SlideShare a Scribd company logo
Getting	the	Most	from	Your	CA	Advanced	
Authentication	Solution
Charley	Chell	/	Mike	Ries
Security
CA	Technologies
Security
SCX03E
#CAWorld
2 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
For	Informational	Purposes	Only	
Terms	of	this	Presentation
©	2015	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.	The	presentation	provided at	CA	
World	2015	is	intended	for	information	purposes	only	and	does	not	form	any	type	of	warranty.	Some	of	the	specific	slides	with customer	
references	relate	to	customer's	specific	use	and	experience	of	CA	products	and	solutions	so	actual	results	may	vary.	
Certain	information	in	this	presentation	may	outline	CA’s	general	product	direction.	This	presentation	shall	not	serve	to	(i)	affect	the	rights	
and/or	obligations	of	CA	or	its	licensees	under	any	existing	or	future	license	agreement	or	services	agreement	relating	to	any	CA	software	
product;	or	(ii)	amend	any	product	documentation	or	specifications	for	any	CA	software	product.	This	presentation	is	based	on current	
information	and	resource	allocations	as	of	November	18,	2015,	and	is	subject	to	change	or	withdrawal	by	CA	at	any	time	without	notice.	The	
development,	release	and	timing	of	any	features	or	functionality	described	in	this	presentation	remain	at	CA’s	sole	discretion.	
Notwithstanding	anything	in	this	presentation	to	the	contrary,	upon	the	general	availability	of	any	future	CA	product	release referenced	in	
this	presentation,	CA	may	make	such	release	available	to	new	licensees	in	the	form	of	a	regularly	scheduled	major	product	release.	Such	
release	may	be	made	available	to	licensees	of	the	product	who	are	active	subscribers	to	CA	maintenance	and	support,	on	a	when and	if-
available	basis.	The	information	in	this	presentation	is	not	deemed	to	be	incorporated	into	any	contract.
3 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Abstract
Join	us	for	a	hands-on	lab	and	guided	session	that	will	show	you	how	to	take	
advantage	of	all	of	the	features	of	CA	Advanced	Authentication	to	help	you	
provide	both	a	better	user	experience	and	better	security.
You’ll	walk	through	behavioral	profiling	and	rule-building	 to	show	you	how	you	can	
achieve	close	to	“zero-touch”	authentication.	You	will	learn	how	to	create	
meaningful	reports	and	use	that	data	to	improve	authentication	effectiveness	and	
convenience.	You	will	see	several	demos	that	highlight	use	cases	for	the	product.	
We	will	also	be	collecting	your	input	and feedback	on	features	and	usability.	
Charley	Chell
CA	Technologies
Product	Mangement
Mike	Ries
CA	Technologies
Product	Development
4 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
What	We	Will	Cover
§ Rules	and	Scoring	/	Intro	to	Device	ID
§ Geolocation	Rules
§ User	Behavior	Profiling
§ Mobility	Index
§ Reports
§ Constructing	Your	Own	Rules
§ Using	Application-Specific	Data	in	Risk	Evaluation
§ Case	Management
5 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Short	Background	on	CA	Advanced	
Authentication
6 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
CA	Advanced	Auth
empowers	our	customers	to	
optimize	the	three	
dimensions	important	in	
authentication.
7 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
§ Easy	to	use	credentials
§ Low	customer	friction
§ No	need	for	training
§ Self-service	FYP/Change	
§ Easy	conversion	from	old	
credentials
§ Addition	of	risk	authentication
§ User	Behavior	as	a	factor
Convenience
8 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
§ Balance	of	strength	and	cost
§ Strength	of	credential	that	
meets	the	need
§ Credentials	from	multiple	
devices
§ Unbreachable Passwords
§ Secure	against	brute	force	and	
MITM	attacks
Security
9 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
§ Per	user	not	per	credential	
pricing
§ Software	based	tokens	
minimize	costs	to	deploy	and	
manage
§ On	Premise,	Cloud	or	Hybrid	
options
Costs
10 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Advanced	Authentication	Marketure
Callouts
Authentication	 Hub
Authentication ReportingRule	Management
Historical	
Context
Case	
Manager
Incorporation
Callouts
Trust	Assessment
(Risk	Engine)	
Risk	Advice
Allow
Deny
Auth
Behavioral	
Model
Device	Details
Device	Type iPhone
Operating	System iOS	6.0
Browser Safari
Device	ID	Matched: Yes
User-Device	Associated: Yes
Machine	Fingerprint	(MFP)	Matched: Yes
MFP	Match	% 100
