SlideShare a Scribd company logo
Security & Identity
Analytics
How Security and Identity Analytics can Drive
Adaptive Defence
Adam Evans | Senior Identity & Access Specialist | 24th February 2016
Source: PwC 2016 Global State of Information Security Survey
(Responses from 10,000 CxOs in 127 countries 30% from Europe. Error margin <1%)
Hacking is Big Business…
The average annual
Monetary loss was
$2.5m (£1.75m)
per organisation
Finding the weak links – a full-time job
• Social media
• Link clickers
• Weak passwords
Adapting to Controls
“Enterprises are having a difficult
time hiring skilled people as it takes
53% of organisations between 3 and
6 months to fill a position and 10%
cannot fill them at all.”
Source: ISACA’s global survey, “The State of Cybersecurity: Implications for 2015”
Meanwhile, as the threat evolves…
Provide the limited
professionals we have
with the best information
for rapid decision making
Analytics applies algorithms or
machine learning to the
“advisor feeds” for specific use
cases
At Micro Focus, we believe that
Identity and Security Analytics
holds the greatest hope of leveling
the playing field with today’s
dynamic threats
Identity Analytics Use Cases
“Identity Analytics and Intelligence (IAI)
moves organisations toward a contextual,
dynamic, risk-based approach to identity
and access management.”
Source: Gartner
Risk-Based Authentication
• Use risk scoring to drive step-up authentication
• Static risk scoring can be assigned to the entitlement,
user, or application
• Add dynamic risk at request such as time of day, geo
location, IP address, or device
• Results can be shared back into the analytics engine
as an advisor feed
Bad Behavioral Analysis
• Machine learning and anomaly detection based on
identities
• Give privileged users insight into unusual activity with
their credentials
• Identify unusual patterns of access, changes and data
exfiltration
• Detect use of privileged account “backdoors”
Excessive Credential Detection
• Identify orphaned or rogue accounts based on login or
peer group analysis – revoke accounts and save on
SaaS licenses
• Compare employees being paid by HR, or contracts to
orphaned or rogue accounts
Adaptive Access Certifications
• Request immediate access certification for high-risk
transactions
• Prioritise the highest risk entitlements for access
certifications
• Indicate dormant accounts or outlier access compared
to peers
• Reduce rubber-stamping and increase revocation rates
Risk-Based ID & Access Provisioning
• Risk-informed access request and approval
• Policy improvement suggestions for roles or SOD
controls
Generally, identity analytics
provides better decision-
making information
Security Analytics Use Cases
Abnormal Sensitive File Access
• Unusual time of day for the user
• From a risky IP address, geographic location or
unknown machine
• With credentials that haven’t been used in a while
Abnormal Data Exfiltration
• Large data sets
• Data movement to USB drives or an unusual location
Abnormal File Changes
• File replacement outside of change windows
• Changes made by an abnormal user
Abnormal Password Resets
• Brute force attempts at self-service password resets
• Abnormal time, location or device for password resets
Generally, security analytics is
looking for abnormal activity
Enforce
Access
Controls
Monitor
User
Activity
Identity-Powered Security
Minimise
Rights
Analytics
The Micro Focus Approach
An Integrated Identity, Access & Security Solution
Access
Management &
Authentication
Secure
User
Monitoring
Identity Governance &
Administration
AnalyticsAnalytics
Identity Governance & Administration
Enforcing the Least-Privilege Principle
IGA
Access
Request
Help-Desk
Integration
Access
Review
Privileged
Identity
Management
Delegated
Administration
Business Policy
SOD & Roles
Identity
Management
Minimise Rights
Enforce Access Controls
AMA
Single Sign-On
(Web, Cloud,
Enterprise)
BYOI
BYOD
Multi-Factor
Authentication
Federation
Risk-Based
Adaptive
Authentication
Access Management and Authentication
A Secure Sign-on Experience
Monitor User Activity
SUMLog & Event
Correlation
SIEM
File
Integrity
Monitoring
Configuration
Assessment
Anomaly
Detection
Privileged
Session
Recording
Secure User Monitoring
Analytics - Identify Abnormal
Benefits of an Analytics
Approach…
• Targeted information for more efficient and
intelligent decision making
• Reduced data sifting to more rapidly identify and
eliminate threats
• Reduced overall risk with existing personnel
resources
Questions?
Thank You For Listening

More Related Content

PDF
#MFSummit2016 Secure: Introduction to identity, access and security
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PPTX
The Internet of Everything is Here
PPTX
What is zero trust model (ztm)
PDF
Symantec 2011 Social Media Protection Flash Poll Global Results
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
#MFSummit2016 Secure: Introduction to identity, access and security
MYTHBUSTERS: Can You Secure Payments in the Cloud?
The Internet of Everything is Here
What is zero trust model (ztm)
Symantec 2011 Social Media Protection Flash Poll Global Results
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
LoginCat - Zero Trust Integrated Cybersecurity
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains

What's hot (20)

