Insight by Okta, SailPoint, Radiant Logic and CyberArk

Fighting cyber threats with Identity Management

Of the 97 “significant” global cyber incidents tallied by the Center for Strategic and International Studies through the end of November of this year, U.S. government agencies and defense and high tech companies were targeted 30 times. “Significant” means “losses of more than one million dollars.” According to the National Counterintelligence and Security Center, foreign intelligence entities, which may include foreign governments, corporations and their proxies, are actively targeting information, assets and technologies vital to both U.S. national security and global competitiveness at an unprecedented rate.

At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.

Operational challenges

The new thing that’s evolving for us, as we move to artificial intelligence, is how do we authenticate bots and make sure that bots that are coming in are actually supposed to be there and are authorized to do what they are trying to do?”

Identity management enables access

At the end of the day, the US attorneys have to litigate. They have to be successful in the litigation and they have to put bad people in jail in. Everything that we do is really directed towards enabling that. If that’s access to resources more efficiently, more effectively, then that's what we're trying to do with our access management platforms.

The role of identity in “Zero Trust”

The network perimeter is not as we once knew it and the identity’s become that new perimeter. So as we see this shift and we see the paradigm shift of security, we need to manage the identity and manage the entitlements.

Listen to the full show:

Copyright © 2020 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.