API	/	Authentication	Flow	Manager
Assessment
11 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Risk	Authentication
AUTHENTICATION
METHODS
RISK	ANALYSIS
TECHNIQUES
Make	real-time	decisions	
based	on	the	risk	of	
the	login	attempt
Where	is
the	user?
What	is	the	user
trying	to	do?
Is	the	action	
consistent	with	
history?
What	device	is	
being	used?
§ Behavioral	risk	modeling
§ Adaptive	scoring	engine
§ Dynamic	Rules
§ DeviceDNA™	device	identification
§ Transparent	data	collection
KEY	FEATURES
§ Frictionless	 customer	experience
§ Deep	integration	with	CA	SSO
§ Reduce	fraud	risk
§ Control	costs	associated	with	fraud
KEY	BENEFITS
12 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Let’s	Get	Our	Hands	Dirty
13 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Pre-work	Performed	Ahead	of	Time
§ We	created	orgs	and	admin	logins	for	each	of	you
§ We	created	a	rule	set	for	each	org	with	the	following	changes
– Implicit	user	creation	mode	enabled
– User	behavior	profiling	model	enabled
– Other	changes	to	standard	default	TBD	during	course	testing
§ Set	up	shortcuts	to	the	Administration	Console	and	Risk	
Sample	App
§ Modified	the	Risk	Sample	App	to	have	an	"Evaluate	Risk	*	10"	
checkbox. .
14 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Your	Accounts
§ For	pre-registered	attendees
§ For	others,	we’ll	set	you	up	now
Registrant Organization Login	Name Password
15 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Device	Identification	Logic	Flow
Read	the	DeviceID
and	Signature	from	
the	device
What	did	
we	read?
Compare	Signature	
to		devices	the	user	
has	used	in	the	past
Does	the	
Signature	match	
device’s	prior	
value?
High	
probability	
match	found
Existing	device	is	a	
verified	2nd
factor
New	Device
Existing	device	but	
device	trust	low
Signature
Only
DeviceID and	Signature
Signature	matched	within
threshold	tolerance
Signature	too	different
No
Yes
16 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	1:	Intro	to	Rules	and	Scoring	/	Intro	to	Device	ID
Familiarize	yourself with	how	to	use	the	sample	app,	log	into,	and	navigate	the	admin	
console. Understand	Risk	Score,	Risk	Advice,	and	Secondary	Authentication. Understand	
how	Secondary	Authentication	is	used	based	on	Risk	Advice.
1. Using	sample	app,	do	simple	Evaluate	Risk	using	your	org	admin	and	
specifying	your	org
– Note	unknown	device	ID
– Don't	store	Device	ID	/	Proceed	to	Post-Evaluate
2. Repeat
– Still	unknown	device	ID
3. Repeat
– This	time	store	Device	ID	/	Proceed	to	Post-Evaluate
– Allow
4. View	the	Rules	and	Scoring	Management	Page	to	see	what's	going	on
17 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Geo-location
§ The	solution	derives	the	geo-location	from	the	end-user’s	IP	address	by	
leveraging	third-party	Quova/Neustar IP	Intelligence	data.		
§ Quova provides	detailed	geo-location	information	such	as,	locale,	ISP,	
time	zone,	and	related	geographical	information	based	on	known	IP’s	and	
server	hop	routing	data.
§ The	Quova/Neustar database	download	and	updates	are	included	with	
the	CA	Risk	Authentication	software	license.
18 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	2:	Intro	to	Geolocation	Rules
Learn	how	geolocation	works.		Understand	where	we	get	the	data	from	and	
what	the	fields	each	mean.		Learn	geolocation,	zone	hopping,	negative	country,	
and	perhaps	anonymizing	proxies.
1. Enable	Zone	Hopping	rule
2. Using	the	sample	app,	modify	the	IP	address	to	simulate	logging	in	from	a	far-away	places,	
like
– Canada:	23.16.*.*,		Argentina:	24.232.*.*,	or	Antarctica:	46.36.195.0
3. Perform	Evaluate	Risk	with	the	modified	IP
– Note	Zone	Hopping	rule	fires	/	IncrAuth response
4. Now,	let's	add	a	country	to	the	Negative	Country	List	and	enable	the	Negative	Country	rule
– Choose	your	country	of	choice
5. Using	sample	app,	simulate	login	from	the	banned	country
– Note	Negative	Country	rule	fires	/	Deny	response
6. Disable	Zone	Hopping	Rule	so	that	it	does	not	interfere	with	Mobility	Index	Testing	coming	up
19 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
User	Behavior	Profiling
User	Behavioral	Profiling	understands	the	individual	patterns	of	each	
user	and	scores	the	abnormality	of	their	current	login	or	transaction	
against	their	established	pattern.		
•Do	they	exhibit	a	specific	pattern	or	not?	Time	of	Day	/	of	Week
•How	often	do	they	use	the	system?Frequency
