SlideShare a Scribd company logo
Chris Niggel | Okta Director Security & Compliance
Accelerating Transformation with
Identity
October 2018
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Photo Credit: https://upload.wikimedia.org/wikipedia/commons/2/22/Bodiam_Castle_south.jpg
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Image: http://thedailywtf.com/images/remy/robotguys.png
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta ConfidentialPhoto credit: https://www.flickr.com/photos/egfocus/7419859084
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
People Technology
Applications
Devices
Wearables
IoT
Anything
Partners
Contractors
Anyone
Customers
Employees
Identity
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Response
Policy
Engine
Rule Based
Risk Based
Context
Device
User
Location
Network
App
Response
History
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Okta Verify
with Push
SMSYubiKeyOkta Verify OTP
PIV/CAC
okta confidential 13
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Accelerating Information with Identity

More Related Content

PPTX
Identity as the Perimeter
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
PDF
Brink sanders cisco architecture keynote
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PDF
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
PPTX
The Future of CASBs - A Cloud Security Force Awakens
PDF
Trust No One - Zero Trust on the Akamai Platform
PPTX
C-Level tools for Cloud security
Identity as the Perimeter
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Brink sanders cisco architecture keynote
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
The Future of CASBs - A Cloud Security Force Awakens
Trust No One - Zero Trust on the Akamai Platform
C-Level tools for Cloud security

What's hot (20)

PDF
Cisco Connect 2018 Singapore - Cisco CMX
PPTX
New security solutions for next generation of IT
PPTX
CASB Cases: How Your Peers are Securing the Cloud
PDF
Protegendo sua rede
PPTX
CIO's Guide to Enterprise Cloud Adoption
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PPTX
Webinar Express: What is a CASB?
PDF
Zero Trust Enterprise Network at Adobe
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
PDF
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
PDF
Enterprise Microservices
PPTX
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
PDF
Cisco Connect 2018 Singapore - Changing the Security Equation
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PDF
Accelerating Digital Leadership
PPTX
IoT Architecture: Insights from Global Deployments
PDF
Cisco Connect 2018 Vietnam - Cisco meraki
PDF
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
PDF
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Singapore - Cisco CMX
New security solutions for next generation of IT
CASB Cases: How Your Peers are Securing the Cloud
Protegendo sua rede
CIO's Guide to Enterprise Cloud Adoption
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Webinar Express: What is a CASB?
Zero Trust Enterprise Network at Adobe
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Enterprise Microservices
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Accelerating Digital Leadership
IoT Architecture: Insights from Global Deployments
Cisco Connect 2018 Vietnam - Cisco meraki
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Ad

More from scoopnewsgroup (20)

PDF
2020: What's on Deck for the PMA
PDF
Modernization Requires Choice
PDF
Smarter Access is the Bridge to Security Modernization
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
Building a Zero Trust Architecture
PDF
History of Data-Centric Transformation
PDF
IC Fireside Chat
PDF
The Edge to AI
PDF
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Moving Beyond Zero Trust
PDF
Keeping the Workforce of the Future Empowered, Engaged & Happy
PDF
Opening Remarks
PDF
It All Starts with Linux
PDF
Leadership in the Digital Age
PDF
Digital Transformation for Government
PDF
DevSecOps: The DoD Software Factory
PDF
Enhancing your Cyber Skills through a Cyber Range
PDF
Lessons Learned from Fire Escapes for Cybersecurity
PDF
2019 FedScoop Public Sector innovation Summit
2020: What's on Deck for the PMA
Modernization Requires Choice
Smarter Access is the Bridge to Security Modernization
How Zero Trust Makes the Mission Simple & Secure
Building a Zero Trust Architecture
History of Data-Centric Transformation
IC Fireside Chat
The Edge to AI
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Moving Beyond Zero Trust
Keeping the Workforce of the Future Empowered, Engaged & Happy
Opening Remarks
It All Starts with Linux
Leadership in the Digital Age
Digital Transformation for Government
DevSecOps: The DoD Software Factory
Enhancing your Cyber Skills through a Cyber Range
Lessons Learned from Fire Escapes for Cybersecurity
2019 FedScoop Public Sector innovation Summit
Ad

Recently uploaded (20)

