SlideShare a Scribd company logo
1 of 40
Building Your Roadmap:  Successful Identity and Access Management (IAM)
What are the CXO’s telling us? “ It’s too expensive and manual to make sure we’re addressing all the necessary regulations. And then we have to do it all over again for the next time.” Continuous Compliance Escalating Administration Costs Ghost User  Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
What are the CXO’s telling us? “ 25% of my  help desk calls are related to resetting forgotten passwords!” Continuous Compliance Escalating Administration Costs Ghost User  Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help   Desk   Overload
What are the CXO’s telling us? “ There is just no budget to hire more IT administrators, but our user population is growing, particularly as we bring more customers/partners online.” Continuous Compliance Escalating   Administration   Costs Ghost User  Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
What are the CXO’s telling us? “ I still have accounts in my systems for users that are long gone!” Continuous Compliance Escalating Administration Costs Ghost   User   Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
What are the CXO’s telling us? “ As employees and partners change responsibilities they keep acquiring new system privileges with us while none are removed. How do I fix that?” Continuous Compliance Escalating Administration Costs Ghost User  Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating &   Inappropriate   Privileges Help Desk Overload
What are the CXO’s telling us? “ Internal and external auditors need to see if you have sufficient control over your IT systems and access to private data. Auditors don’t care generally how much it costs.” Continuous Compliance Escalating Administration Costs Ghost User  Accounts Auditors ’  Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
What are the CXO’s telling us? “ Enterprise  architects hate to see the IT ‘wheel’ continually reinvented. IAM should be employed and managed as part  of enterprise architecture.” Continuous Compliance Escalating Administration Costs Ghost User  Accounts Auditors’ Requirements Leverage-able   It   Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
What are the CXO’s telling us? “ I don’t  want to see my organization in the news.” Continuous Compliance Escalating Administration Costs Ghost User  Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative   Security-Related   Publicity Accumulating & Inappropriate Privileges Help Desk Overload
The Essence of Business Doing More  with Less   is no longer a temporary  economic issue –   it is here to stay. LESS BUDGET LESS STAFF SHORTER SCHEDULE REDUCE COSTS COSTS TIME MORE USERS  MORE ACCESS MORE FLEXIBILITY MORE APPS MORE PARTNERS MUCH FASTER USERS TRANSACTIONS COMPETITIVE EDGE CONDUCT BUSINESS
Definition of Identity & Access Management (IAM) ,[object Object],Who’s there?  What can they do? What do they need? How do you  manage them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise IT Management Security Management IAM
Before… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NEW USER 1.  HR Request  for Access 2. Manager Request for Access 3. Policy Examination And Approval IT 4.  Policy Examination And Approval Administration 5. Return for Corrections 6. Submit Revised Request 7. Revised Policy Examination And IT Approval 8. Revised Policy Examination And Approval Administration 9. Identified Exception 10. Exception Approval Granted 11. Approval Granted UNSATISFIED NEW USER 12. Applications Set Up 13. IT Set Up 14. Keeping Audit Trail
…And After NEW USER 3. Policy Examination Approval And Execution 2. Manager Request For Access 1. HR Request For Access SATISFIED NEW USER ,[object Object],[object Object],[object Object]
Employment Life Cycle What is the Cost of Quarterly Reorganization? ACCESS & TRANSACTIONS MANAGEMENT Hire Promotion Relocation Team Project Departure
IAM Business Drivers –  The Complete Picture Increasing Efficiency Complying With Regulation Increasing Security Enabling Business
Exercise –  Identify Your Business Drivers Move your current provisioning toward “Phase 2” Improve Enterprise Services, SOA & IAM integration Manage information risks Integrate enterprise security apps Increase customer and partner satisfaction Manage user life-cycle more effectively Increase IT productivity Secure company data Enable Web services Streamline business processes Reduce cost of IT resources Increase user satisfaction Comply with security regulations Weighted Average (Totaling 100%) Business Driver
Business Benefits of IAM Functionality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Single Sign-On Registration & Enrollment Authentication & Authorization Information Consolidation
Business Benefits of IAM Functionality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Provisioning & Federated Identity Audit Delegated Administration & Self-Services Password Management
Business Impact of IAM Functionality ESA  Support Provisioning & Federated Identity User Satisfaction Audit Delegated Administration & Self-Service Password Management Single Sign-On Registration & Enrollment Authentication and Authorization Information Consolidation Regulatory Compliance Risk Management Operational Efficiency Cost Containment Business Facilitation
[object Object],[object Object],[object Object],[object Object],Key Questions Every Organization Must Consider ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Key Questions Every Organization Must Consider  CONTINUED ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],The Price of Doing Nothing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],The Price of Doing Nothing David Piscitello, Network World, 08/28/06
[object Object],[object Object],[object Object],[object Object],[object Object],Financial Drivers –  Challenges ,[object Object],[object Object],[object Object],[object Object]
Return-On-Negligence (RON) on IAM  Avoidance - Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RON for Typical Identity Management Tool –  Basic Input 1920 Number of Work Hours Per Year  $90,850 Average Fully-Burdened Employee Salary (Salary + 15%) $90,850 Annual Fully-Burdened Salary for IT Staff Member (Salary +15%) 15% Rate of Moves, Adds and Changes (MACs) 10% Turnover rate per year (% of users) 10% Rate of growth per year (% of users) 10,000 Number of External Users (partners and customers) 3,000 Number of Internal Users (employees) Company Details