•What	do	they	intend	to	accomplish?User	Actions
•Do	they	travel	or	stay	home?Location	Choices
•Do	they	always	use	particular	domains,	like	ca.comIP	Count	/	Domain	Count
•Or	particular	connection	types,	like	broadband?Connection	Type
•Are	they	likely	to	use	a	new	device?Device	Count
•Do	they	favor	a	particular	device	type?Device	Type
•Their	browser	and	language	preferences?Browser	Type	/	Language
20 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	3: Intro	to	User	Behavior	Profiling
Understand	how	User	Behavior	Profiling	works,	and	demonstrate	its	
functionality	by	generating	"anomalous"	logins
1. Create	Model	Score	Rule
– MODEL_SCORE	>	40	then	Increase	Auth
2. Choose	a	new	user	name,	perform	Evaluate	Risk	multiple	times
– Note	the	Evaluate	*10	option	in	the	sample	app		
– We	are	using	a	new	user	to	start	with	a	clean	slate,	so	that	the	calls	we	made	earlier	will	not	
influence	the	user	model
3. Now	perform	Evaluate	Risk	from	a	different	browser	but	with	a	different	IP	address	
(but	same	locale)
– Can	simulate	this	by	providing	copy/paste	MFP,	made	up	IP	address	(just	add	or	subtract	one	
to/from	the	last	octet)
4. Note	Model	Score	Rule	fired
5. Look	at	Analyze	Transactions	Report	and	note	high	model	score.
21 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	4: Intro	to	Mobility	Index
Explain	Mobility	Index	and	how	it	works	with	Model	Score	to	detect	anomalous	behavior. Demonstrate	how	
MI	is	affected	by	geographically	dispersed	 logins,	and	how	it	can	cause	an	increased	Model	Score. Explain	
how	once	a	user	has	established	a	high	Mobility	Index,	a	login	from	a	remote	location	will	no	longer	result	in	
a	high	model	score.
1. Using	an	alternate	user,	perform	generic	Evaluate	Risk	*	10
2. Look	at	report	– note	Mobility	Index	of	0
3. Perform	Evaluate	Risk	from	far-away	country	(e.g.	Argentina)
4. Note	Model	Score	is	fired
5. Far-away	location	with	low	Mobility	Index	increases	the	Model	Score
6. This	rule	complements	Zone	Hopping
– Zone	Hopping	detects	movement	that	is	faster	than	commercial	travel
– Mobility	Index	/	Model	Score	works	by	detecting	anomalous	behavior	– even	if	no	recent	logins,	the	
system	infers	that	a	login	from	Argentina	is	unusual
22 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	5:	Intro	to	Reports	
Show	various	reports	and	discuss	their	usefulness.		Show	the	ability	to	export	reports	to	a	spreadsheet.		
Discuss	how	looking	at	reports	can	allow	you	to	tune	your	ruleset,	such	as	when	a	rule	is	firing	too	frequently	
or	not	frequently	enough.		Mention	that	some	reports	only	apply	when	using	Case	Management.
1. Look	at	the	Analyze	Transactions	Report
– Note	that	it	shows	country,	IP	Address,	risk	score	/	advice,	device	ID,	Rule	Results,	Device	Type,	OS,	Browser,	etc.
– Note	that	it	shows	Model	Score	=	0	and	Mobility	Index	=	0
– Explain	that	this	is	because	we	have	not	turned	on	behavior	modelling,	which	we	will	do	in	the	next	exercise
2. Click	on	"detail"	for	one	of	the	rules	/	note	all	the	details
– Note	that	you	can	show	related	transactions	for	user,	device,	ip address
3. Look	at	the	Risk	Evaluation	Detail	Activity	Report
4. Look	at	the	Risk	Advice	Summary	Report
– Skip	Fraud	Statistics	Report	because	it	only	applies	when	using	Case	Management	(which	we	will	do	later)
– Look	at	the	Rule	Effectiveness	Report
– Skip	False	Positives	Report	because	it	only	applies	when	using	Case	Management	(which	we	will	do	later)
5. Look	at	the	Device	 Summary	Report
– Show	Export	Capability	(csv)
– Discuss	how	looking	at	reports	can	allow	you	to	tune	your	ruleset
– Maybe	have	model	enabled	by	default?
– Discuss	columns	that	only	apply	to	case	management
23 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	6:	Constructing	Your	Own	Rules
Demonstrate	the	ease	with	which	custom	rules	can	be	created
1. Using	the	rule	builder,	 create	a	custom	rule
– The	rule	will	specify	an	elevated	risk	if	the	user	has	performed	"forgot	password"	3	
times	in	the	last	24	hours.
– Transaction	Elements	/	Velocity	>=	3	In	last	24	Hours	for	Set	of	Actions	"FORGOT_PWD"
– Enable	/	Save	/	Migrate	to	Production	/	Refresh	Cache
2. With	Sample	App,	set	Additional	Data	ACTION	=	FORGOT_PWD
3. Do	this	3	times. On	third	time,	the	new	rule	fires.
4. Look	at	Analyze	Transactions	Report. Note	the	"Action"	column	shows	
FORGOT_PWD	for	these	transactions,	rather	than	Login
24 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	7:	Using	Application-Specific	Data	in	Risk	Evaluation
Discuss	Application-Specific	risk	evaluation	data	("Additional	
Input"). Demonstrate	how	to	create	a	rule	that	utilizes	this	data.
1. Using	the	rule	builder,	create	the	following	custom	rule
– Custom	Element	“DAYS_SINCE_LAST_LOGIN”	is	GREATER_THAN	 100
2. Using	sample	app,	Evaluate	Risk	with	the	additional	Input
– DAYS_SINCE_LAST_LOGIN	 =	100	-->	Rule	does	not	fire
– DAYS_SINCE_LAST_LOGIN	 =	101	-->	Rule	fires
3. Now	let's	modify	the	custom	rule	to	change	its	behavior
– DAYS_SINCE_LAST_LOGIN	 >	100	AND	NOT	TRUSTED_IP
4. Add	your	IP	Address	to	the	list	of	trusted	IPs
5. Evaluate	Risk	with	DAYS_SINCE_LAST_LOGIN	 =	200
– Rule	does	not	fire
6. Evaluate	Risk	again	with	DAYS_SINCE_LAST_LOGIN	 =	200	and	modified	IP	address	(not	on	trusted	list)
– Rule	fires
7. Disable	the	TRUSTED_IP	rule	and	repeat	the	last	two	Evaluate	Risk	calls
– Note	that	even	though	the	TRUSTED_IP	rule	is	disabled,	it's	still	evaluated	and	used	to	evaluate	your	custom	rule
25 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Case	Management
§ The	solution	provides	a	Case	Management	feature	that	enables	you	to	
investigate	transactions,	and	intuitively	and	effectively	manage	the	
transactions	that	are	marked	suspicious.		
§ This	feature	simplifies	the	challenge	of	recording	and	documenting	every	
phase	of	an	investigation,	creating	a	clear	and	comprehensive	trail	of	
activity.
§ This	feature	saves	time	by	automatically	creating	a	report	of	the	findings,	
including	a	detailed	listing	of	reason,	recommendation,	geo-location	
information,	connection	details,	and	risk	assessment	details
26 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	8: Intro	to	Case	Management
Discuss	Case	Management	and	how	it	can	be	used	to	mark	fraud. Discuss	how	
this	can	also	be	used	to	assess	False	Positives,	thereby	providing	input	that	can	
be	used	to	tune	rulesets.
1. Set	up	Case	Mangement
– Click	on	Case	Management	/	Manage	Queues
– Select	Default	Queue
– Assign	yourself	as	a	selected	administrator	to	the	queue
– Order	by	Date	Created	Ascending
– Save	/	Refresh	Cache
27 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	8: Intro	to	Case	Management
Discuss	Case	Management	and	how	it	can	be	used	to	mark	fraud. Discuss	how	
this	can	also	be	used	to	assess	False	Positives,	thereby	providing	input	that	can	
be	used	to	tune	rulesets.
1. Case	Management	/	Work	on	Cases
– Note	that	there	is	one	case	per	user	name,	and	each	case	contains	several	alerts	aggregated	to	one	case
2. Select	some	transactions	(e.g.,	all	from	Argentina	not	set	to	Allow),	and	mark	them	as	"confirmed	fraud"
– In	the	note,	select	"Called	the	Cardholder	- Cardholder	confirmed	not	doing	the	transactions"
– In	the	Additional	Note,	type	"The	cardholder	says	he	never	left	the	United	States."
– Set	Case	Status	to	In	Progress
– Click	Save
3. Mark	the	rest	of	the	transactions	as	"Confirmed	Genuine"
– Set	Case	Status	to	Closed
– Set	Note	to	"Called	the	Cardholder	- Cardholder	confirmed	doing	the	transactions"
– Click	Save
4. Move	to	the	next	case	and	mark	all	as	Genuine,	clear	off	all	cases	in	the	queue
5. Look	at	the	Fraud	Statistics	Report
6. Look	at	the	False	Positives	Report
28 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recap
29 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
What	We	Covered
§ Rules	and	Scoring	/	Intro	to	Device	ID
§ Geolocation	Rules
§ User	Behavior	Profiling
§ Mobility	Index
§ Reports
§ Constructing	Your	Own	Rules
§ Using	Application-Specific	Data	in	Risk	Evaluation
§ Case	Management
30 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCT10S
Case	Study:		Implementing	CA	Strong	Authentication	in	
30	days
11/18/2015	at	12:15	PM
SCT05S
Roadmap:	CA	Advanced	Authentication	and	CA	Single	
Sign-On	
11/18/2015	at	4:30	PM
SCT25T
Tech	Talk:	Preventing	Data	Breaches	with	Risk	Aware	
Session	 Management
11/18/2015	at	2:00	PM
SCT24T
Tech	Talk:	Mobile	Risk	Analysis:	Take	Your	Mobile	App	
Security	to	the	Next	Level
11/19/2015	at	1:00	PM
31 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Must	See	Demos
Protect	Against	
Fraud	&	Breaches
CA	Advanced	Auth
Security	Theater
Engage	
Customers
CA	SSO
Security	Theater
Innovation	– IoT
Slot	Car
CA	AA,	APIM
Security	Theater
Secure	Omni-
Channel	Access
CA	AA,	APIM,	SSO
Security	Theater
CA	Product	Management
charley.chell@ca.com
Charley	Chell
Ad

