SlideShare a Scribd company logo
1 of 25
Download to read offline
Why	
  the	
  Iden*ty	
  Ecosystem	
  
Steering	
  Group	
  (IDESG)?	
  
Ian	
  Glazer	
  
Delegate-­‐at-­‐Large,	
  Management	
  Council	
  –	
  IDESG	
  
Board	
  of	
  Directors	
  Member	
  –	
  IDESG	
  Inc.	
  
Senior	
  Director,	
  Iden@ty	
  –	
  salesforce.com	
  
@iglazer	
  
Why	
  have	
  a	
  strategy	
  
in	
  the	
  first	
  place?	
  
Internet	
  as	
  Economic	
  Engine	
  
•  The	
  bright	
  spot	
  in	
  the	
  
US	
  economy	
  
•  Reduce	
  transac@on	
  
costs	
  and	
  inefficiencies	
  
•  Expand	
  every	
  business’	
  
reach	
  
•  Moving	
  more	
  
interac@ons	
  online	
  is	
  
the	
  inevitable	
  future	
  
Usernames and passwords are broken
•  Most people have 25 different passwords, or use the same one over
and over
•  Even strong passwords are vulnerable…criminals have many paths to
easily capture “keys to the kingdom”
•  Rising costs of identity theft
÷  11.6M U.S. victims (+13% YoY) in 2011 at a cost of $37 billion
÷  67% increase in # of Americans impacted by data breaches in 2011
(Source: Javelin Strategy & Research)
•  A common vector of attack
÷  Sony Playstation, Zappos, Lulzsec, LinkedIn, among dozens
of 2011-12 breaches tied to passwords.
Identities are difficult to verify
over the internet
•  Numerous government services still must be
conducted in person or by mail, leading to continual
rising costs for state, local and federal governments
•  Electronic health records could save billions, but
can’t move forward without solving authentication
challenge for providers and individuals
•  Many transactions, such as signing an auto loan or a
mortgage, are still considered too risky to conduct
online due to liability risks
The	
  Status	
  Quo	
  is	
  Meh	
  
•  No	
  formal	
  market	
  for	
  iden@ty	
  
•  Poor	
  choices	
  of	
  iden@ty	
  providers	
  
–  Who	
  can	
  and	
  do	
  mone@ze	
  personal	
  data	
  
•  Meager	
  controls	
  for	
  the	
  individual	
  
•  Inequitable	
  use	
  of	
  personal	
  data	
  
•  Privacy	
  is	
  increasingly	
  only	
  for	
  the	
  well-­‐to-­‐do	
  
•  If	
  moving	
  transac@ons	
  online	
  is	
  inevitable,	
  do	
  we	
  
want	
  the	
  status	
  quo	
  to	
  be	
  the	
  only	
  way	
  we	
  get	
  
online	
  services?	
  
What	
  is	
  the	
  
IDESG?	
  
Mission
The Mission of the Identity Ecosystem Steering Group (IDESG)
shall be to govern and administer the Identity Ecosystem
Framework in a manner that stimulates the development and
sustainability of the Identity Ecosystem. The IDESG will always
operate in accordance with the NSTIC’s Guiding Principles.
GUIDING PRINCIPLES
1.  	
  Privacy-­‐enhancing	
  and	
  voluntary.	
  
2.  	
  	
  Secure	
  and	
  resilient.	
  
3.  	
  	
  Interoperable.	
  
4.  	
  	
  Cost-­‐effec@ve	
  and	
  easy	
  to	
  use.
•  IDESG	
  is	
  working	
  to	
  create	
  a	
  world	
  where	
  
people	
  trust	
  the	
  security	
  and	
  privacy	
  of	
  
online	
  iden*fica*on	
  and	
  confidently	
  
exchange	
  personal	
  informa*on	
  via	
  the	
  
Internet.	
  
•  IDESG	
  is	
  a	
  government-­‐inspired,	
  
commercially-­‐led,	
  member-­‐driven	
  
organiza*on	
  that	
  is	
  serving	
  the	
  public	
  good.	
  
	
  
•  IDESG	
  is	
  at	
  the	
  heart	
  of	
  the	
  iden*ty	
  solu*on,	
  
driving	
  innova*on	
  and	
  serving	
  as	
  a	
  catalyst	
  
for	
  industry	
  and	
  the	
  economy.	
  
	
  
Objectives
The activities and work products of the IDESG shall be conducted in support of
the following objectives:
—  Ensuring that the Identity Ecosystem and Identity Ecosystem Framework
conform to the four NSTIC Guiding Principles.
—  Administering the process for policy and standards development and adoption
for the Identity Ecosystem Framework and, where necessary establishing
policies standards for the Identity Ecosystem Framework.
—  Adopting and, where necessary, establishing standards for the Identity
Ecosystem Framework.
—  Certifying that accreditation authorities validate adherence to the
requirements of the Identity Ecosystem Framework.
Text taken from the Identity Ecosystem Steering Group (IDESG) 2013 Rules of Association.
Read more about the IDESG in its policy documents.
Organizational Structure
What	
  is	
  the	
  IDESG	
  
working	
  on?	
  
2014 IDESG Goal
—  Complete version 1 of the IEF by December 31, 2014
¡  Will allow a baseline to which self-attestations can occur
¡  Sets the stage for development of a comprehensive
compliance and conformance program by December 31,
2015
13
Framework Development Plan Components
14
Functional Model	
  
Define Guiding Principle
Requirements	
  
Define Initial Risk Model(s)	
  
IEF Compliance/Conformance
Program	
  
Implementation Tools	
  
Use	
  Cases	
  
•  Frame	
  the	
  IDESG’s	
  ini@al	
  objec@ves	
  and	
  scope	
  of	
  work	
  	
  
•  Provide	
  a	
  basis	
  for	
  the	
  development	
  of	
  IDESG	
  work	
  products	
  	
  
•  Drive	
  consensus	
  among	
  IDESG	
  plenary	
  members	
  about	
  the	
  
characteris@cs	
  of	
  the	
  ecosystem	
  and	
  iden@ty	
  ecosystem	
  framework	
  
they	
  are	
  trying	
  to	
  bring	
  into	
  existence	
  	
  
•  Provide	
  a	
  method	
  for	
  the	
  elicita@on	
  and	
  capture	
  the	
  requirements	
  
of	
  the	
  various	
  NSTIC	
  cons@tuencies	
  	
  
•  Make	
  more	
  concrete	
  the	
  applica@on	
  of	
  the	
  NSTIC	
  guiding	
  principles	
  
in	
  terms	
  of	
  real-­‐	
  world	
  scenarios	
  	
  
•  Serve	
  as	
  a	
  test	
  target	
  against	
  which	
  IDESG	
  work	
  products	
  can	
  be	
  
evaluated	
  	
  
•  Serve	
  as	
  a	
  guide	
  for	
  the	
  collec@ve	
  efforts	
  of	
  the	
  IDESG,	
  to	
  maintain	
  
a	
  common	
  focus	
  and	
  alignment	
  	
  
hp://www.idecosystem.org/index.php?q=filedepot_download/944/1272	
  
hps://www.idecosystem.org/wiki/Use_Cases	
  
Functional Elements Diagram
8/4/14
Why	
  and	
  how	
  to	
  
get	
  involved	
  
Why	
  be	
  involved	
  
•  Help	
  shape	
  an	
  alterna@ve	
  to	
  /	
  augmenta@on	
  
of	
  the	
  status	
  quo	
  
•  Aid	
  in	
  the	
  crea@on	
  of	
  a	
  true	
  market	
  for	
  
iden@ty	
  
•  Grow	
  your	
  business	
  
•  Work	
  with	
  industry	
  peers	
  
Why	
  am	
  I	
  involved	
  
•  I’m	
  walking	
  catalog	
  of	
  an@-­‐paerns	
  
•  Amazing	
  opportuni@es	
  to	
  enrich	
  our	
  society	
  
and	
  businesses	
  of	
  kinds	
  to	
  beer	
  achieve	
  their	
  
missions	
  	
  
•  Rare	
  that	
  you	
  get	
  an	
  opportunity	
  to	
  of	
  this	
  
scope	
  in	
  any	
  industry	
  
•  To	
  know	
  I	
  helped	
  
www.idecosystem.org
Rules of Association,
Membership Agreements,
Policies, etc.
Can all be found under
About - Governance
Joining the IDESG
—  www.idecosystem.org
—  Click Membership - Join
How to Get Involved
Connect with Members.
Join one of the email discussion lists -
Post on a forum - Contribute to the Wiki
and other projects.
Learn and Develop.
Read the Member E-Newsletter –
Read about upcoming events on the
Website - Attend online and in person.
Run for a Leadership Position.
Advocate.
Tell your associates - Include IEDSG in
your industry presentations, etc.
Present Your Ideas.
Submit an idea for group discussion.
Share your own experience with your
colleagues!
Participate. Be a part of the solution!
IDESG	
  10th	
  Plenary	
  