DOCX
What is zero trust model of information security?
PPTX
Vulnerability Testing Services Case Study
PPTX
Tsc2021 cyber-issues
DOCX
“Verify and never trust”: The Zero Trust Model of information security
PPTX
The CISO’s Guide to Data Loss Prevention
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PDF
Micro segmentation and zero trust for security and compliance - Guardicore an...
PPTX
Zero Trust Network Access
PPTX
2015 Angelbeat_ConvergenceMsg-FINAL
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PPTX
Zero trust deck 2020
PDF
Zero Trust Model Presentation
PPTX
A Smarter, More Secure Internet of Things
PPTX
SANS Critical Security Controls Summit London 2013
PDF
RSA ASIA 2014 - Internet of Things
PDF
McAfee Total Protection for Data Loss Prevention (DLP)
PPTX
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPT
Cloud security
PPTX
Two Peas in a Pod: Cloud Security and Mobile Security
What is zero trust model of information security?
Vulnerability Testing Services Case Study
Tsc2021 cyber-issues
“Verify and never trust”: The Zero Trust Model of information security
The CISO’s Guide to Data Loss Prevention
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Micro segmentation and zero trust for security and compliance - Guardicore an...
Zero Trust Network Access
2015 Angelbeat_ConvergenceMsg-FINAL
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Zero trust deck 2020
Zero Trust Model Presentation
A Smarter, More Secure Internet of Things
SANS Critical Security Controls Summit London 2013
RSA ASIA 2014 - Internet of Things
McAfee Total Protection for Data Loss Prevention (DLP)
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
Advanced Persistent Threat - Evaluating Effective Responses
Cloud security
Two Peas in a Pod: Cloud Security and Mobile Security
Ad

Viewers also liked (9)

PPTX
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
PPTX
Security Analytics and Big Data: What You Need to Know
PDF
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
PPT
Big Data, Security Intelligence, (And Why I Hate This Title)
PDF
Security and Audit for Big Data
PPTX
Adaptive Enterprise Security Architecture
PPT
Adaptive Trust for Strong Network Security
PDF
Big Data Security and Governance
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Security Analytics and Big Data: What You Need to Know
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Big Data, Security Intelligence, (And Why I Hate This Title)
Security and Audit for Big Data
Adaptive Enterprise Security Architecture
Adaptive Trust for Strong Network Security
Big Data Security and Governance
Ad

Similar to #MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive Defense (20)

PDF
Complicate, detect, respond: stopping cyber attacks with identity analytics
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PPTX
Detect, Deter, and Remediate Cyber Risk
PDF
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
PDF
Identity and Access Intelligence
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
PDF
Intelligence Driven Identity and Access Management
 
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PPTX
Identity intelligence: Threat-aware Identity and Access Management
PDF
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
PDF
IT Executive Guide to Security Intelligence
PPTX
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
PPTX
Phishing: How to get off the hook using Intelligent IAM
PDF
AccessPaaS (SafePaaS)
PDF
AccessPaaS by SafePaaS
PPTX
Building Secure Relationships Across the Enterprise
PDF
Microsoft Avanced Threat Analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
Big Data Analytics for Cyber Security: A Quick Overview
Detect, Deter, and Remediate Cyber Risk
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
Identity and Access Intelligence
Accelerating Enhanced Threat Identification and Incident Investigation
[Webinar] Supercharging Security with Behavioral Analytics
Intelligence Driven Identity and Access Management
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Identity intelligence: Threat-aware Identity and Access Management
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
IT Executive Guide to Security Intelligence
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
Phishing: How to get off the hook using Intelligent IAM
AccessPaaS (SafePaaS)
AccessPaaS by SafePaaS
Building Secure Relationships Across the Enterprise
Microsoft Avanced Threat Analytics

More from Micro Focus (20)

PPTX
North America Strategic Modernization Exec Forum
PDF
Tech Channel COBOL ebook
PDF
Unlocking COBOL Business Value
PDF
Quietly confident, enduringly competent - COBOL.
PDF
5 key capabilitie for a smart service desk solution infographic
PDF
SAP Fortify by Micro Focus.
PDF
Digital Transformation pillars 2020
PDF
Whats new in Enterprise 5.0 Product Suite
PPTX
Micro Focus Corporate Overview
PPTX
Why attend the application modernization & connectivity track at Micro Focus ...
PDF
Micro Focus #DevDay50 - Atlanta
PDF
Growth of Internet Data - 2017
PPTX
Easily Create Scalable Automation using Selenium
PDF
The Journey to Mainframe DevOps
PDF
Micro Focus extend 10 and 10.1 with AcuToWeb
PDF
The COBOL Story by Wim Ebbinkhuijsen
PPTX
DevDay Copenhagen - Micro Focus overview and introduction
PPTX
The DevOps Journey
PPTX
ACUCOBOL - Product Strategy and Roadmap
PDF
#DevDay Copenhagen - Bluegarden Presentation
North America Strategic Modernization Exec Forum
Tech Channel COBOL ebook
Unlocking COBOL Business Value
Quietly confident, enduringly competent - COBOL.
5 key capabilitie for a smart service desk solution infographic
SAP Fortify by Micro Focus.
Digital Transformation pillars 2020
Whats new in Enterprise 5.0 Product Suite
Micro Focus Corporate Overview
Why attend the application modernization & connectivity track at Micro Focus ...
Micro Focus #DevDay50 - Atlanta
Growth of Internet Data - 2017
Easily Create Scalable Automation using Selenium
The Journey to Mainframe DevOps
Micro Focus extend 10 and 10.1 with AcuToWeb
The COBOL Story by Wim Ebbinkhuijsen
DevDay Copenhagen - Micro Focus overview and introduction
The DevOps Journey
ACUCOBOL - Product Strategy and Roadmap
#DevDay Copenhagen - Bluegarden Presentation

