SlideShare a Scribd company logo
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand
WELCOME IDENTERATI
INTRODUCING SIERRA
BORDER SECURITY V1.0
“WE DIDN’T FOCUS ON HOW
YOU COULD WRECK THE
SYSTEM INTENTIONALLY”
Vinton G. Cerf
$100
BILLION
Estimated loss in US per annum due to cybercrimeTHE INTERNET
“THEY THOUGHT THEY WERE BUILDING A CLASSROOM
AND IT TURNS OUT THEY BUILT A BANK.” Abbate
SECURITY
WASN’T EVEN A GOAL
UNFORTUNATE TRUTH
ATTACKS
SECURITY
Ubiquitous Internet
New Vulnerabilities
Market for Identity
Success & Profits
30 Million Bots
Insider Recruitment
Organization
WHAT IF OUR PERIMETER
NO LONGER DEFINES
OUR PERIMETER?
THE PERIMETER IS EXPANDING
2007 2008 2009 2010 2011 2012 2013 2014 2015Timeline
Software-as-a-Service
ENTERPRISE
(apps, users, network)
THE PERIMETER IS EXPANDING
2007 2008 2009 2010 2011 2012 2013 2014 2015Timeline
Software-as-a-Service
ENTERPRISE
(apps, users, network)
Smart Mobile Devices
Infrastructure-as-a-Service
2007 2008 2009 2010 2011 2012 2013 2014 2015Timeline
Software-as-a-Service
ENTERPRISE
(apps, users, network)
Smart Mobile Devices
THE PERIMETER IS EXPANDING
“DON’T EVER TAKE DOWN YOUR FENCE
UNTIL YOU KNOW THE REASON IT WAS PUT UP.”
G.K. Chesterton
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand
internet
enterprise
computer
device
app
api
Iot
MANY BORDERS
ONE BORDERLESS
IDENTITY SYSTEM
WE’RE BUILDING A HAMSTER TRAIL
SECURE TUNNELS TO TRANSMIT
AUTHENTICATED USERS
REDEFINING SECURITY with IDENTITY CORE
SECURITY
IDENTITY
DEFINED
SECURITY
IDENTITY
WE’RE ON A JOURNEY
TO FULL IDENTITY VISIBILITY
ANONYMOUS BY DEFAULT
IDENTIFIED BY DEFAULT
FUTURE
PAY EXTRA FOR
ANONAMOUS
TRANSACTIONS
BEWARE OUR
ASSUMPTIONS
ONLY GOOD ACTORS COULD
ACCESS THE NETWORK
ASSUMPTION #1
1970
THE PERIMETER IS SECURE
ASSUMPTION #2
1970–TODAY
IDENTITY
IS MORE SECURE
ASSUMPTION #3
2015
WHAT WOULD WE DO IF
PERIMETER ALREADY BREACHED
WHAT IF THE RIGHT IDENTITY
BECOMES A BAD ACTOR?
WHAT IF…
IDENTITY IS TOO WEAK
& TOO DISCONNECTED
TO PROTECT US AT
SCALE?
MOVING FORWARD
EVOLVE FROM
SINGLE-FACTOR
AUTHENTICATION
TO CONTINUOUS AND
CONTEXTUAL MULTI-FACTOR
STANDARDS-BASED
INTERACTIONS
EVERYWHERE
INCLUDING FIRST/LAST MILE INTEGRATION
micro trust
trust a little > trust a little more
login > trust a lot > trust a little more
trust a little less and so on…
TIME OUT / LOGOUTLOGIN > TRUST A LOT >
BIG TRUST
NEED A NEW SYSTEM FOR
IDENTITY PROOFING
& RESOLUTION
move beyond STATIC
ACCESS CONTROL
LEVERAGE
BIG-DATA & INTELLIGENCE
TO ENABLE DYNAMIC ACCESS CONTROL
KUDO’S
OPENID CONNECT
THANK YOU
REGISTER EARLY!
INTRODUCING ALEX SIMONS

More Related Content

PPTX
Mobile changes everything, no one is safe
Jorge Sebastiao
 
PDF
Public safety LTE gives agencies new standards of intelligence to enhance com...
Comms Connect
 
PDF
Company profile
NKonnect Infoway
 
PDF
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
NextVision Media
 
PPS
UX for Internet of things == Experience of Things
Puneet Arora
 
PDF
Mobile
Kris Bruynson
 
PDF
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2
 
Mobile changes everything, no one is safe
Jorge Sebastiao
 
Public safety LTE gives agencies new standards of intelligence to enhance com...
Comms Connect
 
Company profile
NKonnect Infoway
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
NextVision Media
 
UX for Internet of things == Experience of Things
Puneet Arora
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2
 

Similar to CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand (20)

PDF
Identity - The Cornerstone of Information Security
Ben Boyd
 
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
PDF
Centrify rethink security brochure
Mark Gibson
 
PPTX
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
 
PPTX
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
PDF
Cyber Security in Manufacturing
CentraComm
 
PDF
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
PPT
2011 lecture ia orientation
2b3d
 
PDF
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Lookout
 
PDF
La crisis de identidad que se avecina
Cristian Garcia G.
 
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
PDF
Widepoint orc thales webinar 111313d - nov 2013
Federation for Identity and Cross-Credentialing Systems (FiXs)
 
PDF
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Work-Bench
 
DOCX
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
PPTX
Network Security of Data Protection
UthsoNandy
 
PPTX
Cyber Security Case Studies
Moksha Kalyan Ram Abhiramula
 
PDF
Security annual report_mid2010
thaiantivirus
 
PDF
End to End Security - Check Point
Harry Gunns
 
PPT
The Future of Cyber Security
Stephen Lahanas
 
PDF
Information Security Risk Management
ipspat
 
Identity - The Cornerstone of Information Security
Ben Boyd
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
Centrify rethink security brochure
Mark Gibson
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
 
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
Cyber Security in Manufacturing
CentraComm
 
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
2011 lecture ia orientation
2b3d
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Lookout
 
La crisis de identidad que se avecina
Cristian Garcia G.
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
Widepoint orc thales webinar 111313d - nov 2013
Federation for Identity and Cross-Credentialing Systems (FiXs)
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Work-Bench
 
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
Network Security of Data Protection
UthsoNandy
 
Cyber Security Case Studies
Moksha Kalyan Ram Abhiramula
 
Security annual report_mid2010
thaiantivirus
 
End to End Security - Check Point
Harry Gunns
 
The Future of Cyber Security
Stephen Lahanas
 
Information Security Risk Management
ipspat
 
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
CloudIDSummit
 
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
CloudIDSummit
 
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CloudIDSummit
 
Ad

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
The Future of Artificial Intelligence (AI)
Mukul
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Doc9.....................................
SofiaCollazos
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand