SlideShare a Scribd company logo
MyVayda™ &
An Identity Risk and Cost Optimization Platform
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Today’s Identity owners are assessing the following
IAM Investments
Shifting Legacy or home grown IAM to a next gen “OTB” commercial model
Effectiveness of controls and auditability within mature IAM deployments
With Next Gen IAM, companies are assessing
The ease of audit and near real time risk-based analysis
System scalability to manage access needs for a growing volume of access points
and devices
Leveraging these systems to better provide insights for first line of defense systems
within security
When the wall protecting data -Vanishes
Employees access data, on any “thing” and this data moves between traditional, hybrid and cloud environments
§ The function of Identity has been evolving from defense and control to enablement
Mobility |Cloud |Social Networks
Image: Global Identity and Access Management (IAM) Market
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Link to Identity
Every business transaction, attack surface or target involves a credential and a service or piece of data.
These identities are targets…
Individuals
Shared Accounts
End Users and Privileged Accounts
Largest target of phishing attempts due to account sprawl and reuse
of passwords.
While relatively low in number because focus on their lack of
accountability, these accounts still do exist and require additional scrutiny.
Machine Identities
An often overlooked identity and becoming increasingly prevalent with
IOT. Big focus on digital keys and certificates.
Service Accounts
Default accounts allowing for standard transactions. ~50% of accounts.
APIs fall into this category as they use service accounts.
Fun facts …. 20% have never changed the default password and 73%
fail to audit, remove, or modify default accounts in prod.
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Yet	we	continue	to	spend	like	the	
model	still	works.
More	and	more,	we	see	departments	and	users	
operating	and	storing	data	outside	the	wall.
Attack Surfaces are Changing
Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Network
61%
Endpoint
19%
Web
12%
Email
8%
Security	Spend
Source:	Gartner	Information	Security	(2019	forecast)
Source:	2019	Verizon	Data	Breach	Investigation	Report
93%
of	breaches	are	
targeting	people…		
94%	of	those	via
e-mail
Threat Vectors are Changing
Are we targeting the right thing? Requires an identity-centric approach to threat management.
And while we continue to spend like this …. …. attacks are targeted here.
Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Risk, Compliance and Governance are Changing
Reporting, Analysis and Remediation done in silos…. …. Need to become more unified and share
common table talk sessions especially with
leadership and the board of director
Move from a checklist to understanding business risk and
operational impact. Understand how audit, regulations and
privacy requirements tie to legal and operations
Identities and system personas are key gateways for attackers to
hobble an enterprise
Have a single source or unified agnostic system that can interact
and glean insights from disparate systems
Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Identity Optimization with Next Gen Tech
Standardization of Ecosystem
Allows to evolve with industry standards
& regulatory requirements at the same
time it should be cost effective
Consolidation of legacy applications(end-
of-life) performing similar IAM
Functions will promote reuse of IAM
functions
Adopting to strategic cloud capability of
IAM function
Adopting to market leading IAM
function and capabilities –Identity as a
service(IDaaS)
Productive Provisioning
Automation in Provisioning and
De-Provisioning
Reduce the risk by reducing manual
process and decreasing number of
elevated rights of security admin teams
Automated provisioning and de-
provisioning speed the enforcement of
strong security policies while helping to
eliminate human error
End to End Reconciliation
Effective audit reporting
Reduce SOX Deficiencies and Audit
Findings
Mapping to Privacy and Risk Management
One Stop Platform
Improved User Experience by Implementing
single point of collection and fulfilment for
access administration & Identity Portal
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Analytics + ML with a Single Pane of Glass
Detective Controls
Apply an identity-specific approach to
incident prioritization, analysis,
response and remediation
Observe the interactions between entities. Based on the behavioral interactions
between identities and accessed resources or assets, dynamically determine each
identity’s level of privilege. Entities with similar access patterns are grouped as
