontinuitetshantering
Hur etablerar man en effektiv kris  och kontinuitetshanteringHur etablerar man en effektiv kris  och kontinuitetshantering
Hur etablerar man en effektiv kris och kontinuitetshanteringTranscendent Group
 
Grc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnad
Grc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnadGrc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnad
Grc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnadTranscendent Group
 
Den anpassningsbare överlever; den ökade regleringens effekter på svenska banker
Den anpassningsbare överlever; den ökade regleringens effekter på svenska bankerDen anpassningsbare överlever; den ökade regleringens effekter på svenska banker
Den anpassningsbare överlever; den ökade regleringens effekter på svenska bankerTranscendent Group
 
Styrelseledamotens roll och ansvar
Styrelseledamotens roll och ansvarStyrelseledamotens roll och ansvar
Styrelseledamotens roll och ansvarTranscendent Group
 
Strängare krav på personuppgiftsbehandling senaste nytt om vår nya eu lag
Strängare krav på personuppgiftsbehandling senaste nytt om vår nya eu lagSträngare krav på personuppgiftsbehandling senaste nytt om vår nya eu lag
Strängare krav på personuppgiftsbehandling senaste nytt om vår nya eu lagTranscendent Group
 
Solvency ii and return on equity; optimizing capital and manage the risk
Solvency ii and return on equity; optimizing capital and manage the riskSolvency ii and return on equity; optimizing capital and manage the risk
Solvency ii and return on equity; optimizing capital and manage the riskTranscendent Group
 
Kravställning för grc systemstöd
Kravställning för grc systemstödKravställning för grc systemstöd
Kravställning för grc systemstödTranscendent Group
 
Erfarenhet från granskning av tredje parter utifrån fffs 20145
Erfarenhet från granskning av tredje parter utifrån fffs 20145Erfarenhet från granskning av tredje parter utifrån fffs 20145
Erfarenhet från granskning av tredje parter utifrån fffs 20145Transcendent Group
 
Personlig integritet – möjliggörare eller hinder för verksamheten?
Personlig integritet – möjliggörare eller hinder för verksamheten?Personlig integritet – möjliggörare eller hinder för verksamheten?
Personlig integritet – möjliggörare eller hinder för verksamheten?Transcendent Group
 
Förberedelser inför GRC-systemimplementering
Förberedelser inför GRC-systemimplementeringFörberedelser inför GRC-systemimplementering
Förberedelser inför GRC-systemimplementeringTranscendent Group
 
Effectively managing operational risk
Effectively managing operational riskEffectively managing operational risk
Effectively managing operational riskTranscendent Group
 
Utvecklandet av en strategisk plan för din internrevisionsaktivitet
Utvecklandet av en strategisk plan för din internrevisionsaktivitetUtvecklandet av en strategisk plan för din internrevisionsaktivitet
Utvecklandet av en strategisk plan för din internrevisionsaktivitetTranscendent Group
 

More from Transcendent Group (18)

Penetration testing as an internal audit activity
Penetration testing as an internal audit activityPenetration testing as an internal audit activity
Penetration testing as an internal audit activity
 
Sensommarmingel på temat finansiell brottslighet
Sensommarmingel på temat finansiell brottslighetSensommarmingel på temat finansiell brottslighet
Sensommarmingel på temat finansiell brottslighet
 
Star strategy en inspirerande metod för mål och verksamhetsstyrning
Star strategy en inspirerande metod för mål och verksamhetsstyrningStar strategy en inspirerande metod för mål och verksamhetsstyrning
Star strategy en inspirerande metod för mål och verksamhetsstyrning
 
Har ditt företag implementerat en process för att identifiera och hantera int...
Har ditt företag implementerat en process för att identifiera och hantera int...Har ditt företag implementerat en process för att identifiera och hantera int...
Har ditt företag implementerat en process för att identifiera och hantera int...
 
