SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Chris Niggel | Okta Director Security & Compliance
Accelerating Transformation with
Identity
October 2018
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Photo Credit: https://upload.wikimedia.org/wikipedia/commons/2/22/Bodiam_Castle_south.jpg
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Image: http://thedailywtf.com/images/remy/robotguys.png
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta ConfidentialPhoto credit: https://www.flickr.com/photos/egfocus/7419859084
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
People Technology
Applications
Devices
Wearables
IoT
Anything
Partners
Contractors
Anyone
Customers
Employees
Identity
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Response
Policy
Engine
Rule Based
Risk Based
Context
Device
User
Location
Network
App
Response
History
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Okta Verify
with Push
SMSYubiKeyOkta Verify OTP
PIV/CAC
okta confidential 13
© Okta and/or its affiliates. All rights reserved. Okta Confidential
© Okta and/or its affiliates. All rights reserved. Okta Confidential
Accelerating Information with Identity

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of IT
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Enterprise Microservices
Enterprise MicroservicesEnterprise Microservices
Enterprise Microservices
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
IoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global DeploymentsIoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global Deployments
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 

Ähnlich wie Accelerating Information with Identity

Ähnlich wie Accelerating Information with Identity (20)

CSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseCSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for Enterprise
 
How to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
 
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeWebinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
neXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewneXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event Review
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud Challenge
 
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
How to Manage Microservices and APIs with Apigee and Istio
How to Manage Microservices and APIs with Apigee and IstioHow to Manage Microservices and APIs with Apigee and Istio
How to Manage Microservices and APIs with Apigee and Istio
 
Software-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOpsSoftware-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOps
 
Automating Brownfield Application Modernization on Pivotal Cloud Foundry
Automating Brownfield Application Modernization on Pivotal Cloud FoundryAutomating Brownfield Application Modernization on Pivotal Cloud Foundry
Automating Brownfield Application Modernization on Pivotal Cloud Foundry
 
Agile Application Lifecycle Management (ALM) with Inflectra
Agile Application Lifecycle Management (ALM) with InflectraAgile Application Lifecycle Management (ALM) with Inflectra
Agile Application Lifecycle Management (ALM) with Inflectra
 
Migrating from Big Data Architecture to Spring Cloud
Migrating from Big Data Architecture to Spring CloudMigrating from Big Data Architecture to Spring Cloud
Migrating from Big Data Architecture to Spring Cloud
 
Architectures That Bend but Don't Break
Architectures That Bend but Don't BreakArchitectures That Bend but Don't Break
Architectures That Bend but Don't Break
 
Turtles all the Way Up – From OSGi bundles to Fog Computing - Tim Ward (Paremus)
Turtles all the Way Up – From OSGi bundles to Fog Computing - Tim Ward (Paremus)Turtles all the Way Up – From OSGi bundles to Fog Computing - Tim Ward (Paremus)
Turtles all the Way Up – From OSGi bundles to Fog Computing - Tim Ward (Paremus)
 

Mehr von scoopnewsgroup

Mehr von scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Kürzlich hochgeladen

Program Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxProgram Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptx
ScottMeyers35
 
Dawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 YukonDawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 Yukon
pmenzies
 

Kürzlich hochgeladen (20)

Vip ℂall Girls AK Market Phone No 9999965857 High Profile ℂall Girl Delhi No ...
Vip ℂall Girls AK Market Phone No 9999965857 High Profile ℂall Girl Delhi No ...Vip ℂall Girls AK Market Phone No 9999965857 High Profile ℂall Girl Delhi No ...
Vip ℂall Girls AK Market Phone No 9999965857 High Profile ℂall Girl Delhi No ...
 
Rocky Mount Greenville Willson Regional Transit Plan
Rocky Mount Greenville Willson Regional Transit PlanRocky Mount Greenville Willson Regional Transit Plan
Rocky Mount Greenville Willson Regional Transit Plan
 
Program Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxProgram Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptx
 
IEA Global Critical Minerals Outlook2024
IEA Global Critical Minerals Outlook2024IEA Global Critical Minerals Outlook2024
IEA Global Critical Minerals Outlook2024
 
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
“Bee engaged with Youth”. World Bee Day 2024; May. 20th.
 
Effective governance in the modern charity
Effective governance in the modern charityEffective governance in the modern charity
Effective governance in the modern charity
 
The impact and warm of wildlife crime - 2024 World Wildlife Crime Report.
The impact and warm of wildlife crime - 2024 World Wildlife Crime Report.The impact and warm of wildlife crime - 2024 World Wildlife Crime Report.
The impact and warm of wildlife crime - 2024 World Wildlife Crime Report.
 