RON for Identity Management –  Industry Standard Assumptions 14 Number of Hours From Request Through Resolution for Moves/Changes (MACs) 10 Number of Hours From Request Through Resolution (for New Account) 0.75 Number of Hours to Delete Obsolete User 1 Number of Hours to Handle Moves, Changes (MACs) 3 Number of Hours to Set up a New User   Assumptions
RON for Single Sign-On –  Basic Assumptions 1920 Number of Work Hours Per Year  $69,000 Average Fully-Burden Employee Salary (Salary + 15%) $90,850 Annual Fully-Burden Salary for IT Staff Member (Salary +15%) 4 Average Number of Accounts per Internal User (Employee) 3,000 Number of Internal Users (employees) Company Details
RON for Single Sign-On –  Industry Standard Assumptions 10.0 Average Length of Help Desk Call (Minutes) 2 Average Time to Trial and Error Forgotten Password Per User (minutes) 80% Average % of Incorrect Logins to be Solved by Trial and Error 10% Average % of Total Logins that Are Incorrect Out of Total Logins 0.50 Time Spent to Login to a Single Account (Minutes)   Assumptions
RON for Single Sign-On –  Avoidance Impact Results Calculations $485,156 Potential Lost Productivity (Due to Trial & Error) Costs Avoidance Related to SSO 75% % Lost User Productivity Cost Savings Provided by Single Sign-On $646,875 Total Cost of Lost Productivity (Due to Trial & Error of Forgotten Password) 3 Time Spent on Help Desk Calls Per User Per Year (hours) 3 Time Spent on Trial & Error Per User Per Year (hours) 20 Total Number of Incorrect Logins Solved by Help Desk Assistance Per User 80 Total Number of Incorrect Logins Solved by Trial & Error per User 100 Total Number of Incorrect Logins Per User Per Year Lost User Productivity Cost Due to Trial & Error of Forgotten Password $673,828 Potential Lost Productivity Costs Avoidance Related to SSO 75% % Lost User Productivity Cost Savings Provided by Single Sign-On $898,438 Cost of Lost Productivity (Due to Multiple Login Sessions) $36 Hourly Cost of Typical Employee 8 Number of Hours Spent on Login Sessions Per Internal User Per Year 1,000 Login Sessions Per User Per Year Lost User Productivity Cost Due to Multiple Login Sessions
RON for Web Access –  Basic Input 1920 Number of Work Hours Per Year  $90,850 Annual Fully-Burdened Salary for IT Staff Member (Salary +15%) 10 Number of Security Audits Per Year 15 Number of New Extranet Applications Per Year 10% Turnover Rate Per Year (% of users) 10% Rate of Growth per Year (% of users) 10,000 Number of External Users (partners and customers) Company Details
RON for Web Access –  Industry Standard Assumptions 2 Average Number of Downtime Hours Per Year (Due to Security Breach) $30,000 Average Application Downtime Cost Per Hour (Due to Security Breach) 10.0 Average Length of Help Desk Call (Minutes) 30% Average % Help Desk Activity Related to Passwords 11 Average Number of Help Desk Calls Per User per Year $4,000  Average Cost of Security Audit $12,000 Average Access Control Development Cost Per Extranet/intranet Application   Assumptions
RON for Avoidance Impact –  Web Access $20,000 Potential Security Audits Costs Avoidance Related to Web Access Control 50% % Security Audits Cost Savings Provided by Web Access Control $40,000 Cost of Security Audits per Year Cost of Security Audits per Year $135,000 Potential Application Development Costs Avoidance Related to Web Access Control 75% % Application Development Cost Savings Provided by Web Access Control $180,000 Cost of Hard-Coding Access Control Cost of Application Development Time Associated with Access Control Results Calculations
RON for Avoidance Impact –  Web Access   CONTINUED $380,186 Total Potential for Cost Avoidance Related to Web Access Control $30,000 Potential Downtime Costs Avoidance Related to Web Access Control 50% % Downtime Cost Savings Provided by Web Access Control $60,000 Cost of Downtime Cost of Downtime Due to Attacks Caused by Unauthorized Access $195,186 Potential Extranets Help Desk Costs Avoidance Related to Web Access Control 75% % Extranets Help Desk Cost Savings Provided by Web Access Control $260,247 Cost of Help Desk Related to Extranets $47 Cost of IT Labor Per Hour 5,500 Total Time Spent by Help Desk staff on Passwords Related Calls Per Year (Hours) 33,000 Number of Help Desk Calls Related to Passwords Per Year 110,000 Number of Help Desk Calls Per Year Cost of Help-Desk (not using Self-Registration and Self-Service) Results Calculations
RON for Identity Management –  Avoidance Impact $290,649 Potential IT Cost Avoidance Related to User Provisioning 90% % IT Cost Savings Provided by User Provisioning $322,943 Annual Cost of User Account Management by IT $47 Cost of IT Labor Per Hour 6825 Total Time Spent Annually on User Account Management (Hours) 1300 Number of Account Terminations Per Year  1950 Number of MACs per Year 1300 Number of New Users Per Year User Account Management Cost 
RON for Identity Management –  Avoidance Impact   CONTINUED $510,676 Total Potential for Cost Avoidance Related to Admin $220,027 Potential Lost Productivity Cost Avoidance Related to User Provisioning 50% % Lost User Productivity Cost Savings Provided by User Provisioning $440,055 Total Lost Productivity Costs Per Year (Due to Account Management) $298,102 Cost of Lost Productivity For Existing Employees $141,953 Cost of Lost Productivity For New Employees $47 Hourly Cost of Typical Employee 450 Number of MACs per Year for Internal Users (Existing Employees) 300 Number of New Internal Users/Employees Per Year Lost User Productivity (Due to Account Management) Cost
Exercise –  Building Your Own Financial Plan Estimates for your organization Where do I get the numbers from? Industry standard figures Rank financial drivers criteria by organizational  importance
Tip for Consideration ,[object Object]
Pitfalls to Avoid ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One Last Word … ,[object Object],The longest journey starts with a single step.

More Related Content

What's hot

Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access ManagementLance Peterman
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity managementNis
 

What's hot (20)

Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 

Similar to Building Your Roadmap Sucessful Identity And Access Management

How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsIvanti
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
IBM - Understanding the value of ECM
IBM - Understanding the value of ECMIBM - Understanding the value of ECM
IBM - Understanding the value of ECMrashmin_cby
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service CloudRoss Bauer
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...Jean-François LOMBARDO
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementChristian Sundell
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS OnboardingJerry Jermann
 
I T E008 Bezar 091907
I T E008  Bezar 091907I T E008  Bezar 091907
I T E008 Bezar 091907Dreamforce07
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldForte Advisory, Inc.
 
BMC BSM - Automate Service Management System
BMC BSM - Automate Service Management SystemBMC BSM - Automate Service Management System
BMC BSM - Automate Service Management SystemVyom Labs
 

Similar to Building Your Roadmap Sucessful Identity And Access Management (20)

How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
IBM - Understanding the value of ECM
IBM - Understanding the value of ECMIBM - Understanding the value of ECM
IBM - Understanding the value of ECM
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
 
Soa4 Smb Ci
Soa4 Smb CiSoa4 Smb Ci
Soa4 Smb Ci
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement Management
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS Onboarding
 
I T E008 Bezar 091907
I T E008  Bezar 091907I T E008  Bezar 091907
I T E008 Bezar 091907
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
New Trends in Healthcare IT
New Trends in Healthcare ITNew Trends in Healthcare IT
New Trends in Healthcare IT
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
BMC BSM - Automate Service Management System
BMC BSM - Automate Service Management SystemBMC BSM - Automate Service Management System
BMC BSM - Automate Service Management System
 

