SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
1
© Copyright 2015 EMC Corporation. All rights reserved.
Force Cyber Criminals to Shop Elsewhere
2
© Copyright 2015 EMC Corporation. All rights reserved.
Introductions - Our Presenters
Rob Sadowski
Director, Technology Solutions
Kimberlee Bachman
Senior Product Marketing Manager,
IAM Solutions
3
© Copyright 2015 EMC Corporation. All rights reserved.
• Cyber Security Challenges in Retail
• Identity Challenges in Retail
• Solution Best Practices
• RSA Identity Management and Governance
• Use Cases
• Q&A
Agenda
4
© Copyright 2015 EMC Corporation. All rights reserved.
Security Concerns in Retail
Need to protect
customer data
and intellectual
property
Need to secure
critical
systems
Cyber
criminals
focusing on
retailersRecent wave
of retailer
breaches
5
© Copyright 2015 EMC Corporation. All rights reserved.
• Payment card data
• Emphasis on compliance
• High employee turnover
Why Are Retailers an Attractive Target?
6
© Copyright 2015 EMC Corporation. All rights reserved.
Payment
Card
Information
Customer
Purchase
and Loyalty
Information
Intellectual
Property
Cyber criminals do not discriminate against data, they’ll take it all
Concern: More Than Just Payment Card Data
7
© Copyright 2015 EMC Corporation. All rights reserved.
Retailers’ Identity Specific Concerns
Compliance
Access to
Data
Role
Management
Access
Governance
Managing
Identity
Lifecycle
8
© Copyright 2015 EMC Corporation. All rights reserved.
Employee Timeline Highlights Identity Concerns
ReviewJoins LeavesRequest Review & Revoke
Roles & Suggested
Entitlements
Roles & Suggested
Entitlements
Moves
9
© Copyright 2015 EMC Corporation. All rights reserved.
Regular Access Reviews
Put process in place to stay audit compliant and know who has access to what
Business Driven Access Reviews
Fine Grained Entitlement Visibility
Remain Audit Compliant
Lower Organizational Risk
10
© Copyright 2015 EMC Corporation. All rights reserved.
Governing Access With Policies
Policies help automate access governance and improve workforce management
Joiner Mover Leaver
Time Based
Segregation of Duties
11
© Copyright 2015 EMC Corporation. All rights reserved.
Many People in Small Number of Roles
Corporate Users Hourly Workers Contractors
12
© Copyright 2015 EMC Corporation. All rights reserved.
Governing Privileged Access (PAM)
Know what accounts have extra privilege
and make sure that’s appropriate
Avoid any one admin or user having too
much access to valuable information
Manage employees, vendors and
contractors
Review who has privileged access
13
© Copyright 2015 EMC Corporation. All rights reserved.
Keeping Compliant
PCI DSS
HIPAA
SOX
Data Privacy
14
© Copyright 2015 EMC Corporation. All rights reserved.
RSA Identity Management and Governance (IMG)
15
© Copyright 2015 EMC Corporation. All rights reserved.
RSA IAM
Enabling trusted interactions between identities and information
Applications/Data/Resources
Identity Lifecycle
Compliance
Access Platform Governance Platform
Federation/SSO
Authentication
Employees/Partners/Customers
Provisioning
Identity Intelligence
16
© Copyright 2015 EMC Corporation. All rights reserved.
Shift Decision Making and Accountability to the Business
Centralized Identity & Business Context
Business Process-Driven
Policy-Based Automation
Business-Driven Approach to Governance
17
© Copyright 2015 EMC Corporation. All rights reserved.
A Phased Approach
Role & Group
Management
Access RequestPolicy
Management
Provisioning
Visibility &
Certification
Account &
Entitlement
Collection
Access Reviews
Segregation
of Duties
Role Discovery
& Definition
Role
Maintenance
Group Analysis
& Cleanup
Access
Request Portal
Policy-Based
Change
Management
Joiners,
Movers, and
Leavers
Task
Notification
Service Desk
Integration
Data
Visibility
Automated
Provisioning
Compliance
Controls
18
© Copyright 2015 EMC Corporation. All rights reserved.
RSA IMG Retail Use Cases
19
© Copyright 2015 EMC Corporation. All rights reserved.
Point of Sale Monitoring
IMG Helps Retail Customers Achieve Success
Challenge Solution
No way of knowing
which Point of Sale
kiosk is being used and
when
Grant entitlements to
individual POS kiosks
and name them by
region
20
© Copyright 2015 EMC Corporation. All rights reserved.
Unowned Accounts
IMG Helps Retail Customers Achieve Success
Challenge Solution
There are many
unowned accounts
Removed orphaned
accounts
21
© Copyright 2015 EMC Corporation. All rights reserved.
Seasonal Workers & Contractors
IMG Helps Retail Customers Achieve Success
Challenge Solution
Concerned with
seasonal workers and
contractors having
access for the right
period of time
Policies allow access to
be granted for a set
amount of time to the
right applications
22
© Copyright 2015 EMC Corporation. All rights reserved.
Operational Challenges
IMG Helps Retail Customers Achieve Success
Challenge Solution
There is operational
inefficiency at the
store level
Can put workflow in
place to manage
operations
23
© Copyright 2015 EMC Corporation. All rights reserved.
Q&A
EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.