2024_End_of_Session_Report_Final_With_Vetoes.pdf
2024_End_of_Session_Report_Final_With_Vetoes.pdf2024_End_of_Session_Report_Final_With_Vetoes.pdf
2024_End_of_Session_Report_Final_With_Vetoes.pdf
 
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
 
Building a better Britain: How cities like Bradford can help to end economic ...
Building a better Britain: How cities like Bradford can help to end economic ...Building a better Britain: How cities like Bradford can help to end economic ...
Building a better Britain: How cities like Bradford can help to end economic ...
 
Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...
 
2024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 332024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 33
 
OECD Green Talks LIVE | Diving deeper: the evolving landscape for assessing w...
OECD Green Talks LIVE | Diving deeper: the evolving landscape for assessing w...OECD Green Talks LIVE | Diving deeper: the evolving landscape for assessing w...
OECD Green Talks LIVE | Diving deeper: the evolving landscape for assessing w...
 
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
 
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
EDI Executive Education Master Class- 15thMay 2024 (updated) (2)
 
Dawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 YukonDawson City Rolling Ads for May 15 2024 Yukon
Dawson City Rolling Ads for May 15 2024 Yukon
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34
 
History of DAVAO DE ORO Municipality of Maragusan
History of DAVAO DE ORO Municipality of MaragusanHistory of DAVAO DE ORO Municipality of Maragusan
History of DAVAO DE ORO Municipality of Maragusan
 
Help set up SERUDS Orphanage virtual classroom
Help set up SERUDS Orphanage virtual classroomHelp set up SERUDS Orphanage virtual classroom
Help set up SERUDS Orphanage virtual classroom
 
How to Save a Place: Get the Word Out Far And Wide
How to Save a Place: Get the Word Out Far And WideHow to Save a Place: Get the Word Out Far And Wide
How to Save a Place: Get the Word Out Far And Wide
 

Accelerating Information with Identity

Hinweis der Redaktion

  1. What is your mission, and how has it changed over the years? Every organization is now impacted by technology Images: https://www.flickr.com/photos/26254305@N08/15751860326 http://www.navy.mil/view_image.asp?id=23565 https://www.flickr.com/photos/departmentofenergy/29386413180/
  2. Our solution to the problem was to build walls and secrets. We viewed information security like building a castle. Moat to cross in the form of a firewall, with a VPN forming our drawbridge. Secret passwords to open the gate through our 3-foot-thick stone walls, and we moved all of our corporate data inside of this fortress Soon, we were trapped within our network. Sure, things were secure, but all this security was painful for employees. Mobile devices became a force of change against us
  3. So, as we forced users to have complex passwords, with multiple letters, numbers, symbols, our users put them on post-it notes, and re-used the same password across personal and corporate sites.
  4. When we found passwords were not strong enough, we deployed multifactor tokens, that had to be carried around everywhere we went. Of course, if you left your token on your desk, and the boss wanted that critical report done by the morning, you were stuck. So users put their multifactor token in front of a webcam!
  5. As technology progressed, and cloud services took off,I struggled to keep our data within the castle walls, implementing filtering at the firewall. But it was a losing battle - employees just used different services.
  6. Now, our castle is in the middle of a city Customer, partners all collaborators
  7. Employees not graded on security, they have other tasks to do. Therefore, they are always going to follow the path of least resistance.
  8. Traditional authentication can’t scale with todays applications, usage, and need. When we put identity at the center, we are able to shit to contextual authentication. We gain new information feeds that can be used to build risk-based authentication. As an admin you can take your organizations authentication experience to the next level. Traditional authentication leverages passwords as the primary authentication factor. The shortfalls of passwords have been well documented. Strong on convience and familiarity, passwords offer protection from a determined attacker. As part of building out our response to eliminate passwords while improving the user experience, admins can leverage our contextual access policies to , if not eliminate passwords to at least make them optional
  9. By centralizing identity, we take away this complexity, speeding adoption of new technologies and gaining the ability to place security where it adds the most value.
  10. When we provide services to our constituents, we have to face the same problems – how to ensure secure access to services without creating a barrier to entry https://www.flickr.com/photos/aarongustafson/63773435
  11. Handing off identity allows you to focus on your mission.
  12. Thank you!