More from Government Technology Exhibition and Conference

More from Government Technology Exhibition and Conference (20)

Canada School of Public Service
Canada School of Public ServiceCanada School of Public Service
Canada School of Public Service
 
Working In Canada Tool
Working In Canada ToolWorking In Canada Tool
Working In Canada Tool
 
The Impact Of e- Discovery On The CIO
The Impact Of e- Discovery On The CIOThe Impact Of e- Discovery On The CIO
The Impact Of e- Discovery On The CIO
 
Public Sector Modernizaton And Security
Public Sector Modernizaton And SecurityPublic Sector Modernizaton And Security
Public Sector Modernizaton And Security
 
Rendering Enterprise Content Management Strategies Operational
Rendering Enterprise Content Management Strategies OperationalRendering Enterprise Content Management Strategies Operational
Rendering Enterprise Content Management Strategies Operational
 
Alberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control FrameworkAlberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control Framework
 
Developing A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care OganizationsDeveloping A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care Oganizations
 
Itss Continuing The Journey
Itss Continuing The JourneyItss Continuing The Journey
Itss Continuing The Journey
 
Architecture d’entreprise axée sur la collaboration pour le gouvernement du C...
Architecture d’entreprise axée sur la collaboration pour le gouvernement du C...Architecture d’entreprise axée sur la collaboration pour le gouvernement du C...
Architecture d’entreprise axée sur la collaboration pour le gouvernement du C...
 
Beyond Functional Contribution Work And Productivity In The Emerging Web 2.0 ...
Beyond Functional Contribution Work And Productivity In The Emerging Web 2.0 ...Beyond Functional Contribution Work And Productivity In The Emerging Web 2.0 ...
Beyond Functional Contribution Work And Productivity In The Emerging Web 2.0 ...
 
Wireless Technology Changes The Way Government Works
Wireless Technology Changes The Way Government WorksWireless Technology Changes The Way Government Works
Wireless Technology Changes The Way Government Works
 
Collaboration Enterprise Architecture
Collaboration Enterprise ArchitectureCollaboration Enterprise Architecture
Collaboration Enterprise Architecture
 
Shared Services In Government A Model For The Web
Shared Services In Government   A Model For The WebShared Services In Government   A Model For The Web
Shared Services In Government A Model For The Web
 
Wirelss Technology Changes The Way Government Works
Wirelss Technology Changes The Way Government WorksWirelss Technology Changes The Way Government Works
Wirelss Technology Changes The Way Government Works
 
NORrad PACS Program Northern Radiology – Picture Archive Communication System
NORrad PACS Program Northern Radiology – Picture Archive Communication SystemNORrad PACS Program Northern Radiology – Picture Archive Communication System
NORrad PACS Program Northern Radiology – Picture Archive Communication System
 
PRESTO Complex Program Management
PRESTO Complex Program ManagementPRESTO Complex Program Management
PRESTO Complex Program Management
 
A Network of Networks
A Network of NetworksA Network of Networks
A Network of Networks
 
New Technologies (‘Web 2.0’) and GC Communications
New Technologies (‘Web 2.0’) and GC CommunicationsNew Technologies (‘Web 2.0’) and GC Communications
New Technologies (‘Web 2.0’) and GC Communications
 
Bill Eggers - Innovation In Government
Bill Eggers - Innovation In GovernmentBill Eggers - Innovation In Government
Bill Eggers - Innovation In Government
 
Ken Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the FutureKen Cochrane - Reading the Signals and Preparing for the Future
Ken Cochrane - Reading the Signals and Preparing for the Future
 

Recently uploaded

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Building Your Roadmap Sucessful Identity And Access Management