peers. Often performed leveraging artificial intelligence and machine learning
models.
Determine abnormalities of interactions between privileged identities. Compare a
given access request to the access history to determine similarity with prior access.
Focus on the differences that have security implications and consequences.
Assign aggregated risk score to those identities based on action and context to
drive prioritization.
Pivoting to usage patterns + behaviors + integrated
systems and not just static access.
Static Access can be compromised…
Maps	to	IT	Audit	&	Regulatory	
Compliance	Requirements
ĂĽ How can I identity the most critical
areas to spend on cyber
technologies?
ĂĽ How does our cyber exposure
impact the business?
ĂĽ What do you spend on cyber & risk
management?
ĂĽ What is the ROI on cyber &
technology spend?
ĂĽ What Next-Gen technology
investment results in maximum
risk optimization?
ĂĽ Can we quantify the business
impact of our cyber threat and
risk exposure, across silos?
ĂĽ What prioritizes risk buydown?
MyVayda™ Risk	Impact	+	TCO	
Modules
CFO
ĂĽ Does Cyber Insurance address our risk
profile?
ĂĽ Does your technology architecture pose
challenges that increase costs?
MyVayda™ - Connecting the
Questions you face …
… with the Insights you need
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
MyVayda Business Enablers
Leveraging BigML Machine Learning
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
How MyVayda™ Works
MyVayda’s works across Platforms and is Tool Agnostic.
Custom connectors pulls or pushes feeds from endpoint
solutions.
RADIATE couple with BigML’s Machine Learning
Algorithms assesses, categorizes, structures and aligns raw
data for analysis and alignment to regulatory requirements.
MyVayda provides management capabilities for Identity
Behavior and Pattern Analysis, calculates compound risk
analysis across infrastructure technologies and also assesses
risk impact and remediation costs.
Focused on:
-Compound Risk Management,
leveraging Identity Analytics.
-Identity Fraud &
-Cost Optimization.
Identity Behavior & Pattern
Analysis (IBPA)
MyVayda System Modules
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Increased operational
efficiencies
Contextualized decision
making for access
authorizations
Identification /
Containment of threat
User Actions
(Continuous Profiling
and Alerting)
Risk Awareness
(Integrated Security
& Business teams)
User Access
(Continuous Control
and Remdiation)
Compound
Risk
Calculations
Behavioral
Analytics driven
Indicators of
Compromise
Dynamic
Discovery of
associations
between user
authorizations
Identity &
Authentication
Systems
Business
Application
Audit Events
Gateway
Device
Events
Continuous compliance &
Improved productivity
Quantification &
Prioritization of cyber
risks
Measuring & Improving
Cybersecurity ROI
Assets &
Vulnerability
Systems
Clustered
Analysis of roles,
entitlements &
attributes
Simulated
estimates of
cyber risk
value
Anomaly
Detection of
outliers in usser
actions
System Sources MyVayda Modularized Features Outcomes
Identity	Trust
Security	&	
Analytics
Risk	Meter	&	
TCO
MyVayda System Modules
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
Identity Trust
User
Access
Cost
User
Actions
Risk
Aware
Access	Risk	Indicators	to	enable	
Intelligent	Access	Assignments
Security & Analytics
Visibility	into	Threat	Vectors	in	a	
Hybrid	ecosystem
Baseline	of	potential	cyber	loss	
for	identified	indicators	of	
exposure
Risk Meter
TCO
Estimate	of	business	value	at	risks	based	
on	expected	regulatory	fines
Clustered
Analysis of roles,
entitlements &
attributes
Behavioral
Analytics driven
Indicators of
Compromise
Compounded
risk calculations
Simulated
estimates of
cyber risk value
Value Add from MyVayda
Presents a Unified Operating
View around Risk Management
for People, Processes and
Technologies
–leveraging
implemented
technologies
Leverages ML
and proprietary
analytics to
provide centralized reporting and
actionable insights for executive
stakeholders
§ Optimizes reporting for Cybersecurity and Risk
Management remediation.
§ Enable and Arm ERM leaders with impactful risk
reporting, for executive strategic decisions around
budgeting, transformation and daily operations
§ Reduces staffing requirements
and costs, both in headcount and
skills and map skills training
based on analytics on system
usage
§ Reduces cost of Audit
Remediation
§ Increase focus on standardizing
operations and error reduction with
around tools, platforms, systems
and people skills
VALUE
CAPABILITIES An organizational focus
on identity, technology
and cost optimization,
and compound risk ….
… to accelerate valuable
insight and impactful
decisions.
Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.

More Related Content

PDF
Intelligent Mobility: Business Value of IoT and ML in Logistics
BigML, Inc
 
PDF
ML in GRC: Supporting Human Decision Making for Regulatory Adherence with Mac...
BigML, Inc
 
PDF
Intelligent Mobility: Machine Learning in the Mobility Industry
BigML, Inc
 
PDF
Webinar: Machine Learning Fights Financial Crime
BigML, Inc
 
PDF
Machine Learning in Retail: ML in the Retail Sector
BigML, Inc
 
PDF
Machine learning in retail
Capgemini
 
PDF
MLSEV Virtual. One Platform to Rule Them All
BigML, Inc
 
PPTX
Internet of things & predictive analytics
Prasad Narasimhan
 
Intelligent Mobility: Business Value of IoT and ML in Logistics
BigML, Inc
 
ML in GRC: Supporting Human Decision Making for Regulatory Adherence with Mac...
BigML, Inc
 
Intelligent Mobility: Machine Learning in the Mobility Industry
BigML, Inc
 
Webinar: Machine Learning Fights Financial Crime
BigML, Inc
 
Machine Learning in Retail: ML in the Retail Sector
BigML, Inc
 
Machine learning in retail
Capgemini
 
MLSEV Virtual. One Platform to Rule Them All
BigML, Inc
 
Internet of things & predictive analytics
Prasad Narasimhan
 

What's hot (20)

PDF
Towards enterprise-ready AI deployments: Minimizing the risk of consuming AI ...
alekn
 
PPS
ROI Example
Philbo58
 
PDF
Benefit and Enablers of Deploying IoT Solution
Ashish Saxena
 
PDF
Seven things CIOs and software buyers should know about artificial intelligence
Andy Mura
 
PPTX
Regulatory Reality Check: Improve trust, compliance and visibility with IoT a...
IBM Internet of Things
 
PDF
Bank In a Box - Cloud Prespective
Imran Iraqi, CISA,CISM,CRISC,CDCP
 
PDF
SCO - TIO Initiatives - WP
Imran Iraqi, CISA,CISM,CRISC,CDCP
 
DOCX
Real-world Applications of Streaming Analytics- StreamAnalytix Webinar
Impetus Technologies
 
PDF
Data monetization webinar
Karan Sachdeva
 
PDF
Construction Tech
Catalyst Investors
 
PPTX
With so many CMS Platforms available, who should you choose which one to use?...
MMT Digital
 
PDF
Big Data LDN 2018: SHAPING AN AI-DRIVEN FUTURE WITH AUGMENTED INTELLIGENCE FO...
Matt Stubbs
 
PDF
Big Data LDN 2018: DATA SCIENCE AT ING
Matt Stubbs
 
PPTX
How to do Secure Data Labeling for Machine Learning
Skyl.ai
 
PPTX
Getting Started in Big Data-Fueled E-Commerce
jradisson
 
PPT
IBM presentation
IBMIsrael
 
PDF
Manufacturing And Warehousing News — April 14 2014
accidentaltorpo90
 
PDF
BigMLSchool: ML Platforms and AutoML in the Enterprise
BigML, Inc
 
PDF
Data Natives Munich v 12.0 | "How to be more productive with Autonomous Data ...
Dataconomy Media
 
PDF
Top industry use cases for streaming analytics
IBM Analytics
 
Towards enterprise-ready AI deployments: Minimizing the risk of consuming AI ...
alekn
 
ROI Example
Philbo58
 
Benefit and Enablers of Deploying IoT Solution
Ashish Saxena
 
Seven things CIOs and software buyers should know about artificial intelligence
Andy Mura
 
Regulatory Reality Check: Improve trust, compliance and visibility with IoT a...
IBM Internet of Things
 
Bank In a Box - Cloud Prespective
Imran Iraqi, CISA,CISM,CRISC,CDCP
 
SCO - TIO Initiatives - WP
Imran Iraqi, CISA,CISM,CRISC,CDCP
 
Real-world Applications of Streaming Analytics- StreamAnalytix Webinar
Impetus Technologies
 
Data monetization webinar
Karan Sachdeva
 
Construction Tech
Catalyst Investors
 
With so many CMS Platforms available, who should you choose which one to use?...
MMT Digital
 
Big Data LDN 2018: SHAPING AN AI-DRIVEN FUTURE WITH AUGMENTED INTELLIGENCE FO...
Matt Stubbs
 
Big Data LDN 2018: DATA SCIENCE AT ING
Matt Stubbs
 
How to do Secure Data Labeling for Machine Learning
Skyl.ai
 
Getting Started in Big Data-Fueled E-Commerce
jradisson
 
IBM presentation
IBMIsrael
 
Manufacturing And Warehousing News — April 14 2014
accidentaltorpo90
 
BigMLSchool: ML Platforms and AutoML in the Enterprise
BigML, Inc
 
Data Natives Munich v 12.0 | "How to be more productive with Autonomous Data ...
Dataconomy Media
 
Top industry use cases for streaming analytics
IBM Analytics
 
Ad

Similar to ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance (20)

PDF
A Study in Borderless Over Perimeter
ForgeRock
 
PDF
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
Micro Focus
 
PDF
Tivi - Tunnistautuminen - 2020
Pete Nieminen
 
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
PPT
Identity Management: Risk Across The Enterprise
Perficient, Inc.
 
PPTX
March Boston Cloud Security Alliance Meetup
Identity Defined Security Alliance
 
PDF
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
PDF
Identity and Access Intelligence
Tim Bell
 
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
PPTX
Cybersecurity Leadership Forum - Cincinnati
Identity Defined Security Alliance
 
PPTX
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Khazret Sapenov
 
PDF
Enterprise Identity and Access Management Use Cases
WSO2
 
PDF
Understanding Identity and Access Management.pdf
jvinay0898
 
PDF
Why IAM is the Need of the Hour
Techdemocracy
 
PDF
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
PDF
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
PDF
Ten Years of Identity and Access Management_ Key Takeaways by Keith Brautigam...
Keith Brautigam
 
PPTX
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
PPTX
Anatomy of Modern Identity-Based Attacks
Francesco Faenzi
 
A Study in Borderless Over Perimeter
ForgeRock
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
Micro Focus
 
Tivi - Tunnistautuminen - 2020
Pete Nieminen
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
Identity Management: Risk Across The Enterprise
Perficient, Inc.
 
March Boston Cloud Security Alliance Meetup
Identity Defined Security Alliance
 
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
Identity and Access Intelligence
Tim Bell
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Cybersecurity Leadership Forum - Cincinnati
Identity Defined Security Alliance
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Khazret Sapenov
 
Enterprise Identity and Access Management Use Cases
WSO2
 
Understanding Identity and Access Management.pdf
jvinay0898
 
Why IAM is the Need of the Hour
Techdemocracy
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Ten Years of Identity and Access Management_ Key Takeaways by Keith Brautigam...
Keith Brautigam
 
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
Anatomy of Modern Identity-Based Attacks
Francesco Faenzi
 
Ad

More from BigML, Inc (20)

PDF
Digital Transformation and Process Optimization in Manufacturing
BigML, Inc
 
PDF
DutchMLSchool 2022 - Automation
BigML, Inc
 
PDF
DutchMLSchool 2022 - ML for AML Compliance
BigML, Inc
 
PDF
DutchMLSchool 2022 - Multi Perspective Anomalies
BigML, Inc
 
PDF
DutchMLSchool 2022 - My First Anomaly Detector
BigML, Inc
 
PDF
DutchMLSchool 2022 - Anomaly Detection
BigML, Inc
 
PDF
DutchMLSchool 2022 - History and Developments in ML
BigML, Inc
 
PDF
DutchMLSchool 2022 - End-to-End ML
BigML, Inc
 
PDF
DutchMLSchool 2022 - A Data-Driven Company
BigML, Inc
 
PDF
DutchMLSchool 2022 - ML in the Legal Sector
BigML, Inc
 
PDF
DutchMLSchool 2022 - Smart Safe Stadiums
BigML, Inc
 
PDF
DutchMLSchool 2022 - Process Optimization in Manufacturing Plants
BigML, Inc
 
PDF
DutchMLSchool 2022 - Anomaly Detection at Scale
BigML, Inc
 
PDF
DutchMLSchool 2022 - Citizen Development in AI
BigML, Inc
 
PDF
Democratizing Object Detection
BigML, Inc
 
PDF
BigML Release: Image Processing
BigML, Inc
 
PDF
Machine Learning in Retail: Know Your Customers' Customer. See Your Future
BigML, Inc
 
PDF
ML in GRC: Machine Learning in Legal Automation, How to Trust a Lawyerbot
BigML, Inc
 
PPTX
Intelligent Mobility: Embedded Machine Learning, Damage Detection in Rail
BigML, Inc
 
PDF
Intelligent Mobility: The Added Value of Predictions for Transport Delivery
BigML, Inc
 
Digital Transformation and Process Optimization in Manufacturing
BigML, Inc
 
DutchMLSchool 2022 - Automation
BigML, Inc
 
DutchMLSchool 2022 - ML for AML Compliance
BigML, Inc
 
DutchMLSchool 2022 - Multi Perspective Anomalies
BigML, Inc
 
DutchMLSchool 2022 - My First Anomaly Detector
BigML, Inc
 
DutchMLSchool 2022 - Anomaly Detection
BigML, Inc
 
DutchMLSchool 2022 - History and Developments in ML
BigML, Inc
 
DutchMLSchool 2022 - End-to-End ML
BigML, Inc
 
DutchMLSchool 2022 - A Data-Driven Company
BigML, Inc
 
DutchMLSchool 2022 - ML in the Legal Sector
BigML, Inc
 
DutchMLSchool 2022 - Smart Safe Stadiums
BigML, Inc
 
DutchMLSchool 2022 - Process Optimization in Manufacturing Plants
BigML, Inc
 
DutchMLSchool 2022 - Anomaly Detection at Scale
BigML, Inc
 
DutchMLSchool 2022 - Citizen Development in AI
BigML, Inc
 
Democratizing Object Detection
BigML, Inc
 
BigML Release: Image Processing
BigML, Inc
 
Machine Learning in Retail: Know Your Customers' Customer. See Your Future
BigML, Inc
 
ML in GRC: Machine Learning in Legal Automation, How to Trust a Lawyerbot
BigML, Inc
 
Intelligent Mobility: Embedded Machine Learning, Damage Detection in Rail
BigML, Inc
 
Intelligent Mobility: The Added Value of Predictions for Transport Delivery
BigML, Inc
 

Recently uploaded (20)

PDF
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
PPTX
Presentation (1) (1).pptx k8hhfftuiiigff
karthikjagath2005
 
PPTX
Introduction-to-Python-Programming-Language (1).pptx
dhyeysapariya
 
PPTX
Power BI in Business Intelligence with AI
KPR Institute of Engineering and Technology
 
PDF
717629748-Databricks-Certified-Data-Engineer-Professional-Dumps-by-Ball-21-03...
pedelli41
 
PPTX
short term internship project on Data visualization
JMJCollegeComputerde
 
PDF
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
PDF
WISE main accomplishments for ISQOLS award July 2025.pdf
StatsCommunications
 
PPTX
Web dev -ppt that helps us understand web technology
shubhragoyal12
 
PPTX
Probability systematic sampling methods.pptx
PrakashRajput19
 
PDF
oop_java (1) of ice or cse or eee ic.pdf
sabiquntoufiqlabonno
 
PDF
An Uncut Conversation With Grok | PDF Document
Mike Hydes
 
PDF
SUMMER INTERNSHIP REPORT[1] (AutoRecovered) (6) (1).pdf
pandeydiksha814
 
PPTX
Introduction to Data Analytics and Data Science
KavithaCIT
 
PDF
Key_Statistical_Techniques_in_Analytics_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Practical Measurement Systems Analysis (Gage R&R) for design
Rob Schubert
 
PPTX
Future_of_AI_Presentation for everyone.pptx
boranamanju07
 
PPTX
Data Security Breach: Immediate Action Plan
varmabhuvan266
 
PPTX
The whitetiger novel review for collegeassignment.pptx
DhruvPatel754154
 
PDF
The_Future_of_Data_Analytics_by_CA_Suvidha_Chaplot_UPDATED.pdf
CA Suvidha Chaplot
 
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
Presentation (1) (1).pptx k8hhfftuiiigff
karthikjagath2005
 
Introduction-to-Python-Programming-Language (1).pptx
dhyeysapariya
 
Power BI in Business Intelligence with AI
KPR Institute of Engineering and Technology
 
717629748-Databricks-Certified-Data-Engineer-Professional-Dumps-by-Ball-21-03...
pedelli41
 
short term internship project on Data visualization
JMJCollegeComputerde
 
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
WISE main accomplishments for ISQOLS award July 2025.pdf
StatsCommunications
 
Web dev -ppt that helps us understand web technology
shubhragoyal12
 
Probability systematic sampling methods.pptx
PrakashRajput19
 
oop_java (1) of ice or cse or eee ic.pdf
sabiquntoufiqlabonno
 
An Uncut Conversation With Grok | PDF Document
Mike Hydes
 
SUMMER INTERNSHIP REPORT[1] (AutoRecovered) (6) (1).pdf
pandeydiksha814
 
Introduction to Data Analytics and Data Science
KavithaCIT
 
Key_Statistical_Techniques_in_Analytics_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Practical Measurement Systems Analysis (Gage R&R) for design
Rob Schubert
 
Future_of_AI_Presentation for everyone.pptx
boranamanju07
 
Data Security Breach: Immediate Action Plan
varmabhuvan266
 
The whitetiger novel review for collegeassignment.pptx
DhruvPatel754154
 
The_Future_of_Data_Analytics_by_CA_Suvidha_Chaplot_UPDATED.pdf
CA Suvidha Chaplot
 

ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance

  • 1. MyVayda™ & An Identity Risk and Cost Optimization Platform Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.
  • 2. Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Today’s Identity owners are assessing the following IAM Investments Shifting Legacy or home grown IAM to a next gen “OTB” commercial model Effectiveness of controls and auditability within mature IAM deployments With Next Gen IAM, companies are assessing The ease of audit and near real time risk-based analysis System scalability to manage access needs for a growing volume of access points and devices Leveraging these systems to better provide insights for first line of defense systems within security When the wall protecting data -Vanishes Employees access data, on any “thing” and this data moves between traditional, hybrid and cloud environments § The function of Identity has been evolving from defense and control to enablement Mobility |Cloud |Social Networks Image: Global Identity and Access Management (IAM) Market
  • 3. Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Link to Identity Every business transaction, attack surface or target involves a credential and a service or piece of data. These identities are targets… Individuals Shared Accounts End Users and Privileged Accounts Largest target of phishing attempts due to account sprawl and reuse of passwords. While relatively low in number because focus on their lack of accountability, these accounts still do exist and require additional scrutiny. Machine Identities An often overlooked identity and becoming increasingly prevalent with IOT. Big focus on digital keys and certificates. Service Accounts Default accounts allowing for standard transactions. ~50% of accounts. APIs fall into this category as they use service accounts. Fun facts …. 20% have never changed the default password and 73% fail to audit, remove, or modify default accounts in prod.
  • 4. Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Yet we continue to spend like the model still works. More and more, we see departments and users operating and storing data outside the wall. Attack Surfaces are Changing
  • 5. Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Network 61% Endpoint 19% Web 12% Email 8% Security Spend Source: Gartner Information Security (2019 forecast) Source: 2019 Verizon Data Breach Investigation Report 93% of breaches are targeting people… 94% of those via e-mail Threat Vectors are Changing Are we targeting the right thing? Requires an identity-centric approach to threat management. And while we continue to spend like this …. …. attacks are targeted here.
  • 6. Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Risk, Compliance and Governance are Changing Reporting, Analysis and Remediation done in silos…. …. Need to become more unified and share common table talk sessions especially with leadership and the board of director Move from a checklist to understanding business risk and operational impact. Understand how audit, regulations and privacy requirements tie to legal and operations Identities and system personas are key gateways for attackers to hobble an enterprise Have a single source or unified agnostic system that can interact and glean insights from disparate systems
  • 7. Copyright ©2020 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Identity Optimization with Next Gen Tech Standardization of Ecosystem Allows to evolve with industry standards & regulatory requirements at the same time it should be cost effective Consolidation of legacy applications(end- of-life) performing similar IAM Functions will promote reuse of IAM functions Adopting to strategic cloud capability of IAM function Adopting to market leading IAM function and capabilities –Identity as a service(IDaaS) Productive Provisioning Automation in Provisioning and De-Provisioning Reduce the risk by reducing manual process and decreasing number of elevated rights of security admin teams Automated provisioning and de- provisioning speed the enforcement of strong security policies while helping to eliminate human error End to End Reconciliation Effective audit reporting Reduce SOX Deficiencies and Audit Findings Mapping to Privacy and Risk Management One Stop Platform Improved User Experience by Implementing single point of collection and fulfilment for access administration & Identity Portal
  • 8. Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Analytics + ML with a Single Pane of Glass Detective Controls Apply an identity-specific approach to incident prioritization, analysis, response and remediation Observe the interactions between entities. Based on the behavioral interactions between identities and accessed resources or assets, dynamically determine each identity’s level of privilege. Entities with similar access patterns are grouped as peers. Often performed leveraging artificial intelligence and machine learning models. Determine abnormalities of interactions between privileged identities. Compare a given access request to the access history to determine similarity with prior access. Focus on the differences that have security implications and consequences. Assign aggregated risk score to those identities based on action and context to drive prioritization. Pivoting to usage patterns + behaviors + integrated systems and not just static access. Static Access can be compromised… Maps to IT Audit & Regulatory Compliance Requirements
  • 9. ĂĽ How can I identity the most critical areas to spend on cyber technologies? ĂĽ How does our cyber exposure impact the business? ĂĽ What do you spend on cyber & risk management? ĂĽ What is the ROI on cyber & technology spend? ĂĽ What Next-Gen technology investment results in maximum risk optimization? ĂĽ Can we quantify the business impact of our cyber threat and risk exposure, across silos? ĂĽ What prioritizes risk buydown? MyVayda™ Risk Impact + TCO Modules CFO ĂĽ Does Cyber Insurance address our risk profile? ĂĽ Does your technology architecture pose challenges that increase costs? MyVayda™ - Connecting the Questions you face … … with the Insights you need Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. MyVayda Business Enablers
  • 10. Leveraging BigML Machine Learning Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. How MyVayda™ Works MyVayda’s works across Platforms and is Tool Agnostic. Custom connectors pulls or pushes feeds from endpoint solutions. RADIATE couple with BigML’s Machine Learning Algorithms assesses, categorizes, structures and aligns raw data for analysis and alignment to regulatory requirements. MyVayda provides management capabilities for Identity Behavior and Pattern Analysis, calculates compound risk analysis across infrastructure technologies and also assesses risk impact and remediation costs. Focused on: -Compound Risk Management, leveraging Identity Analytics. -Identity Fraud & -Cost Optimization. Identity Behavior & Pattern Analysis (IBPA)
  • 11. MyVayda System Modules Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Increased operational efficiencies Contextualized decision making for access authorizations Identification / Containment of threat User Actions (Continuous Profiling and Alerting) Risk Awareness (Integrated Security & Business teams) User Access (Continuous Control and Remdiation) Compound Risk Calculations Behavioral Analytics driven Indicators of Compromise Dynamic Discovery of associations between user authorizations Identity & Authentication Systems Business Application Audit Events Gateway Device Events Continuous compliance & Improved productivity Quantification & Prioritization of cyber risks Measuring & Improving Cybersecurity ROI Assets & Vulnerability Systems Clustered Analysis of roles, entitlements & attributes Simulated estimates of cyber risk value Anomaly Detection of outliers in usser actions System Sources MyVayda Modularized Features Outcomes Identity Trust Security & Analytics Risk Meter & TCO
  • 12. MyVayda System Modules Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved. Identity Trust User Access Cost User Actions Risk Aware Access Risk Indicators to enable Intelligent Access Assignments Security & Analytics Visibility into Threat Vectors in a Hybrid ecosystem Baseline of potential cyber loss for identified indicators of exposure Risk Meter TCO Estimate of business value at risks based on expected regulatory fines Clustered Analysis of roles, entitlements & attributes Behavioral Analytics driven Indicators of Compromise Compounded risk calculations Simulated estimates of cyber risk value
  • 13. Value Add from MyVayda Presents a Unified Operating View around Risk Management for People, Processes and Technologies –leveraging implemented technologies Leverages ML and proprietary analytics to provide centralized reporting and actionable insights for executive stakeholders § Optimizes reporting for Cybersecurity and Risk Management remediation. § Enable and Arm ERM leaders with impactful risk reporting, for executive strategic decisions around budgeting, transformation and daily operations § Reduces staffing requirements and costs, both in headcount and skills and map skills training based on analytics on system usage § Reduces cost of Audit Remediation § Increase focus on standardizing operations and error reduction with around tools, platforms, systems and people skills VALUE CAPABILITIES An organizational focus on identity, technology and cost optimization, and compound risk …. … to accelerate valuable insight and impactful decisions. Copyright ©2021 ForenSec, Inc. | Privileged and Confidential. All rightsreserved.