SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
IAM and Cybersecurity
June 2016
2Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Capgemini’s vision and mission
 Cybersecurity Vision
As a Global leader in IT, Capgemini’s
vision on Cyber Security is to de-risk
the use of information technology by
making the right choices. We believe
that Cybersecurity delivers business
value and focuses upon things that
really matters. Cybersecurity is flexible
and enables the business to grow fast,
but securely. Prevention, Monitoring
and Detection are key, however only
effective if a security baseline has
been established and is defined what
good looks like.
 Cybersecurity Mission
Our mission is to deliver the most
convenient, invisible, cost effective,
pragmatic and reliable cybersecurity
services to run clients’ business. We
are committed to constantly adapt new
technologies and ways of work to
improve our services and ensure
continuous alignment with our clients
businesses.
3Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Strategic Focus Points
 It’s impossible to protect everything. Focus upon ‘things’ that really matters,
e.g. crown jewels.
 Constantly question the business value of security measures enabling an
effective balance between risk, costs and benefits
 Prevention without monitoring and detection is not effective and monitoring
and detection is only effective when is known how good looks like.
 Identity and Account lifecycle Management is the cornerstone for Cyber
Security.
 Cyber Security must transform from the fortress model into the airport model
and a transition plan must be in place.
 Outsourcing security is increasing the overall quality of security
 During the transition phase, a fallback plan must be in place
4Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Identity & Access Management Strategy
 IAM is highly ‘invisible’ for the business:
 Reviews or certifications will be replaced by rules and risk scores
 Compliance is an automated daily activity including remediation
(continuous assurance)
 Access Rights are provisioned (and de-provisioned) automatically
 It’s clear for every rule which risk is mitigated by that specific rule.
 Manual activities are kept to an absolute minimum (approvals etc.)
 IAM is the cornerstone of Cyber Security and is configured to enables the
effective use of prevention, monitoring and detection technology
 Dynamic risk management (attribute and context based) is integrated in
Access Management and analytics are used to dynamically determine risk
levels/scores
 Privileged (non personal) Accounts and managed separately.
 IAM actually need to be seen as EAM (Entity Access Management)
5Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
To increase the effectiveness of IAM, we add the intelligence
functionality to the more classic administrative and access functions
IAM Systems Risk policies determine
risk within each IAM function
User Entity Behaviour Analytics
Behaviour
Analytics
Engine
Risk
Analytic
s Engine
Context Risk score
People -> Devices -> Location ”Identity Context” Time -> Network -> Resource
SOC Asset Data ”User Behavior Context” Threat Intell Data in motion
Audit
Intelligence
Analytics
Authentication
Access
Authorizations
Identities
Administration
Entitlements
Identity & Entitlement Data
Roles
Risk Scores Context
Risk
Scores
Entitlements
6Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Capgemini Approach
Centralized
Identity Store
Self
service
Role
management
Compliance
reporting
Automated
provisioning Policy
management
Authorization
lifecycle
Risk
managementSecurity
User
experience
Single
Sign On
Access
management
Federation
Privileged
accounts
Identity
lifecycle
Review
attestation
7Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
IAM Operational KPI’s (Examples)
 # of password resets per month
 Average # of distinct accounts per user (and deviations)
 # of orphan accounts per system
 # of unknown identities (lacking info/ ‘ownership’)
 # of active identities already left the company
 # of active accounts of people left the company
 # of new accounts provisioned per time period
 Average lead time to (de-)provision users
 Average time to change user access rights
 Response % regarding attestation/certification
 # of exceptions generated per attestation/certification
 # of reconciliation issues (for offline systems)
 # of SoD conflicts
 Specific Identity quality KPI’s:
• E-mail lacking
• No line manager
• No department
• Etc. etc
 Risk Management KPI’s:
• % of people with High Risk access level
• Etc.
 User Behaviour KPI.s:
• Logon attemps
• Last Logon’s
• Out of office hours logons
• Etc.etc.
8Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
IAM FastTrack
 Do you recognize this?
 Why Capgemini FastTrack?
 Transforming IAM implementations
 FastTrack USP’s
9Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Do you recognize this?
 There’s a need for IAM, but due to complexity and lack of proper
approach it is delayed.
 No clear view on End User licenses.
 Audit, regulatory and compliance is important and a huge mostly
manual job.
 End users are complaining about the access management processes.
 On, off and through boarding processes are causing problems.
 Risk Management controls must be improved.
 Insight in who has got what is lacking and (thus) money is not being
spend efficiently.
 Responsibilities are complex to enforce because overviews are
lacking.
 Various Identity Sources or Directory environments are present and not
synchronized
10Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Why Capgemini FastTrack?
IAM projects are notorious when it comes to delivering on time, within budget and
delivering what is required.
At Capgemini, we have decided that it’s time to change! Therefore the FastTrack
concept has been developed.
FastTrack is about getting an overview of the ‘As-Is’ situation as soon as possible and
using the actual data (facts) to determine the strategy, roadmap, business case etc.
 Avoiding high costs on feasibility studies etc.
 Enabling ‘in control’ rapidly and managing security risks
 Determine possible cost reductions
11Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Transforming IAM implementations
Traditional IAM program
6 weeks
Engagement Policies Design
Vision Validation
Strategy
&
Roadma
p
Business benefits Implementation
FastTrack Insight FastTrack Implementation
IDaaS – Identity Governance & Administration as a Service
Implementation
12Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
IAM FastTrack USP’s
 Results in days instead of months
 Delivering an IAM Business Case, Strategy and Roadmap based upon facts.
 Harvesting low hanging fruit within days
 Providing insight in actual access rights and active identities
 Head start for any IAM project and unique opportunity to test one of the best IAM
tools available
 Business facing functionalities available right from the start. IAM tool is pre-
configured by Capgemini.
 Fixed price for 6 weeks and concrete deliverables
 Unique option to use the IAM tool in the ‘As a Service’ model (pay per use)
 Focusing upon the business and not upon tooling
13Copyright © Capgemini 2016. All Rights Reserved
The Value of Collaboration
Unique Selling Points
 IDaaS by Capgemini is unique! There are no other vendors who can deliver the entire
Identity & Access Control stack in the as a Service model!
 IAM FastTrack is unique! An agile IAM project approach, delivering results in days
instead of months/years.
 Avoiding high costs on feasibility studies, workshops etc.
 Leveraging the experience and expertise of Capgemini
 Business benefits are delivered within weeks! i.e. Cost Savings, end user experience
etc.
 Compliance reports and mitigation plans to be executed in weeks.
The information contained in this presentation is proprietary.
© 2016 Capgemini. All rights reserved.
www.capgemini.com
About Capgemini
With more than 180,000 people in over 40 countries, Capgemini is
one of the world's foremost providers of consulting, technology and
outsourcing services. The Group reported 2015 global revenues of
EUR 11.9 billion. Together with its clients, Capgemini creates and
delivers business, technology and digital solutions that fit their
needs, enabling them to achieve innovation and competitiveness.
A deeply multicultural organization, Capgemini has developed its
own way of working, the Collaborative Business ExperienceTM, and
draws on Rightshore®, its worldwide delivery model.
Rightshore® is a trademark belonging to Capgemini

Contenu connexe

Tendances

Journey to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinarJourney to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinarcontinohq
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Precisely
 
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...SlideTeam
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCAmazon Web Services
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesDavid Castro
 
Digital Transformational Trends in Insurance
Digital Transformational Trends in InsuranceDigital Transformational Trends in Insurance
Digital Transformational Trends in InsuranceChristopher King
 
Optimizing XaaS
Optimizing XaaSOptimizing XaaS
Optimizing XaaSCognizant
 
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...Amazon Web Services
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseKristof Breesch
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things MicroservicesCapgemini
 
IT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for ITIT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for ITScott Bils
 
CA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change ManagementCA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change ManagementCA Technologies
 
Technical Due Diligence with AWS
Technical Due Diligence with AWSTechnical Due Diligence with AWS
Technical Due Diligence with AWSTom Laszewski
 
BusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaSBusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaSBusinessIntelligenze
 
AWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and EnterprisesAWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and EnterprisesAWS Summits
 
Optimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMOptimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMAldo Pietropaolo
 
Take the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud PlatformTake the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud PlatformCapgemini
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS OnboardingJerry Jermann
 

Tendances (20)

Journey to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinarJourney to the cloud in banking and finance webinar
Journey to the cloud in banking and finance webinar
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
 
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
Cloud Computing Roadmap Public Vs Private Vs Hybrid And SaaS Vs PaaS Vs IaaS ...
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSC
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
 
Digital Transformational Trends in Insurance
Digital Transformational Trends in InsuranceDigital Transformational Trends in Insurance
Digital Transformational Trends in Insurance
 
Optimizing XaaS
Optimizing XaaSOptimizing XaaS
Optimizing XaaS
 
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
(ENT304) Governed, Trusted, and Rogue: The Good, the Bad, and the Ugly Inside...
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital Enterprise
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things Microservices
 
IT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for ITIT-as-a-Service (ITaaS) - The New Business Model for IT
IT-as-a-Service (ITaaS) - The New Business Model for IT
 
CA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change ManagementCA Cloud Service Management: Configuring Change Management
CA Cloud Service Management: Configuring Change Management
 
Technical Due Diligence with AWS
Technical Due Diligence with AWSTechnical Due Diligence with AWS
Technical Due Diligence with AWS
 
BusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaSBusinessIntelligenze - MaaS & SaaS
BusinessIntelligenze - MaaS & SaaS
 
AWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and EnterprisesAWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
AWS Summit Singapore 2019 | Bridging Start-ups and Enterprises
 
Optimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMOptimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAM
 
Take the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud PlatformTake the Path to Digital Transformation with SAP HANA Cloud Platform
Take the Path to Digital Transformation with SAP HANA Cloud Platform
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS Onboarding
 

Similaire à IAM and cybersecurity - June 15

CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...Capgemini
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...happiestmindstech
 
Cyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment reportCyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment reportChristian Nyakanyanga
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Capgemini
 
artificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdfartificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdfduribotak
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Laurent Pacalin
 
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...Amazon Web Services
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115Andrew Smart
 
Leading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech TalksLeading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech TalksAmazon Web Services
 
Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335John Enoch
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...Amazon Web Services
 
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdfCloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdfAmazon Web Services
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SVVishwas Manral
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...Amazon Web Services
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 

Similaire à IAM and cybersecurity - June 15 (20)

CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Cyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment reportCyber Sentinel Sample Maturity Assessment report
Cyber Sentinel Sample Maturity Assessment report
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
 
artificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdfartificial-intelligence-risk-and-controls-matrix.pdf
artificial-intelligence-risk-and-controls-matrix.pdf
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
 
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
Leading Your Team Through a Cloud Transformation - Virtual Transformation Day...
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
 
Leading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech TalksLeading Your Team Through a Cloud Transformation - AWS Online Tech Talks
Leading Your Team Through a Cloud Transformation - AWS Online Tech Talks
 
Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335Cloud choices johnenoch_theatre1_session3_1335
Cloud choices johnenoch_theatre1_session3_1335
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
DevSecOps: Instituting Cultural Transformation for Public Sector Organization...
 