More Related Content

What's hot (20)

1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
ChunLei(peter) Che
 
Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
Chandrapal Badshah
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
Owako Rodah
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
SlideTeam
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
Steven Cahill
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
Vivek Chauhan
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
Lucas Ko
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
ChunLei(peter) Che
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
Owako Rodah
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
SlideTeam
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
Vivek Chauhan
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
Lucas Ko
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 

Similar to Getting the Most from Your CA Advanced Authentication Solution (20)

Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
CA Technologies
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA Technologies
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
 
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
 
Build Your Own Virtual API
Build Your Own Virtual APIBuild Your Own Virtual API
Build Your Own Virtual API
CA Technologies
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
CA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
CA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
CA Technologies
 
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
CA Technologies
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
 
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
Ian Kelly
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
CA Technologies
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
CA Technologies
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
CA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
CA Technologies
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
CA Technologies
 
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
CA Technologies
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA Technologies
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
 
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
 
Build Your Own Virtual API
Build Your Own Virtual APIBuild Your Own Virtual API
Build Your Own Virtual API
CA Technologies
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
CA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
CA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
CA Technologies
 
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
CA Technologies
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
 
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
Ian Kelly
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
CA Technologies
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
CA Technologies
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
CA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
CA Technologies
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
CA Technologies
 
Ad

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 
CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 
Ad

Recently uploaded (20)

Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 

Getting the Most from Your CA Advanced Authentication Solution

  翻译: