You are on page 1of 48

Identity is the

new perimeter

Mark Wilson, Identity Lead

Unclassified © 2019 FUJITSU


Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 2 © 2019 FUJITSU


What is Identity…business

Credential Credential

Credential

Credential

On-Premise Active Directory


Credential Database

Credential

Credential

Credential

Credential

Applications
Cloud Apps Credential

Credential

1 Person – Many Identities…. Credential

Unclassified 3 © 2019 FUJITSU


Unclassified 4 © 2019 FUJITSU
What is Identity…personal

Unclassified 5 © 2019 FUJITSU


What is Identity? It’s you, me and….IOT!

Unclassified 6 © 2019 FUJITSU


Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 7 © 2019 FUJITSU


Credential stuffing

Unclassified 8 © 2019 FUJITSU


Credential stuffing

Unclassified 9 © 2019 FUJITSU


Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 10 © 2019 FUJITSU


Attacks and Breaches involving Identities are growing exponentially

350k Users Affected As yet undisclosed

87 Million Records 150 Million Records


3.6 Billion Records Exposed in 2018
Unclassified 11 © 2019 FUJITSU
Verizon Data Breach Report 2019

% Credentials Compromised
Professional, Technical & Scientific Services
Retail
Manufacturing
Public Administration
Information
Healthcare
Educational Services
Financial & Insurance 38%
Accomodation & Food Services

0 10 20 30 40 50 60

Privilege Misuse is top 3 Patterns of attack

Unclassified 12 © 2019 FUJITSU


Malware as a Service

Unclassified 13 © 2019 FUJITSU


1992

Unclassified 14 © 2019 FUJITSU


200
Per Month

Unclassified 15 © 2019 FUJITSU


Today

Unclassified 16 © 2019 FUJITSU


400,000
Per Day

Unclassified 17 © 2019 FUJITSU


Unclassified 18 © 2019 FUJITSU
Unclassified 19 © 2019 FUJITSU
Unclassified 20 © 2019 FUJITSU
Unclassified 21 © 2019 FUJITSU
Unclassified 22 © 2019 FUJITSU
Unclassified 23 © 2019 FUJITSU
Unclassified 24 © 2019 FUJITSU
Unclassified 25 © 2019 FUJITSU
DNA of ‘Lateral Movement’ malware

Hijacked HR Data Customer Data


Credential

Logged In Cached
Credential Privileged Credential
Hijacked
Credential

Business Data

Logged In Logged In Logged In


Credential Credential Privileged Credential

Unclassified 26 © 2019 FUJITSU


Credentials – Identities are the key

Hijacked HR Data Customer Data


Credential
Exfiltrated
Cached
Privileged Credential
Hijacked
Credential

Business Data
Credential
Data
Breach
Logged In Logged In Logged In
Credential Credential Privileged Credential

Unclassified 27 © 2019 FUJITSU


Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 28 © 2019 FUJITSU


Unclassified 29 © 2019 FUJITSU
Unclassified 30 © 2019 FUJITSU
Insider Threat

Unclassified 31 © 2019 FUJITSU


The new perimeter

Cloud Data Centres


(IaaS / PaaS)

Network
Security Appliance
Locations Users Cloud Apps
Locations Users (SaaS)

Data Centre
Data Centre

Designed for this Not for this


Clear Network Perimeter Dissolving Network Perimeter

Mobile Users

Unclassified 32 © 2019 FUJITSU


Unclassified 33 © 2019 FUJITSU
Unclassified 34 © 2019 FUJITSU
Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 35 © 2019 FUJITSU


Digital Transformation & Increase in Attack Surface

Unclassified 36 © 2019 FUJITSU


Security budget – People or Technology

Risk Mitigation Costs


Where most of the
Control Types industry is focussed

Control Approaches

Unclassified 37 © 2019 FUJITSU


Security Budget – People or Technology?
Average Cyber Security Analyst Number of Cyber Security Analysts Average Hours Per week
salary in 5yrs to be employed in 5 years

$118k 143k 42
Costing the Industry $17 Billion per year

2 Hours/week saved by using AI/Automation (5%) could 16 Hours/week saved by using AI/Automation (39%) could
save save

$1 Billion $7 Billion
Source: Bureau Of Labor & Statistics

Unclassified 38 © 2019 FUJITSU


Move to the cloud needs a different approach

“I cannot afford to be flat-


footed at the moment
when the public cloud is
safe and secure, which it
will be.”
Chief Operations and Technology Officer of $94 billion Bank of America, Cathy Bessant

Unclassified 39 © 2019 FUJITSU


Need for consolidation

Enterprises can’t keep CYBERscape: The Cybersecurity Landscape

pace with the rate of


change

Traditional approach to
security won’t scale for
enterprises or address
todays challenges

Unclassified 40 © 2019 FUJITSU


“if you always do what you
always did, you will always
get what you got”

“insanity is doing the same


thing over and over again
and expecting a different
result”
Unclassified 41 © 2019 FUJITSU
Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 42 © 2019 FUJITSU


Zero Trust

Is nothing new
Is not a product ‘thing’
Is Principle of Least Privilege (PoLP) – the foundation of Identity Management

0 Right Right Right Right


Person Access Data Time

Unclassified 43 © 2019 FUJITSU


Identity is the new perimeter

 What is Identity

 Personal and Business Identity boundaries blurred

 Identity and the threat landscape

 Identity. The new perimeter

 Identity and digital transformation

 Identity and Zero-Trust

 Identity Management 101

Unclassified 44 © 2019 FUJITSU


Identity Management 101

Connectors Workflow & Process Lifecycle Management Data Owners

Certification / Attestation SSO Password Management Virtual Directory

Privilege Access Management Multi-Factor Authentication Automation

Unclassified 45 © 2019 FUJITSU


We believe that identity is the cornerstone of security
providing a foundation for all application access,
data access, technical controls and policy.

Unclassified 46 © 2019 FUJITSU


Up next…
15.30 – 16.15
Breakout Session 3 or a visit to the Demo Center

Unclassified © 2019 FUJITSU


Fujitsu Sans Light – abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?\| ©¨~¡¢¤¥¦§¨ª«»¬-
®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûü
ýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl
Fujitsu Sans – abcdefghijklmnopqrstuvwxyz 0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?\|
©¨~¡¢¤¥¦§¨ª«»¬-
®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúû
üýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl
Fujitsu Sans Medium – abcdefghijklmnopqrstuvwxyz 0123456789 ¬!”£$%^&*()_+-
=[]{};’#:@~,./<>?\| ©¨~¡¢¤¥¦§¨ª«»¬-
®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùú
ûüýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—
―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl

Unclassified 48 © 2019 FUJITSU

You might also like