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdfCloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
Cloud Choices- Quantifying the Cost and Risk Implications of Cloud.pdf
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SV
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
Implementation of Amazon Connect, Powered by Accenture (FSV306-S) - AWS re:In...
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 

Plus de Capgemini

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022Capgemini
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Capgemini
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Capgemini
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022Capgemini
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Capgemini
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022Capgemini
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Capgemini
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですCapgemini
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Capgemini
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Capgemini
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Capgemini
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Capgemini
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021Capgemini
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Capgemini
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Capgemini
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Capgemini
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Capgemini
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Capgemini
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020Capgemini
 

Plus de Capgemini (20)

Top Healthcare Trends 2022
Top Healthcare Trends 2022Top Healthcare Trends 2022
Top Healthcare Trends 2022
 
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
 
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
 
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
 
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
 
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーですキャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
 
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
 
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
 
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
 
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
 
Top Trends in Payments: 2021
Top Trends in Payments: 2021Top Trends in Payments: 2021
Top Trends in Payments: 2021
 
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
 
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous PlanningCapgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
 
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
 
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
 
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
 
Top Trends in Payments: 2020
Top Trends in Payments: 2020Top Trends in Payments: 2020
Top Trends in Payments: 2020
 

Dernier

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Dernier (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

IAM and cybersecurity - June 15

  • 2. 2Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Capgemini’s vision and mission  Cybersecurity Vision As a Global leader in IT, Capgemini’s vision on Cyber Security is to de-risk the use of information technology by making the right choices. We believe that Cybersecurity delivers business value and focuses upon things that really matters. Cybersecurity is flexible and enables the business to grow fast, but securely. Prevention, Monitoring and Detection are key, however only effective if a security baseline has been established and is defined what good looks like.  Cybersecurity Mission Our mission is to deliver the most convenient, invisible, cost effective, pragmatic and reliable cybersecurity services to run clients’ business. We are committed to constantly adapt new technologies and ways of work to improve our services and ensure continuous alignment with our clients businesses.
  • 3. 3Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Strategic Focus Points  It’s impossible to protect everything. Focus upon ‘things’ that really matters, e.g. crown jewels.  Constantly question the business value of security measures enabling an effective balance between risk, costs and benefits  Prevention without monitoring and detection is not effective and monitoring and detection is only effective when is known how good looks like.  Identity and Account lifecycle Management is the cornerstone for Cyber Security.  Cyber Security must transform from the fortress model into the airport model and a transition plan must be in place.  Outsourcing security is increasing the overall quality of security  During the transition phase, a fallback plan must be in place
  • 4. 4Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Identity & Access Management Strategy  IAM is highly ‘invisible’ for the business:  Reviews or certifications will be replaced by rules and risk scores  Compliance is an automated daily activity including remediation (continuous assurance)  Access Rights are provisioned (and de-provisioned) automatically  It’s clear for every rule which risk is mitigated by that specific rule.  Manual activities are kept to an absolute minimum (approvals etc.)  IAM is the cornerstone of Cyber Security and is configured to enables the effective use of prevention, monitoring and detection technology  Dynamic risk management (attribute and context based) is integrated in Access Management and analytics are used to dynamically determine risk levels/scores  Privileged (non personal) Accounts and managed separately.  IAM actually need to be seen as EAM (Entity Access Management)