Varför kostnadskontroll och riskhantering av programvara blir allt viktigare
Varför kostnadskontroll och riskhantering av programvara blir allt viktigareVarför kostnadskontroll och riskhantering av programvara blir allt viktigare
Varför kostnadskontroll och riskhantering av programvara blir allt viktigare
 
Hur etablerar man en effektiv kris och kontinuitetshantering
Hur etablerar man en effektiv kris  och kontinuitetshanteringHur etablerar man en effektiv kris  och kontinuitetshantering
Hur etablerar man en effektiv kris och kontinuitetshantering
 
Grc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnad
Grc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnadGrc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnad
Grc succéfaktorer; hur får man ut mer värde av grc än enbart regelefterlevnad
 
Den anpassningsbare överlever; den ökade regleringens effekter på svenska banker
Den anpassningsbare överlever; den ökade regleringens effekter på svenska bankerDen anpassningsbare överlever; den ökade regleringens effekter på svenska banker
Den anpassningsbare överlever; den ökade regleringens effekter på svenska banker
 
Styrelseledamotens roll och ansvar
Styrelseledamotens roll och ansvarStyrelseledamotens roll och ansvar
Styrelseledamotens roll och ansvar
 
Strängare krav på personuppgiftsbehandling senaste nytt om vår nya eu lag
Strängare krav på personuppgiftsbehandling senaste nytt om vår nya eu lagSträngare krav på personuppgiftsbehandling senaste nytt om vår nya eu lag
Strängare krav på personuppgiftsbehandling senaste nytt om vår nya eu lag
 
Solvency ii and return on equity; optimizing capital and manage the risk
Solvency ii and return on equity; optimizing capital and manage the riskSolvency ii and return on equity; optimizing capital and manage the risk
Solvency ii and return on equity; optimizing capital and manage the risk
 
Kravställning för grc systemstöd
Kravställning för grc systemstödKravställning för grc systemstöd
Kravställning för grc systemstöd
 
How we got domain admin
How we got domain adminHow we got domain admin
How we got domain admin
 
Erfarenhet från granskning av tredje parter utifrån fffs 20145
Erfarenhet från granskning av tredje parter utifrån fffs 20145Erfarenhet från granskning av tredje parter utifrån fffs 20145
Erfarenhet från granskning av tredje parter utifrån fffs 20145
 
Personlig integritet – möjliggörare eller hinder för verksamheten?
Personlig integritet – möjliggörare eller hinder för verksamheten?Personlig integritet – möjliggörare eller hinder för verksamheten?
Personlig integritet – möjliggörare eller hinder för verksamheten?
 
Förberedelser inför GRC-systemimplementering
Förberedelser inför GRC-systemimplementeringFörberedelser inför GRC-systemimplementering
Förberedelser inför GRC-systemimplementering
 
Effectively managing operational risk
Effectively managing operational riskEffectively managing operational risk
Effectively managing operational risk
 
Utvecklandet av en strategisk plan för din internrevisionsaktivitet
Utvecklandet av en strategisk plan för din internrevisionsaktivitetUtvecklandet av en strategisk plan för din internrevisionsaktivitet
Utvecklandet av en strategisk plan för din internrevisionsaktivitet
 

Recently uploaded

VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...dipikadinghjn ( Why You Choose Us? ) Escorts
 
➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men 🔝Malda🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men  🔝Malda🔝   Escorts Ser...➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men  🔝Malda🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men 🔝Malda🔝 Escorts Ser...amitlee9823
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...priyasharma62062
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7jayawati511
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...priyasharma62062
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxazadalisthp2020i
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...dipikadinghjn ( Why You Choose Us? ) Escorts
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Adnet Communications
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfAdnet Communications
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 

Recently uploaded (20)

VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men 🔝Malda🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men  🔝Malda🔝   Escorts Ser...➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men  🔝Malda🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ Malda Call-girls in Women Seeking Men 🔝Malda🔝 Escorts Ser...
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptx
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 

Next generation access controls

  • 2. © Axiomatics 2016 2 Access Control is as easy as in the Middle Ages Only 2 options: •  Store data safely & •  control access •  Make data unusable
  • 3. © Axiomatics 2016 3 But internal and external requirements makes the picture much more complex ….. And the outside world where data is used ….. has changed How ? Collaboration Regulatory Compliance and Governance New business & mobile- driven interactions Time-to-market
  • 4. © Axiomatics 2016 4 1) Diligent 24 x 7 cyber crime professionals around •  Ransome ware for bitcoins •  Advanced Persistent Threat •  Spearfishing •  National surveillance breaches Night and day working on their Continuing Professional Education
  • 5. © Axiomatics 2016 5 2) Population of computer users has changed Expert engineers But also •  Your grandma •  Your todler •  Your malware •  Your fridge •  ……… Everyone is a user With digital identity
  • 6. © Axiomatics 2016 6 3) Identity ontology for every individual My ID as a…. Customer Supplier Partner Private user Administrator Anonymous user Machine Fraudster, mule Identity Federation E-ID E-Citizenship Mobil-ID Bank-ID …….
  • 7. © Axiomatics 2016 7 4) Rapid evolving usability requirements – “seven any” Any one Any time Any where Any device Any networg Any app Across any value chain Easy and fast
  • 8. © Axiomatics 2016 8 5) Purpose of data use has changed Internet of Things E-Municipality E-Government Smart cities Mobility Environment Commodities Medical Safety Living Drone delivery Robot distribution Physical surveillance
  • 9. © Axiomatics 2016 9 6) Globalisation & data correlation Connectivity across Datasets Applications “Things” Value chains Companies Continents Jurisdictions Platforms Devices Clouds API´s interoperability
  • 10. © Axiomatics 2016 10 7) Big data analytics Visual data discovery Automated decision-making 70% of large organizations Purchase external data 100% by 2019 (Forbes) 180.000 data analysts in US 2018 E.g. fraud detection Well combined with physical security tools This requires Access Management BaaS = Back-end of IoT as a service
  • 11. © Axiomatics 2016 11 8) Increased control, legislation & regulation Data protection - GDPR 1)  Consistency across European Union 1)  One-stop-shop for citizens and business 2)  Scope: service providers outside Europe delivering EU services 3)  Right to be forgotten-Right to erasure: 1)  “Privacy by design” & “privacy by default” 2)  Right to be forgotten also applicable to third parties 4)  Notification of breach mandatory 1)  High fines 5)  Payment Services Directive II 1)  Mandatory to share customers profiles and data with 3rd parties 2)  On request (with customers consent & still adhering to the 3)  data protecting regulation)
  • 12. © Axiomatics 2016 12 Responding to all trends with old school static IAM ? Transaction request Authorisation Entitlements For the ID Assets + data authentication Identity + properties Password Token PIN Biometric Multifactor Behaviour
  • 13. ©  Axioma)cs  2016   13   By 2020, 70 percent of enterprises will use ABAC as the dominant mechanism to protect critical assets “   70%   ”   Gartner, 2013 NO ! - Dynamic and fine-grained IAM on data level required
  • 14. © Axiomatics 2016 14 Application access = OUT Services, Big data, Federation = IN Access control on application level falls short RBAC is too static Security is required on the level of datasets, data subject Data Centric Security Attibute Based Access Control Transaction request
  • 15. © Axiomatics 2016 15 Every single transaction request… The only thing persistent is The request for a transaction (with all its relevant properties)
  • 16. © Axiomatics 2016 16 deserves an individual VIP treatment Access decision engine” • real time • context aware • rule based • customised • flexible • fine-grained access decisions
  • 17. ©  Axioma)cs  2016   17   ⁃  Policies to protect assets / IP ⁃  Policies to prevent fraud ⁃  Policies to comply with external regulations ⁃  Policies to be more efficient ⁃  Policies to enable new business ⁃  CEOs, CIOs, CISOs, CDOs and other CXOs have responsibilities to define and implement these policies ⁃  Security and compliance are board-level issues: requires key policies in place to protect the Enterprise’s interests, IP and to safeguard their investments Modern Enterprises need to be policy-driven