Mais conteúdo relacionado

Mais procurados

C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organization
Dr. Wilfred Lin (Ph.D.)
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
OracleIDM
 

Mais procurados (20)

APM Talk
APM TalkAPM Talk
APM Talk
 
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
From Print to the Cloud and Beyond: The Story of a Century Old Company and it...
 
Converged Everything, Converged Infrastructure delivering business value and ...
Converged Everything, Converged Infrastructure delivering business value and ...Converged Everything, Converged Infrastructure delivering business value and ...
Converged Everything, Converged Infrastructure delivering business value and ...
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
IT Transformation and Puppet
IT Transformation and Puppet IT Transformation and Puppet
IT Transformation and Puppet
 
Light Speed with Test Data Management
Light Speed with Test Data ManagementLight Speed with Test Data Management
Light Speed with Test Data Management
 
EMC Unified Analytics Platform. Gintaras Pelenis
EMC Unified Analytics Platform. Gintaras PelenisEMC Unified Analytics Platform. Gintaras Pelenis
EMC Unified Analytics Platform. Gintaras Pelenis
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organization
 
NetApp Integrated EVO:RAIL Solution Frank Sowin
NetApp Integrated EVO:RAIL Solution Frank SowinNetApp Integrated EVO:RAIL Solution Frank Sowin
NetApp Integrated EVO:RAIL Solution Frank Sowin
 
High availability is not a luxury webcast
High availability is not a luxury webcastHigh availability is not a luxury webcast
High availability is not a luxury webcast
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
 
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery Mold
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise Cloud
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 

Destaque

Confluence performance testing
Confluence performance testingConfluence performance testing
Confluence performance testing
Aleksandr Zhuikov
 
Iron mountain Records Management Observing
Iron mountain Records Management ObservingIron mountain Records Management Observing
Iron mountain Records Management Observing
Nafi Putrawan
 
Thurs nuremburg trials
Thurs nuremburg trialsThurs nuremburg trials
Thurs nuremburg trials
Travis Klein
 

Destaque (17)

Toolmaking for Administrators using Windows PowerShell
Toolmaking for Administrators using Windows PowerShellToolmaking for Administrators using Windows PowerShell
Toolmaking for Administrators using Windows PowerShell
 
Team work
Team workTeam work
Team work
 
Tues islam hajj
Tues islam hajjTues islam hajj
Tues islam hajj
 
Fri rights of man
Fri rights of manFri rights of man
Fri rights of man
 
The brain challenge
The brain challengeThe brain challenge
The brain challenge
 
Thur change to s or d
Thur change to s or dThur change to s or d
Thur change to s or d
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
 
Confluence performance testing
Confluence performance testingConfluence performance testing
Confluence performance testing
 
Wed mexico
Wed mexicoWed mexico
Wed mexico
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targets
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
 
Iron mountain Records Management Observing
Iron mountain Records Management ObservingIron mountain Records Management Observing
Iron mountain Records Management Observing
 
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
System Center Virtual Machine Manager 2012, Fabric Management, creation and c...
 
Das
DasDas
Das
 
Thurs nuremburg trials
Thurs nuremburg trialsThurs nuremburg trials
Thurs nuremburg trials
 
Chromatography lect 2
Chromatography lect 2Chromatography lect 2
Chromatography lect 2
 
2.nd world war
2.nd world war2.nd world war
2.nd world war
 

Semelhante a Force Cyber Criminals to Shop Elsewhere

Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene
 

Semelhante a Force Cyber Criminals to Shop Elsewhere (20)

Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
01 big dataoverview
01 big dataoverview01 big dataoverview
01 big dataoverview
 
ISG Market Update
ISG Market UpdateISG Market Update
ISG Market Update
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Designing GDPR compliant services in AWS
Designing GDPR compliant services in AWSDesigning GDPR compliant services in AWS
Designing GDPR compliant services in AWS
 
MDM - The Key to Successful Customer Experience Managment
MDM - The Key to Successful Customer Experience ManagmentMDM - The Key to Successful Customer Experience Managment
MDM - The Key to Successful Customer Experience Managment
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
 
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 

Mais de EMC

Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

Mais de EMC (20)

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 
The Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkThe Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the Network
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
 
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Force Cyber Criminals to Shop Elsewhere

  • 1. 1 © Copyright 2015 EMC Corporation. All rights reserved. Force Cyber Criminals to Shop Elsewhere
  • 2. 2 © Copyright 2015 EMC Corporation. All rights reserved. Introductions - Our Presenters Rob Sadowski Director, Technology Solutions Kimberlee Bachman Senior Product Marketing Manager, IAM Solutions
  • 3. 3 © Copyright 2015 EMC Corporation. All rights reserved. • Cyber Security Challenges in Retail • Identity Challenges in Retail • Solution Best Practices • RSA Identity Management and Governance • Use Cases • Q&A Agenda
  • 4. 4 © Copyright 2015 EMC Corporation. All rights reserved. Security Concerns in Retail Need to protect customer data and intellectual property Need to secure critical systems Cyber criminals focusing on retailersRecent wave of retailer breaches
  • 5. 5 © Copyright 2015 EMC Corporation. All rights reserved. • Payment card data • Emphasis on compliance • High employee turnover Why Are Retailers an Attractive Target?
  • 6. 6 © Copyright 2015 EMC Corporation. All rights reserved. Payment Card Information Customer Purchase and Loyalty Information Intellectual Property Cyber criminals do not discriminate against data, they’ll take it all Concern: More Than Just Payment Card Data
  • 7. 7 © Copyright 2015 EMC Corporation. All rights reserved. Retailers’ Identity Specific Concerns Compliance Access to Data Role Management Access Governance Managing Identity Lifecycle
  • 8. 8 © Copyright 2015 EMC Corporation. All rights reserved. Employee Timeline Highlights Identity Concerns ReviewJoins LeavesRequest Review & Revoke Roles & Suggested Entitlements Roles & Suggested Entitlements Moves
  • 9. 9 © Copyright 2015 EMC Corporation. All rights reserved. Regular Access Reviews Put process in place to stay audit compliant and know who has access to what Business Driven Access Reviews Fine Grained Entitlement Visibility Remain Audit Compliant Lower Organizational Risk
  • 10. 10 © Copyright 2015 EMC Corporation. All rights reserved. Governing Access With Policies Policies help automate access governance and improve workforce management Joiner Mover Leaver Time Based Segregation of Duties
  • 11. 11 © Copyright 2015 EMC Corporation. All rights reserved. Many People in Small Number of Roles Corporate Users Hourly Workers Contractors
  • 12. 12 © Copyright 2015 EMC Corporation. All rights reserved. Governing Privileged Access (PAM) Know what accounts have extra privilege and make sure that’s appropriate Avoid any one admin or user having too much access to valuable information Manage employees, vendors and contractors Review who has privileged access
  • 13. 13 © Copyright 2015 EMC Corporation. All rights reserved. Keeping Compliant PCI DSS HIPAA SOX Data Privacy
  • 14. 14 © Copyright 2015 EMC Corporation. All rights reserved. RSA Identity Management and Governance (IMG)
  • 15. 15 © Copyright 2015 EMC Corporation. All rights reserved. RSA IAM Enabling trusted interactions between identities and information Applications/Data/Resources Identity Lifecycle Compliance Access Platform Governance Platform Federation/SSO Authentication Employees/Partners/Customers Provisioning Identity Intelligence
  • 16. 16 © Copyright 2015 EMC Corporation. All rights reserved. Shift Decision Making and Accountability to the Business Centralized Identity & Business Context Business Process-Driven Policy-Based Automation Business-Driven Approach to Governance
  • 17. 17 © Copyright 2015 EMC Corporation. All rights reserved. A Phased Approach Role & Group Management Access RequestPolicy Management Provisioning Visibility & Certification Account & Entitlement Collection Access Reviews Segregation of Duties Role Discovery & Definition Role Maintenance Group Analysis & Cleanup Access Request Portal Policy-Based Change Management Joiners, Movers, and Leavers Task Notification Service Desk Integration Data Visibility Automated Provisioning Compliance Controls
  • 18. 18 © Copyright 2015 EMC Corporation. All rights reserved. RSA IMG Retail Use Cases
  • 19. 19 © Copyright 2015 EMC Corporation. All rights reserved. Point of Sale Monitoring IMG Helps Retail Customers Achieve Success Challenge Solution No way of knowing which Point of Sale kiosk is being used and when Grant entitlements to individual POS kiosks and name them by region
  • 20. 20 © Copyright 2015 EMC Corporation. All rights reserved. Unowned Accounts IMG Helps Retail Customers Achieve Success Challenge Solution There are many unowned accounts Removed orphaned accounts
  • 21. 21 © Copyright 2015 EMC Corporation. All rights reserved. Seasonal Workers & Contractors IMG Helps Retail Customers Achieve Success Challenge Solution Concerned with seasonal workers and contractors having access for the right period of time Policies allow access to be granted for a set amount of time to the right applications
  • 22. 22 © Copyright 2015 EMC Corporation. All rights reserved. Operational Challenges IMG Helps Retail Customers Achieve Success Challenge Solution There is operational inefficiency at the store level Can put workflow in place to manage operations
  • 23. 23 © Copyright 2015 EMC Corporation. All rights reserved. Q&A
  • 24. EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.