Cloud Security & Compliance: PNC Bank (6th Largest Bank in US with $600 Billion AUM)

Challenges
- Identity Governance and Administration: Implementing and managing identity solutions (Sailpoint, Saviynt, Okta, Strata) to ensure secure and efficient identity orchestration.
- Authentication Assurance: Rolling out YubiKeys to improve authentication assurance levels from 1 to 3, adhering to NIST and Zero Trust standards.
- Integration and Security: Integrating Denodo with Azure and ensuring robust security measures.
- Zero Trust Implementation: Developing and executing a Zero Trust strategy, including Azure AD migration, OUD/OIM migration, passwordless authentication, ZPA, Google Cloud Identity, and customer authentication policies.
- Customer Identity and Access Management (CIAM): Designing, architecting, piloting, and rolling out CIAM for 12 million customers using Transmit Security Mosaic/Flex-ID and fraud protection solutions.
- Authentication Services: Implementing PlainID/Auth as a Service, LexisNexis Step Up Authentication, Pindrop voice biometrics, and other identity verification solutions.
- Modern Tools and Applications: Deploying Windows Hello, PowerApps, Co-Pilot, M365 Co-Pilot, ZScaler’s ZPA, Oracle Finance ERP, and CyberArk’s endpoint privilege management.
- Privilege Access Management: Leading CyberArk’s PAM, BeyondTrust Privilege Access Management, and other related initiatives.
- Security Engineering: Hands-on work with EntraID, Transmit Security, Terraform automation, Service Mesh’s Tetrate, Splunk, ServiceNow, BigPanda, Tanium, and AI/ML security initiatives.
- Security Standards and Policies: Developing security architecture standards and policies for technology transformation, focusing on engagement, inclusivity, resilience, modern engineering practices, real-time data-driven insights, secure customer experiences, and tailored governance.
Solution
- Comprehensive Identity Solutions: Implemented Sailpoint, Saviynt, Okta, and Strata for robust identity governance and administration.
- Enhanced Authentication: Rolled out YubiKeys, improving authentication assurance levels and adhering to NIST and Zero Trust standards.
- Secure Integration: Successfully integrated Denodo with Azure, ensuring high security.
- Zero Trust Strategy: Developed and implemented a comprehensive Zero Trust strategy, including various migrations and passwordless authentication.
- CIAM Implementation: Designed and rolled out CIAM for 12 million customers, enhancing security and user experience.
- Advanced Authentication Services: Deployed PlainID/Auth as a Service, Lexis Nexis Step Up Authentication, and Pindrop voice biometrics for enhanced security.
- Modern Tools Deployment: Implemented Windows Hello, PowerApps, Co-Pilot, M365 Co-Pilot, ZScaler’s ZPA, Oracle Finance ERP, and CyberArk’s endpoint privilege management.
- Privilege Access Management: Led initiatives for CyberArk’s PAM and BeyondTrust Privilege Access Management.
- Security Engineering Excellence: Conducted hands-on security engineering with various tools and platforms.
- Policy Development: Developed comprehensive security architecture standards and policies for technology transformation.
Tangible Results
- Improved Security Posture: Enhanced overall security posture through robust identity governance and administration.
- Higher Authentication Assurance: Achieved higher authentication assurance levels, improving security and compliance.
- Secure Integration: Ensured secure integration of Denodo with Azure, enhancing data protection.
- Zero Trust Implementation: Successfully implemented Zero Trust strategy, reducing security risks.
- Enhanced Customer Security: Improved customer security and experience through CIAM implementation.
- Advanced Authentication: Increased security with advanced authentication services, reducing fraud and identity theft.
- Modernized IT Infrastructure: Modernized IT infrastructure with the deployment of advanced tools and applications.
- Effective Privilege Management: Improved privilege access management, reducing insider threats.
- Innovative Security Engineering: Achieved innovative security engineering solutions, enhancing overall security.
- Comprehensive Security Policies: Established comprehensive security policies, ensuring consistent and secure technology transformation.