•  September	
  17	
  –	
  19th	
  Tampa,	
  FL	
  
•  In	
  conjunc@on	
  with	
  the	
  Global	
  Iden@ty	
  
Summit	
  
•  Hear	
  about	
  commiee	
  progress	
  
•  Help	
  determine	
  IDESG’s	
  roadmap	
  for	
  2014	
  
and	
  beyond	
  
•  hps://www.idecosystem.org/content/save-­‐
date-­‐10th-­‐plenary	
  
More	
  Info	
  
•  NSTIC	
  Program	
  Office	
  
– hp://www.nist.gov/ns@c/npo.html	
  
•  NSTIC	
  Blog	
  
– hp://ns@c.blogs.govdelivery.com/	
  
•  IDESG	
  
– hps://www.idecosystem.org/	
  
Thanks!	
  

More Related Content

Viewers also liked

CIS14: Protecting Your APIs from Threats and Hacks
CIS14: Protecting Your APIs from Threats and HacksCIS14: Protecting Your APIs from Threats and Hacks
CIS14: Protecting Your APIs from Threats and HacksCloudIDSummit
 
CIS14: Kantara Open Stand Overview
CIS14: Kantara Open Stand OverviewCIS14: Kantara Open Stand Overview
CIS14: Kantara Open Stand OverviewCloudIDSummit
 
CIS14: Identity in OpenStack Icehouse
CIS14: Identity in OpenStack IcehouseCIS14: Identity in OpenStack Icehouse
CIS14: Identity in OpenStack IcehouseCloudIDSummit
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
CIS14: Persistent Trusted Identity
CIS14: Persistent Trusted IdentityCIS14: Persistent Trusted Identity
CIS14: Persistent Trusted IdentityCloudIDSummit
 
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina EhrensvardCIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina EhrensvardCloudIDSummit
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCloudIDSummit
 
CIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCloudIDSummit
 
CIS 2015- Building IAM for OpenStack- Steve Martinelli
CIS 2015- Building IAM for OpenStack- Steve MartinelliCIS 2015- Building IAM for OpenStack- Steve Martinelli
CIS 2015- Building IAM for OpenStack- Steve MartinelliCloudIDSummit
 
CIS14: Kantara Briefing on ID.me
CIS14: Kantara Briefing on ID.meCIS14: Kantara Briefing on ID.me
CIS14: Kantara Briefing on ID.meCloudIDSummit
 
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CloudIDSummit
 
CIS14: Identity at Scale: Next Gen Federation Architectures
CIS14: Identity at Scale: Next Gen Federation ArchitecturesCIS14: Identity at Scale: Next Gen Federation Architectures
CIS14: Identity at Scale: Next Gen Federation ArchitecturesCloudIDSummit
 
CIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCloudIDSummit
 
CIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCloudIDSummit
 
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy WorldCIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy WorldCloudIDSummit
 
CIS14: API Security for the Cloud: Tales from the Trenches
CIS14: API Security for the Cloud: Tales from the TrenchesCIS14: API Security for the Cloud: Tales from the Trenches
CIS14: API Security for the Cloud: Tales from the TrenchesCloudIDSummit
 
CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”CloudIDSummit
 
CIS14: NIST and NSTIC (New Directions in Identity)
CIS14: NIST and NSTIC (New Directions in Identity)CIS14: NIST and NSTIC (New Directions in Identity)
CIS14: NIST and NSTIC (New Directions in Identity)CloudIDSummit
 
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...CloudIDSummit
 

Viewers also liked (19)

CIS14: Protecting Your APIs from Threats and Hacks
CIS14: Protecting Your APIs from Threats and HacksCIS14: Protecting Your APIs from Threats and Hacks
CIS14: Protecting Your APIs from Threats and Hacks
 