Recently uploaded (20)

PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Spectral efficient network and resource selection model in 5G networks
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks

#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive Defense

  • 1. Security & Identity Analytics How Security and Identity Analytics can Drive Adaptive Defence Adam Evans | Senior Identity & Access Specialist | 24th February 2016
  • 2. Source: PwC 2016 Global State of Information Security Survey (Responses from 10,000 CxOs in 127 countries 30% from Europe. Error margin <1%) Hacking is Big Business… The average annual Monetary loss was $2.5m (£1.75m) per organisation
  • 3. Finding the weak links – a full-time job • Social media • Link clickers • Weak passwords
  • 5. “Enterprises are having a difficult time hiring skilled people as it takes 53% of organisations between 3 and 6 months to fill a position and 10% cannot fill them at all.” Source: ISACA’s global survey, “The State of Cybersecurity: Implications for 2015” Meanwhile, as the threat evolves…
  • 6. Provide the limited professionals we have with the best information for rapid decision making
  • 7. Analytics applies algorithms or machine learning to the “advisor feeds” for specific use cases
  • 8. At Micro Focus, we believe that Identity and Security Analytics holds the greatest hope of leveling the playing field with today’s dynamic threats
  • 10. “Identity Analytics and Intelligence (IAI) moves organisations toward a contextual, dynamic, risk-based approach to identity and access management.” Source: Gartner
  • 11. Risk-Based Authentication • Use risk scoring to drive step-up authentication • Static risk scoring can be assigned to the entitlement, user, or application • Add dynamic risk at request such as time of day, geo location, IP address, or device • Results can be shared back into the analytics engine as an advisor feed
  • 12. Bad Behavioral Analysis • Machine learning and anomaly detection based on identities • Give privileged users insight into unusual activity with their credentials • Identify unusual patterns of access, changes and data exfiltration • Detect use of privileged account “backdoors”
  • 13. Excessive Credential Detection • Identify orphaned or rogue accounts based on login or peer group analysis – revoke accounts and save on SaaS licenses • Compare employees being paid by HR, or contracts to orphaned or rogue accounts
  • 14. Adaptive Access Certifications • Request immediate access certification for high-risk transactions • Prioritise the highest risk entitlements for access certifications • Indicate dormant accounts or outlier access compared to peers • Reduce rubber-stamping and increase revocation rates
  • 15. Risk-Based ID & Access Provisioning • Risk-informed access request and approval • Policy improvement suggestions for roles or SOD controls
  • 16. Generally, identity analytics provides better decision- making information
  • 18. Abnormal Sensitive File Access • Unusual time of day for the user • From a risky IP address, geographic location or unknown machine • With credentials that haven’t been used in a while
  • 19. Abnormal Data Exfiltration • Large data sets • Data movement to USB drives or an unusual location
  • 20. Abnormal File Changes • File replacement outside of change windows • Changes made by an abnormal user
  • 21. Abnormal Password Resets • Brute force attempts at self-service password resets • Abnormal time, location or device for password resets
  • 22. Generally, security analytics is looking for abnormal activity
  • 24. The Micro Focus Approach An Integrated Identity, Access & Security Solution Access Management & Authentication Secure User Monitoring Identity Governance & Administration AnalyticsAnalytics
  • 25. Identity Governance & Administration Enforcing the Least-Privilege Principle IGA Access Request Help-Desk Integration Access Review Privileged Identity Management Delegated Administration Business Policy SOD & Roles Identity Management Minimise Rights
  • 26. Enforce Access Controls AMA Single Sign-On (Web, Cloud, Enterprise) BYOI BYOD Multi-Factor Authentication Federation Risk-Based Adaptive Authentication Access Management and Authentication A Secure Sign-on Experience
  • 27. Monitor User Activity SUMLog & Event Correlation SIEM File Integrity Monitoring Configuration Assessment Anomaly Detection Privileged Session Recording Secure User Monitoring Analytics - Identify Abnormal
  • 28. Benefits of an Analytics Approach… • Targeted information for more efficient and intelligent decision making • Reduced data sifting to more rapidly identify and eliminate threats • Reduced overall risk with existing personnel resources
  • 30. Thank You For Listening