  • 5. 5Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration To increase the effectiveness of IAM, we add the intelligence functionality to the more classic administrative and access functions IAM Systems Risk policies determine risk within each IAM function User Entity Behaviour Analytics Behaviour Analytics Engine Risk Analytic s Engine Context Risk score People -> Devices -> Location ”Identity Context” Time -> Network -> Resource SOC Asset Data ”User Behavior Context” Threat Intell Data in motion Audit Intelligence Analytics Authentication Access Authorizations Identities Administration Entitlements Identity & Entitlement Data Roles Risk Scores Context Risk Scores Entitlements
  • 6. 6Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Capgemini Approach Centralized Identity Store Self service Role management Compliance reporting Automated provisioning Policy management Authorization lifecycle Risk managementSecurity User experience Single Sign On Access management Federation Privileged accounts Identity lifecycle Review attestation
  • 7. 7Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration IAM Operational KPI’s (Examples)  # of password resets per month  Average # of distinct accounts per user (and deviations)  # of orphan accounts per system  # of unknown identities (lacking info/ ‘ownership’)  # of active identities already left the company  # of active accounts of people left the company  # of new accounts provisioned per time period  Average lead time to (de-)provision users  Average time to change user access rights  Response % regarding attestation/certification  # of exceptions generated per attestation/certification  # of reconciliation issues (for offline systems)  # of SoD conflicts  Specific Identity quality KPI’s: • E-mail lacking • No line manager • No department • Etc. etc  Risk Management KPI’s: • % of people with High Risk access level • Etc.  User Behaviour KPI.s: • Logon attemps • Last Logon’s • Out of office hours logons • Etc.etc.
  • 8. 8Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration IAM FastTrack  Do you recognize this?  Why Capgemini FastTrack?  Transforming IAM implementations  FastTrack USP’s
  • 9. 9Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Do you recognize this?  There’s a need for IAM, but due to complexity and lack of proper approach it is delayed.  No clear view on End User licenses.  Audit, regulatory and compliance is important and a huge mostly manual job.  End users are complaining about the access management processes.  On, off and through boarding processes are causing problems.  Risk Management controls must be improved.  Insight in who has got what is lacking and (thus) money is not being spend efficiently.  Responsibilities are complex to enforce because overviews are lacking.  Various Identity Sources or Directory environments are present and not synchronized
  • 10. 10Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Why Capgemini FastTrack? IAM projects are notorious when it comes to delivering on time, within budget and delivering what is required. At Capgemini, we have decided that it’s time to change! Therefore the FastTrack concept has been developed. FastTrack is about getting an overview of the ‘As-Is’ situation as soon as possible and using the actual data (facts) to determine the strategy, roadmap, business case etc.  Avoiding high costs on feasibility studies etc.  Enabling ‘in control’ rapidly and managing security risks  Determine possible cost reductions
  • 11. 11Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Transforming IAM implementations Traditional IAM program 6 weeks Engagement Policies Design Vision Validation Strategy & Roadma p Business benefits Implementation FastTrack Insight FastTrack Implementation IDaaS – Identity Governance & Administration as a Service Implementation
  • 12. 12Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration IAM FastTrack USP’s  Results in days instead of months  Delivering an IAM Business Case, Strategy and Roadmap based upon facts.  Harvesting low hanging fruit within days  Providing insight in actual access rights and active identities  Head start for any IAM project and unique opportunity to test one of the best IAM tools available  Business facing functionalities available right from the start. IAM tool is pre- configured by Capgemini.  Fixed price for 6 weeks and concrete deliverables  Unique option to use the IAM tool in the ‘As a Service’ model (pay per use)  Focusing upon the business and not upon tooling
  • 13. 13Copyright © Capgemini 2016. All Rights Reserved The Value of Collaboration Unique Selling Points  IDaaS by Capgemini is unique! There are no other vendors who can deliver the entire Identity & Access Control stack in the as a Service model!  IAM FastTrack is unique! An agile IAM project approach, delivering results in days instead of months/years.  Avoiding high costs on feasibility studies, workshops etc.  Leveraging the experience and expertise of Capgemini  Business benefits are delivered within weeks! i.e. Cost Savings, end user experience etc.  Compliance reports and mitigation plans to be executed in weeks.
  • 14. The information contained in this presentation is proprietary. © 2016 Capgemini. All rights reserved. www.capgemini.com About Capgemini With more than 180,000 people in over 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2015 global revenues of EUR 11.9 billion. Together with its clients, Capgemini creates and delivers business, technology and digital solutions that fit their needs, enabling them to achieve innovation and competitiveness. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore®, its worldwide delivery model. Rightshore® is a trademark belonging to Capgemini