  • 1. Building Your Roadmap: Successful Identity and Access Management (IAM)
  • 2. What are the CXO’s telling us? “ It’s too expensive and manual to make sure we’re addressing all the necessary regulations. And then we have to do it all over again for the next time.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 3. What are the CXO’s telling us? “ 25% of my help desk calls are related to resetting forgotten passwords!” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 4. What are the CXO’s telling us? “ There is just no budget to hire more IT administrators, but our user population is growing, particularly as we bring more customers/partners online.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 5. What are the CXO’s telling us? “ I still have accounts in my systems for users that are long gone!” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 6. What are the CXO’s telling us? “ As employees and partners change responsibilities they keep acquiring new system privileges with us while none are removed. How do I fix that?” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 7. What are the CXO’s telling us? “ Internal and external auditors need to see if you have sufficient control over your IT systems and access to private data. Auditors don’t care generally how much it costs.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors ’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 8. What are the CXO’s telling us? “ Enterprise architects hate to see the IT ‘wheel’ continually reinvented. IAM should be employed and managed as part of enterprise architecture.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 9. What are the CXO’s telling us? “ I don’t want to see my organization in the news.” Continuous Compliance Escalating Administration Costs Ghost User Accounts Auditors’ Requirements Leverage-able It Infrastructure Negative Security-Related Publicity Accumulating & Inappropriate Privileges Help Desk Overload
  • 10. The Essence of Business Doing More with Less is no longer a temporary economic issue – it is here to stay. LESS BUDGET LESS STAFF SHORTER SCHEDULE REDUCE COSTS COSTS TIME MORE USERS MORE ACCESS MORE FLEXIBILITY MORE APPS MORE PARTNERS MUCH FASTER USERS TRANSACTIONS COMPETITIVE EDGE CONDUCT BUSINESS
  • 11.
  • 12.
  • 13.
  • 14. Employment Life Cycle What is the Cost of Quarterly Reorganization? ACCESS & TRANSACTIONS MANAGEMENT Hire Promotion Relocation Team Project Departure
  • 15. IAM Business Drivers – The Complete Picture Increasing Efficiency Complying With Regulation Increasing Security Enabling Business
  • 16. Exercise – Identify Your Business Drivers Move your current provisioning toward “Phase 2” Improve Enterprise Services, SOA & IAM integration Manage information risks Integrate enterprise security apps Increase customer and partner satisfaction Manage user life-cycle more effectively Increase IT productivity Secure company data Enable Web services Streamline business processes Reduce cost of IT resources Increase user satisfaction Comply with security regulations Weighted Average (Totaling 100%) Business Driver
  • 17.
  • 18.
  • 19. Business Impact of IAM Functionality ESA Support Provisioning & Federated Identity User Satisfaction Audit Delegated Administration & Self-Service Password Management Single Sign-On Registration & Enrollment Authentication and Authorization Information Consolidation Regulatory Compliance Risk Management Operational Efficiency Cost Containment Business Facilitation
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. RON for Typical Identity Management Tool – Basic Input 1920 Number of Work Hours Per Year $90,850 Average Fully-Burdened Employee Salary (Salary + 15%) $90,850 Annual Fully-Burdened Salary for IT Staff Member (Salary +15%) 15% Rate of Moves, Adds and Changes (MACs) 10% Turnover rate per year (% of users) 10% Rate of growth per year (% of users) 10,000 Number of External Users (partners and customers) 3,000 Number of Internal Users (employees) Company Details
  • 27. RON for Identity Management – Industry Standard Assumptions 14 Number of Hours From Request Through Resolution for Moves/Changes (MACs) 10 Number of Hours From Request Through Resolution (for New Account) 0.75 Number of Hours to Delete Obsolete User 1 Number of Hours to Handle Moves, Changes (MACs) 3 Number of Hours to Set up a New User   Assumptions
  • 28. RON for Single Sign-On – Basic Assumptions 1920 Number of Work Hours Per Year $69,000 Average Fully-Burden Employee Salary (Salary + 15%) $90,850 Annual Fully-Burden Salary for IT Staff Member (Salary +15%) 4 Average Number of Accounts per Internal User (Employee) 3,000 Number of Internal Users (employees) Company Details
  • 29. RON for Single Sign-On – Industry Standard Assumptions 10.0 Average Length of Help Desk Call (Minutes) 2 Average Time to Trial and Error Forgotten Password Per User (minutes) 80% Average % of Incorrect Logins to be Solved by Trial and Error 10% Average % of Total Logins that Are Incorrect Out of Total Logins 0.50 Time Spent to Login to a Single Account (Minutes)   Assumptions