CIS14: Kantara Open Stand Overview
CIS14: Kantara Open Stand OverviewCIS14: Kantara Open Stand Overview
CIS14: Kantara Open Stand Overview
 
CIS14: Identity in OpenStack Icehouse
CIS14: Identity in OpenStack IcehouseCIS14: Identity in OpenStack Icehouse
CIS14: Identity in OpenStack Icehouse
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
CIS14: Persistent Trusted Identity
CIS14: Persistent Trusted IdentityCIS14: Persistent Trusted Identity
CIS14: Persistent Trusted Identity
 
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina EhrensvardCIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud Identity
 
CIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in Action
 
CIS 2015- Building IAM for OpenStack- Steve Martinelli
CIS 2015- Building IAM for OpenStack- Steve MartinelliCIS 2015- Building IAM for OpenStack- Steve Martinelli
CIS 2015- Building IAM for OpenStack- Steve Martinelli
 
CIS14: Kantara Briefing on ID.me
CIS14: Kantara Briefing on ID.meCIS14: Kantara Briefing on ID.me
CIS14: Kantara Briefing on ID.me
 
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
 
CIS14: Identity at Scale: Next Gen Federation Architectures
CIS14: Identity at Scale: Next Gen Federation ArchitecturesCIS14: Identity at Scale: Next Gen Federation Architectures
CIS14: Identity at Scale: Next Gen Federation Architectures
 
CIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIs
 
CIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in Action
 
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy WorldCIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
 
CIS14: API Security for the Cloud: Tales from the Trenches
CIS14: API Security for the Cloud: Tales from the TrenchesCIS14: API Security for the Cloud: Tales from the Trenches
CIS14: API Security for the Cloud: Tales from the Trenches
 
CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”
 
CIS14: NIST and NSTIC (New Directions in Identity)
CIS14: NIST and NSTIC (New Directions in Identity)CIS14: NIST and NSTIC (New Directions in Identity)
CIS14: NIST and NSTIC (New Directions in Identity)
 
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
 

Similar to CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?

User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...SPTechCon
 
Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...
Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...
Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...Digital Experience (DX) Summit 2016
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Jisc
 
02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx
02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx
02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptxFortuneNwaiwu1
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Ian Glazer
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceDATAVERSITY
 
From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence Srini Koushik
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseRamez Al-Fayez
 
01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx
01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx
01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptxFortuneNwaiwu1
 
Getting Knowledge Transfer Right Enterprise Wide Webinar
Getting Knowledge Transfer Right Enterprise Wide WebinarGetting Knowledge Transfer Right Enterprise Wide Webinar
Getting Knowledge Transfer Right Enterprise Wide WebinarConcept Searching, Inc
 
Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Bluewire Media
 
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...Concept Searching, Inc
 
Action Intelligence for Social Good
Action Intelligence for Social GoodAction Intelligence for Social Good
Action Intelligence for Social GoodFred Chiang
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Pete Nieminen
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Concept Searching, Inc
 
Managing Information for Impact
Managing Information for ImpactManaging Information for Impact
Managing Information for ImpactDonny Shimamoto
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxnoraelstela1
 

Similar to CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)? (20)

User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
User-Centric Design: How to Leverage Use Cases and User Scenarios to Design S...
 
Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...
Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...
Steve Walker & Seth Earley - Understanding the DX Ecosystem & Developing a Ma...
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
 
02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx
02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx
02-Assess-and-Raise-Your-Digital-Maturity--Phases-1-2.pptx
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterprise
 
01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx
01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx
01-Assess-and-Raise-Your-Digital-Maturity--Executive-Brief.pptx
 
Getting Knowledge Transfer Right Enterprise Wide Webinar
Getting Knowledge Transfer Right Enterprise Wide WebinarGetting Knowledge Transfer Right Enterprise Wide Webinar
Getting Knowledge Transfer Right Enterprise Wide Webinar
 
Best of Intranet Global Forum LA 2015
Best of Intranet Global Forum LA 2015Best of Intranet Global Forum LA 2015
Best of Intranet Global Forum LA 2015
 
Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013
 
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...
 
Action Intelligence for Social Good
Action Intelligence for Social GoodAction Intelligence for Social Good
Action Intelligence for Social Good
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
 
Managing Information for Impact
Managing Information for ImpactManaging Information for Impact
Managing Information for Impact
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?

