SlideShare a Scribd company logo
Identity
The Cornerstone of Information Security
Ben Boyd | Sr. Security Architect | Integration Partners
YOU CAN BLOCK
95-100% of
THREATS
No	machine	learning	
No	artificial	intelligence
No	quantum	cryptography
Really? How?
Zero-Trust
Least	Privilege
The	End
IdentityPeople Technology
Applications
Endpoints
Infrastructure
Wearables
IoT
Employees
Contractors
Vendors
Customers
Anyone/Everyone
A Native Nebraskan Knew in 1936
It’s as easy as 1,2,3….. 4
• Identify
• Subjects, Objects, Actions… verbs?
• Decide
• Allow/Deny/Challenge (Know, Have, and Are)
• Grant
• Permissions, Authority, Access
• Watch
• Monitor, Record, Timed Access
But what about the last 4 months?
• September 2017
• SEC – Non public filings (Remote Code Execution) GRANT
• Equifax – 143M records of PII (Remote Code Execution) GRANT
• Deloitte – 100% of emails (Admin Account..OMG 2FA) DECIDE
• July 2017
• Verizon – 14M records of PII (Insecure publically facing) GRANT/WATCH
• CA Assoc. of Realtors – 250K Credit Cards (Malware) GRANT/WATCH
• June 2017
• Deep Root Analytics – 198M records of PII (unsecured cloud)
GRANT/WATCH
• Washington State University – 1M records of PII (stolen safe)
GRANT/WATCH
Ok… The last 6 months?
• May 2017
• Kmart – 1M Credit Cards (Malware)
• OneLogin– 100% of customers (Private Key Loss)
• Gmail – 1M Users Email Accounts (phishing)
• April 2017
• Chipotle– 1M+ Credit Cards (Malware)
• IHG – 1M+ Credit Cards (Malware)
• FAFSA IRS Tool – 100K records of PII (Public Tool Abuse)
Identity. The new (old) perimeter.
Yesterday’s Reality Today’s Reality
Monolithic, Contained, Rigid
Employees
Perimeter Security, VPN
THE WORLD BEFORE
Distributed, Mobile, Hybrid
Insecure, Fragmented
THE WORLD TODAY
Partners
Employees
Contractors
Customers
Start Now!
• The attack surface is spreading
• Target and HVAC
• Toasters and Cars coming soon!
• Wait, Dyson is making a car?
So, I should just grill everyone?
A	balancing	act	between	YES	and	NO
Speaking	of	Toasters…
11	IPs
3	Bluetooth	radios	
8	Zigbee radios
3	Z-wave	radios
How	many	toasters	do	you	have?
IPs?
Radios?
USBs?
Miswires?
Where does Identity Matter?
Context Matters
• Geo-location
• Device specific
• Corporate Asset
• Registered BYOD
• Unregistered “Bad Guy”
• IP/Location Reputation
• Time Sensitive
Beside the Obvious
Workstations (End Users) Servers
Seriously?	Why	are	we	still	giving	these	people	admin	rights?! User	namespaces	(Jails)
Containers
Firewalls
• Perimeter, Core,
Virtual? D. All of the
above
• User-based FW is a
MUST
• User-based policies
are a MUST
Applications
• Put identity at the center of everything!
• Network effect on access – Scale from 1 to millions
• Stay neutral!
Lifecycle
Management
Mobility
Management
Universal
Directory
Adaptive
Multi-Factor
Authentication
Developer
SDKs
Single	
Sign-On
API	Access
Management
Extensible	Profiles,	
Attribute	
Transformations,
Directory	Integration	
and	AD	Password	
Management
Secure	SSO	for	All	Your	
Web	Apps,	On-prem
and	Cloud,	with	Flexible	
Policy,	from	Any	Device
Contextual	Access
Policies,	
Modern Factors,	
Adaptive	
Authentication,	
Integrations	for	Apps	
and	VPNs
Lifecycle	Management,	
Cloud	&	On-prem App	
Integration,	Mastering	
from	Apps,	Directory	
Provisioning,	Rules,	
Workflow,	Reporting
Tight	User	Identity	
Integration,	Device	
Based	Contextual	
Access,	
Light-weight	
Management
OAuth	2.0	API	
authorization,
Flexible	identity-driven	
policy	engine,
Easy	&	centralized	
administration	across	
APIs
SDKs	simplify	the	
process	of	managing	
your	Okta	org.	Use	our	
REST	APIs	easily.
How about both? (Sponsor Time!)
Where else?
• Data Analytics
• Info from everything
• Network Gear
• Servers
• Endpoints
• Clouds
• Wireless
• Toasters?
• Aware, Alert, Alarm
• Churn baby churn!
Questions
Thank You!