  • 30. RON for Single Sign-On – Avoidance Impact Results Calculations $485,156 Potential Lost Productivity (Due to Trial & Error) Costs Avoidance Related to SSO 75% % Lost User Productivity Cost Savings Provided by Single Sign-On $646,875 Total Cost of Lost Productivity (Due to Trial & Error of Forgotten Password) 3 Time Spent on Help Desk Calls Per User Per Year (hours) 3 Time Spent on Trial & Error Per User Per Year (hours) 20 Total Number of Incorrect Logins Solved by Help Desk Assistance Per User 80 Total Number of Incorrect Logins Solved by Trial & Error per User 100 Total Number of Incorrect Logins Per User Per Year Lost User Productivity Cost Due to Trial & Error of Forgotten Password $673,828 Potential Lost Productivity Costs Avoidance Related to SSO 75% % Lost User Productivity Cost Savings Provided by Single Sign-On $898,438 Cost of Lost Productivity (Due to Multiple Login Sessions) $36 Hourly Cost of Typical Employee 8 Number of Hours Spent on Login Sessions Per Internal User Per Year 1,000 Login Sessions Per User Per Year Lost User Productivity Cost Due to Multiple Login Sessions
  • 31. RON for Web Access – Basic Input 1920 Number of Work Hours Per Year $90,850 Annual Fully-Burdened Salary for IT Staff Member (Salary +15%) 10 Number of Security Audits Per Year 15 Number of New Extranet Applications Per Year 10% Turnover Rate Per Year (% of users) 10% Rate of Growth per Year (% of users) 10,000 Number of External Users (partners and customers) Company Details
  • 32. RON for Web Access – Industry Standard Assumptions 2 Average Number of Downtime Hours Per Year (Due to Security Breach) $30,000 Average Application Downtime Cost Per Hour (Due to Security Breach) 10.0 Average Length of Help Desk Call (Minutes) 30% Average % Help Desk Activity Related to Passwords 11 Average Number of Help Desk Calls Per User per Year $4,000 Average Cost of Security Audit $12,000 Average Access Control Development Cost Per Extranet/intranet Application   Assumptions
  • 33. RON for Avoidance Impact – Web Access $20,000 Potential Security Audits Costs Avoidance Related to Web Access Control 50% % Security Audits Cost Savings Provided by Web Access Control $40,000 Cost of Security Audits per Year Cost of Security Audits per Year $135,000 Potential Application Development Costs Avoidance Related to Web Access Control 75% % Application Development Cost Savings Provided by Web Access Control $180,000 Cost of Hard-Coding Access Control Cost of Application Development Time Associated with Access Control Results Calculations
  • 34. RON for Avoidance Impact – Web Access CONTINUED $380,186 Total Potential for Cost Avoidance Related to Web Access Control $30,000 Potential Downtime Costs Avoidance Related to Web Access Control 50% % Downtime Cost Savings Provided by Web Access Control $60,000 Cost of Downtime Cost of Downtime Due to Attacks Caused by Unauthorized Access $195,186 Potential Extranets Help Desk Costs Avoidance Related to Web Access Control 75% % Extranets Help Desk Cost Savings Provided by Web Access Control $260,247 Cost of Help Desk Related to Extranets $47 Cost of IT Labor Per Hour 5,500 Total Time Spent by Help Desk staff on Passwords Related Calls Per Year (Hours) 33,000 Number of Help Desk Calls Related to Passwords Per Year 110,000 Number of Help Desk Calls Per Year Cost of Help-Desk (not using Self-Registration and Self-Service) Results Calculations
  • 35. RON for Identity Management – Avoidance Impact $290,649 Potential IT Cost Avoidance Related to User Provisioning 90% % IT Cost Savings Provided by User Provisioning $322,943 Annual Cost of User Account Management by IT $47 Cost of IT Labor Per Hour 6825 Total Time Spent Annually on User Account Management (Hours) 1300 Number of Account Terminations Per Year 1950 Number of MACs per Year 1300 Number of New Users Per Year User Account Management Cost 
  • 36. RON for Identity Management – Avoidance Impact CONTINUED $510,676 Total Potential for Cost Avoidance Related to Admin $220,027 Potential Lost Productivity Cost Avoidance Related to User Provisioning 50% % Lost User Productivity Cost Savings Provided by User Provisioning $440,055 Total Lost Productivity Costs Per Year (Due to Account Management) $298,102 Cost of Lost Productivity For Existing Employees $141,953 Cost of Lost Productivity For New Employees $47 Hourly Cost of Typical Employee 450 Number of MACs per Year for Internal Users (Existing Employees) 300 Number of New Internal Users/Employees Per Year Lost User Productivity (Due to Account Management) Cost
  • 37. Exercise – Building Your Own Financial Plan Estimates for your organization Where do I get the numbers from? Industry standard figures Rank financial drivers criteria by organizational importance
  • 38.
  • 39.
  • 40.