  • 18. © Axiomatics 2016 18 ⁃  Modern dynamic enterprises need modern dynamic authorization models to meet requirements for ease of change and centralization ⁃  Authorizations to… ⁃  Protect sensitive data ⁃  Protect critical assets ⁃  Protect critical transactions Attribute Based Access Control is the new dynamic model Access Policies
  • 19. © Axiomatics 2016 19 Security everywhere Centralized Rules Management Data Layer Service Layer Process layer Presentation Layer Distributed rules enforcement
  • 20. © Axiomatics 2016 20 Finegrained context aware access mmnt - building blocks user profile database identity federation trust level framework framework to manage interaction of rule sets e.g conflicting rules, hierarchy, veto, ownership rulesets in rule engines
  • 21. © Axiomatics 2016 21 Attribute Based Access Control “Context Based”, or “Rule Based” Access Control: • Fine-grained • Additional authentication if reqiured (“step-up”) • Flexible – Easy access if possible, complex when required • Configuration of rules in IAM: short time-to-market (not programmed in applications) • Risk level on dataset or transaction • Trustlevel on authentication context • Immediate intervention in case of compromise (trustlevel attribute) • From RBAC to ABAC or hybrid (role is also a rule!)
  • 22. © Axiomatics 2016 22 Attribute-Based Access Control A context-aware and dynamic authorization model Who? What? When? Where? Why? How?
  • 23. © Axiomatics 2016 23 GDPR or PSD-2 is a opportunity to start using ABAC ⁃  DPR – GDPR requires changes in your rule and policy governance ⁃  By using ABAC you don´t have to rework your rule and policy governance in every application when changes are applied ⁃  You can include the Business in the process by using Business processes when creating new policys
  • 24. © Axiomatics 2016 24 Compared to legacy RBAC models… ⁃  Permissions assigned to roles ⁃  Roles assigned to users ⁃  Applications handle access control intentionally
  • 25. © Axiomatics 2016 25 Using ABAC to extend role definitions ⁃  ABAC uses attributes and policies to implement precise controls ⁃  ABAC extends roles with ⁃  Context and ⁃  Relationships ⁃  ABAC utilizes attributes of the user as well as the resource to represent relationships
  • 26. ©  Axioma)cs  2016   26   Axiomatics provides enterprise software for access control
  • 27. © Axiomatics 2016 27 Who we are… About Axiomatics... Offices in USA and Sweden Venture-backed since 2013 90% growth in 2015
  • 28. © Axiomatics 2016 28 Our Customers ⁃  Fortune 500 ⁃  Government Agencies ⁃  Vertical market expertise ⁃  Financial services (banking, insurance) ⁃  Highly-regulated industries (pharmaceuticals, aerospace, automotive…) ⁃  Media companies
  • 29. Success stories ⁃  Securing online payments for 200 million users ⁃  Securing exchange of clinical trial data in pharmaceutical research ⁃  Millions of transactions a day secured for one of the world’s largest banks ⁃  Protecting privacy for insurance company’s clients ⁃  Compliance with Export Control regulations for aircraft manufacturers ⁃  Copyright-protected streaming media for authorized users only ⁃  Improving speed and quality of health IT systems for veterans nationwide
  • 30. © Axiomatics 2016 30 Axiomatics Solutions ⁃  Authorization for Applications ⁃  Business logic and middleware ⁃  APIs and web services ⁃  On-premise and cloud applications ⁃  Authorization for Databases ⁃  Relational databases ⁃  Big Data ⁃  Access Review on policies ⁃  Prove regulatory compliance and permissions of users or groups ⁃  Real-time review of dynamic authorization ⁃  Internal reporting and auditing needed at various levels of user ⁃  Review what your employees can do
  • 31. © Axiomatics 2016 31 Structuring the Policies The Authorization Policy Lifecycle
  • 32. © Axiomatics 2016 32 Deploy the architecture – Defence in Depth
  • 33. © Axiomatics 2016 33 Questions?