More Related Content

PDF
Refugees on Rails Berlin - #2 Tech Talk on Security
PDF
Hack the World: IT/IOT/ICS SCADA OSINT
PDF
Iot ppt
PPTX
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
PPTX
Cybercrime trends in last five years
PPTX
Things Security
PPTX
Security is sim
Refugees on Rails Berlin - #2 Tech Talk on Security
Hack the World: IT/IOT/ICS SCADA OSINT
Iot ppt
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Cybercrime trends in last five years
Things Security
Security is sim

What's hot (20)

PDF
Privacy on the Series of Tubes of Things
PPTX
Digital law
PPTX
The art of deceiving humans a.k.a social engineering
PPTX
Isc(2) eastbay-lenin aboagye
PPTX
Webinar: True Stories From the Threat Hunting Files
PDF
Introduction to the Internet of Things
PDF
Intro to information security
PPTX
C3 Cyber
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PPTX
Stepping Up conference 2013
PDF
The Basics: Reviewing & Producing ESI Evidence
PPTX
How to keep women safe, online?
PPTX
Location: Trends, Ethics & Diversity
 
PPTX
IoT & Big Data - A privacy-oriented view of the future
PPTX
Cyber crime1 vaibhavi
PDF
Around a Few Big Buttons
PDF
Cyphra - Cyber Security
 
PPTX
ICO Presentation - Data Protection
 
PPTX
Energy and The Internet of Things
PDF
Building powerful apps with ArangoDB & KeyLines
Privacy on the Series of Tubes of Things
Digital law
The art of deceiving humans a.k.a social engineering
Isc(2) eastbay-lenin aboagye
Webinar: True Stories From the Threat Hunting Files
Introduction to the Internet of Things
Intro to information security
C3 Cyber
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Stepping Up conference 2013
The Basics: Reviewing & Producing ESI Evidence
How to keep women safe, online?
Location: Trends, Ethics & Diversity
 
IoT & Big Data - A privacy-oriented view of the future
Cyber crime1 vaibhavi
Around a Few Big Buttons
Cyphra - Cyber Security
 
ICO Presentation - Data Protection
 
Energy and The Internet of Things
Building powerful apps with ArangoDB & KeyLines
Ad

Similar to Identity - The Cornerstone of Information Security (20)

PPT
Embracing the IT Consumerization Imperitive
PPT
Embracing the IT Consumerization Imperitive
PDF
Threat Hunting, Detection, and Incident Response in the Cloud
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PDF
Recent developments in data analytics and big data
PDF
A Comedy of Errors in Web Application Security
PPTX
Protecting Yourself From Data and Identity Theft
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
PDF
2017-03-30 IT Security - What You Need To Know
PPT
Lumension Security - Adjusting our defenses for 2012
PPTX
Discover advanced threats with threat intelligence - Jeremy Li
PDF
2015-03-24 IT Security - What You Need to Know
PPTX
Iron Bastion: How to Manage Your Clients' Data Responsibly
PDF
DECEPTICONv2
PDF
[Bucharest] Catching up with today's malicious actors
PDF
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PPTX
Do it Best Corp. Techapalooza 2013 Presentation
PDF
OSINT- Leveraging data into intelligence
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Threat Hunting, Detection, and Incident Response in the Cloud
Better to Ask Permission? Best Practices for Privacy and Security
Recent developments in data analytics and big data
A Comedy of Errors in Web Application Security
Protecting Yourself From Data and Identity Theft
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
2017-03-30 IT Security - What You Need To Know
Lumension Security - Adjusting our defenses for 2012
Discover advanced threats with threat intelligence - Jeremy Li
2015-03-24 IT Security - What You Need to Know
Iron Bastion: How to Manage Your Clients' Data Responsibly
DECEPTICONv2
[Bucharest] Catching up with today's malicious actors
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
This Time, It’s Personal: Why Security and the IoT Is Different
Do it Best Corp. Techapalooza 2013 Presentation
OSINT- Leveraging data into intelligence
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Web App vs Mobile App What Should You Build First.pdf
 
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
 
PDF
August Patch Tuesday
 
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
STKI Israel Market Study 2025 version august
PDF
Getting Started with Data Integration: FME Form 101
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Architecture types and enterprise applications.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hybrid model detection and classification of lung cancer
PPTX
1. Introduction to Computer Programming.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
A comparative study of natural language inference in Swahili using monolingua...
Web App vs Mobile App What Should You Build First.pdf
 