PDF
26.1.2025 venugopal K Awarded with commendation certificate.pdf
PPTX
11Sept2023_LTIA-Cluster-Training-Presentation.pptx
PPTX
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
PPTX
Nur Shakila Assesmentlwemkf;m;mwee f.pptx
PDF
About Karen Miner-Romanoff - Academic & nonprofit consultant
PPTX
Vocational Education for educational purposes
PPTX
BHARATIYA NAGARIKA SURAKSHA SAHMITA^J2023 (1).pptx
PPTX
Omnibus rules on leave administration.pptx
PPTX
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
PDF
Abhay Bhutada and Other Visionary Leaders Reinventing Governance in India
PPTX
Inferenceahaiajaoaakakakakakakakakakakakakaka
PDF
CXPA Finland Webinar - Modern Components of Service Quality - Alec Dalton - ...
PDF
Item # 2 - 934 Patterson Specific Use Permit (SUP)
PDF
Item # 5 - 5307 Broadway St final review
PDF
Courtesy Meeting NIPA and MBS Australia.
PPTX
Social_Medias_Parents_Education_PPT.pptx
DOCX
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
PPTX
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
PDF
Abhay Bhutada Foundation’s Integration With SEBI's 2021 ESG Guidelines
PPTX
GOVERNMENT-ACCOUNTING1. bsa 4 government accounting
26.1.2025 venugopal K Awarded with commendation certificate.pdf
11Sept2023_LTIA-Cluster-Training-Presentation.pptx
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Nur Shakila Assesmentlwemkf;m;mwee f.pptx
About Karen Miner-Romanoff - Academic & nonprofit consultant
Vocational Education for educational purposes
BHARATIYA NAGARIKA SURAKSHA SAHMITA^J2023 (1).pptx
Omnibus rules on leave administration.pptx
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
Abhay Bhutada and Other Visionary Leaders Reinventing Governance in India
Inferenceahaiajaoaakakakakakakakakakakakakaka
CXPA Finland Webinar - Modern Components of Service Quality - Alec Dalton - ...
Item # 2 - 934 Patterson Specific Use Permit (SUP)
Item # 5 - 5307 Broadway St final review
Courtesy Meeting NIPA and MBS Australia.
Social_Medias_Parents_Education_PPT.pptx
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
Abhay Bhutada Foundation’s Integration With SEBI's 2021 ESG Guidelines
GOVERNMENT-ACCOUNTING1. bsa 4 government accounting

Accelerating Information with Identity

Editor's Notes

  • #3: What is your mission, and how has it changed over the years? Every organization is now impacted by technology Images: https://www.flickr.com/photos/26254305@N08/15751860326 http://www.navy.mil/view_image.asp?id=23565 https://www.flickr.com/photos/departmentofenergy/29386413180/
  • #4: Our solution to the problem was to build walls and secrets. We viewed information security like building a castle. Moat to cross in the form of a firewall, with a VPN forming our drawbridge. Secret passwords to open the gate through our 3-foot-thick stone walls, and we moved all of our corporate data inside of this fortress Soon, we were trapped within our network. Sure, things were secure, but all this security was painful for employees. Mobile devices became a force of change against us
  • #5: So, as we forced users to have complex passwords, with multiple letters, numbers, symbols, our users put them on post-it notes, and re-used the same password across personal and corporate sites.
  • #6: When we found passwords were not strong enough, we deployed multifactor tokens, that had to be carried around everywhere we went. Of course, if you left your token on your desk, and the boss wanted that critical report done by the morning, you were stuck. So users put their multifactor token in front of a webcam!
  • #7: As technology progressed, and cloud services took off,I struggled to keep our data within the castle walls, implementing filtering at the firewall. But it was a losing battle - employees just used different services.
  • #8: Now, our castle is in the middle of a city Customer, partners all collaborators
  • #9: Employees not graded on security, they have other tasks to do. Therefore, they are always going to follow the path of least resistance.
  • #12: Traditional authentication can’t scale with todays applications, usage, and need. When we put identity at the center, we are able to shit to contextual authentication. We gain new information feeds that can be used to build risk-based authentication. As an admin you can take your organizations authentication experience to the next level. Traditional authentication leverages passwords as the primary authentication factor. The shortfalls of passwords have been well documented. Strong on convience and familiarity, passwords offer protection from a determined attacker. As part of building out our response to eliminate passwords while improving the user experience, admins can leverage our contextual access policies to , if not eliminate passwords to at least make them optional
  • #14: By centralizing identity, we take away this complexity, speeding adoption of new technologies and gaining the ability to place security where it adds the most value.
  • #15: When we provide services to our constituents, we have to face the same problems – how to ensure secure access to services without creating a barrier to entry https://www.flickr.com/photos/aarongustafson/63773435
  • #16: Handing off identity allows you to focus on your mission.
  • #17: Thank you!