3 steps to 4x the risk coverage of CA ControlMinder

19

Transcript of 3 steps to 4x the risk coverage of CA ControlMinder

Page 1: 3 steps to 4x the risk coverage of CA ControlMinder
Page 2: 3 steps to 4x the risk coverage of CA ControlMinder

Introduction – Marc F. Potter

25 years of Security Experience

Companies

Dell Security

Quest Software

CA Technologies

Cabletron Systems

Technologies Backgound

Security Event Management

End Point Security

Identity Governance

Privileged Management

ObserveITWorldwide Vice PresidentCorporate Strategy and Business Development

Page 3: 3 steps to 4x the risk coverage of CA ControlMinder

Agenda

Current State of Managing Risk

Future State of Managing Risk

How CA Privileged Management Helps

3 Steps to Reduce your User Risk Posture

Next Steps

Page 4: 3 steps to 4x the risk coverage of CA ControlMinder

SystemsApps Data InternalIT Users

BusinessUsers

VendorContractor

Page 5: 3 steps to 4x the risk coverage of CA ControlMinder
Page 6: 3 steps to 4x the risk coverage of CA ControlMinder
Page 7: 3 steps to 4x the risk coverage of CA ControlMinder
Page 8: 3 steps to 4x the risk coverage of CA ControlMinder
Page 9: 3 steps to 4x the risk coverage of CA ControlMinder

Do you know who your high-risk users are?

Do you have the visibility into high-risk activity?

Are you focused on the right profile of users?

Page 10: 3 steps to 4x the risk coverage of CA ControlMinder
Page 11: 3 steps to 4x the risk coverage of CA ControlMinder

Database

NetworkAppliance

VirtualServer

Windows/UNIX/Linux

Application

Multiple Device Types

CAControlMinder

Secure Password Storage

IndividualAdministrators

SharedPrivilegedAccount

PasswordCheck-In

&Check-Out

Automatic Logins

Shared Account Management

Manual

Logins

11

Page 12: 3 steps to 4x the risk coverage of CA ControlMinder

Business Users

84% of Insider based breaches involve users with no admin rights(Ponemon)

IT Users

62% of admin-caused breaches due to human error (Ponemon)

Contractors

Breaches involving contractors have significantly higher data loss and severity (VDBIR14)

Page 13: 3 steps to 4x the risk coverage of CA ControlMinder

•••

OFFLINE MACHINE3RD PARTY MACHINE

MACHINE ID MAPPINGHELPDESK MACHINEREMOTE DESKTOPPC ADMIN RIGHTS

FINANCE DEPARTMENTCALL CENTER USER

ACCOUNTS PAYABLECONTRACTS TEAM

AUDITORDOCTOR/NURSE

CITRIX USER

•••

APPLICATIONSDATABASES

SERVERSNETWORKS

(PASSWORD VAULTS)

APPLICATIONSSENSITIVE DATA

FILE SHARESCLOUD SERVICES

Page 14: 3 steps to 4x the risk coverage of CA ControlMinder
Page 15: 3 steps to 4x the risk coverage of CA ControlMinder

BusinessUser

CitrixUser

ITUser

Page 16: 3 steps to 4x the risk coverage of CA ControlMinder

1. Identify User-Based Access RiskBusiness Users ContractorsIT Administrators

2. Monitor and Alert on Suspicious ActivityCapture Behavior PatternsProfile Risk and AcceptanceAlert on Suspicious Changes

3. Investigate and RemediateForensics Log SearchNotification and PreventionSession ReplaySession Kill

Page 17: 3 steps to 4x the risk coverage of CA ControlMinder
Page 18: 3 steps to 4x the risk coverage of CA ControlMinder
Page 19: 3 steps to 4x the risk coverage of CA ControlMinder