Univ-Connecticut-ChatGPT-Presentaion.pdf
Module 1.ppt Iot fundamentals and Architecture
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
 
August Patch Tuesday
 
O2C Customer Invoices to Receipt V15A.pptx
What is a Computer? Input Devices /output devices
STKI Israel Market Study 2025 version august
Getting Started with Data Integration: FME Form 101
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TLE Review Electricity (Electricity).pptx
A novel scalable deep ensemble learning framework for big data classification...
Architecture types and enterprise applications.pdf
Enhancing emotion recognition model for a student engagement use case through...
Hybrid model detection and classification of lung cancer
1. Introduction to Computer Programming.pptx

Identity - The Cornerstone of Information Security

  • 1. Identity The Cornerstone of Information Security Ben Boyd | Sr. Security Architect | Integration Partners
  • 2. YOU CAN BLOCK 95-100% of THREATS No machine learning No artificial intelligence No quantum cryptography
  • 6. A Native Nebraskan Knew in 1936
  • 7. It’s as easy as 1,2,3….. 4 • Identify • Subjects, Objects, Actions… verbs? • Decide • Allow/Deny/Challenge (Know, Have, and Are) • Grant • Permissions, Authority, Access • Watch • Monitor, Record, Timed Access
  • 8. But what about the last 4 months? • September 2017 • SEC – Non public filings (Remote Code Execution) GRANT • Equifax – 143M records of PII (Remote Code Execution) GRANT • Deloitte – 100% of emails (Admin Account..OMG 2FA) DECIDE • July 2017 • Verizon – 14M records of PII (Insecure publically facing) GRANT/WATCH • CA Assoc. of Realtors – 250K Credit Cards (Malware) GRANT/WATCH • June 2017 • Deep Root Analytics – 198M records of PII (unsecured cloud) GRANT/WATCH • Washington State University – 1M records of PII (stolen safe) GRANT/WATCH
  • 9. Ok… The last 6 months? • May 2017 • Kmart – 1M Credit Cards (Malware) • OneLogin– 100% of customers (Private Key Loss) • Gmail – 1M Users Email Accounts (phishing) • April 2017 • Chipotle– 1M+ Credit Cards (Malware) • IHG – 1M+ Credit Cards (Malware) • FAFSA IRS Tool – 100K records of PII (Public Tool Abuse)
  • 10. Identity. The new (old) perimeter. Yesterday’s Reality Today’s Reality Monolithic, Contained, Rigid Employees Perimeter Security, VPN THE WORLD BEFORE Distributed, Mobile, Hybrid Insecure, Fragmented THE WORLD TODAY Partners Employees Contractors Customers
  • 11. Start Now! • The attack surface is spreading • Target and HVAC • Toasters and Cars coming soon! • Wait, Dyson is making a car?
  • 12. So, I should just grill everyone?
  • 15. Context Matters • Geo-location • Device specific • Corporate Asset • Registered BYOD • Unregistered “Bad Guy” • IP/Location Reputation • Time Sensitive
  • 16. Beside the Obvious Workstations (End Users) Servers Seriously? Why are we still giving these people admin rights?! User namespaces (Jails) Containers
  • 17. Firewalls • Perimeter, Core, Virtual? D. All of the above • User-based FW is a MUST • User-based policies are a MUST
  • 18. Applications • Put identity at the center of everything! • Network effect on access – Scale from 1 to millions • Stay neutral! Lifecycle Management Mobility Management Universal Directory Adaptive Multi-Factor Authentication Developer SDKs Single Sign-On API Access Management Extensible Profiles, Attribute Transformations, Directory Integration and AD Password Management Secure SSO for All Your Web Apps, On-prem and Cloud, with Flexible Policy, from Any Device Contextual Access Policies, Modern Factors, Adaptive Authentication, Integrations for Apps and VPNs Lifecycle Management, Cloud & On-prem App Integration, Mastering from Apps, Directory Provisioning, Rules, Workflow, Reporting Tight User Identity Integration, Device Based Contextual Access, Light-weight Management OAuth 2.0 API authorization, Flexible identity-driven policy engine, Easy & centralized administration across APIs SDKs simplify the process of managing your Okta org. Use our REST APIs easily.
  • 19. How about both? (Sponsor Time!)
  • 20. Where else? • Data Analytics • Info from everything • Network Gear • Servers • Endpoints • Clouds • Wireless • Toasters? • Aware, Alert, Alarm • Churn baby churn!