  • 1. Why  the  Iden*ty  Ecosystem   Steering  Group  (IDESG)?   Ian  Glazer   Delegate-­‐at-­‐Large,  Management  Council  –  IDESG   Board  of  Directors  Member  –  IDESG  Inc.   Senior  Director,  Iden@ty  –  salesforce.com   @iglazer  
  • 2. Why  have  a  strategy   in  the  first  place?  
  • 3. Internet  as  Economic  Engine   •  The  bright  spot  in  the   US  economy   •  Reduce  transac@on   costs  and  inefficiencies   •  Expand  every  business’   reach   •  Moving  more   interac@ons  online  is   the  inevitable  future  
  • 4. Usernames and passwords are broken •  Most people have 25 different passwords, or use the same one over and over •  Even strong passwords are vulnerable…criminals have many paths to easily capture “keys to the kingdom” •  Rising costs of identity theft ÷  11.6M U.S. victims (+13% YoY) in 2011 at a cost of $37 billion ÷  67% increase in # of Americans impacted by data breaches in 2011 (Source: Javelin Strategy & Research) •  A common vector of attack ÷  Sony Playstation, Zappos, Lulzsec, LinkedIn, among dozens of 2011-12 breaches tied to passwords.
  • 5. Identities are difficult to verify over the internet •  Numerous government services still must be conducted in person or by mail, leading to continual rising costs for state, local and federal governments •  Electronic health records could save billions, but can’t move forward without solving authentication challenge for providers and individuals •  Many transactions, such as signing an auto loan or a mortgage, are still considered too risky to conduct online due to liability risks
  • 6. The  Status  Quo  is  Meh   •  No  formal  market  for  iden@ty   •  Poor  choices  of  iden@ty  providers   –  Who  can  and  do  mone@ze  personal  data   •  Meager  controls  for  the  individual   •  Inequitable  use  of  personal  data   •  Privacy  is  increasingly  only  for  the  well-­‐to-­‐do   •  If  moving  transac@ons  online  is  inevitable,  do  we   want  the  status  quo  to  be  the  only  way  we  get   online  services?  
  • 7. What  is  the   IDESG?  
  • 8. Mission The Mission of the Identity Ecosystem Steering Group (IDESG) shall be to govern and administer the Identity Ecosystem Framework in a manner that stimulates the development and sustainability of the Identity Ecosystem. The IDESG will always operate in accordance with the NSTIC’s Guiding Principles. GUIDING PRINCIPLES 1.   Privacy-­‐enhancing  and  voluntary.   2.     Secure  and  resilient.   3.     Interoperable.   4.     Cost-­‐effec@ve  and  easy  to  use.
  • 9. •  IDESG  is  working  to  create  a  world  where   people  trust  the  security  and  privacy  of   online  iden*fica*on  and  confidently   exchange  personal  informa*on  via  the   Internet.   •  IDESG  is  a  government-­‐inspired,   commercially-­‐led,  member-­‐driven   organiza*on  that  is  serving  the  public  good.     •  IDESG  is  at  the  heart  of  the  iden*ty  solu*on,   driving  innova*on  and  serving  as  a  catalyst   for  industry  and  the  economy.    
  • 10. Objectives The activities and work products of the IDESG shall be conducted in support of the following objectives: —  Ensuring that the Identity Ecosystem and Identity Ecosystem Framework conform to the four NSTIC Guiding Principles. —  Administering the process for policy and standards development and adoption for the Identity Ecosystem Framework and, where necessary establishing policies standards for the Identity Ecosystem Framework. —  Adopting and, where necessary, establishing standards for the Identity Ecosystem Framework. —  Certifying that accreditation authorities validate adherence to the requirements of the Identity Ecosystem Framework. Text taken from the Identity Ecosystem Steering Group (IDESG) 2013 Rules of Association. Read more about the IDESG in its policy documents.
  • 12. What  is  the  IDESG   working  on?  
  • 13. 2014 IDESG Goal —  Complete version 1 of the IEF by December 31, 2014 ¡  Will allow a baseline to which self-attestations can occur ¡  Sets the stage for development of a comprehensive compliance and conformance program by December 31, 2015 13
  • 14. Framework Development Plan Components 14 Functional Model   Define Guiding Principle Requirements   Define Initial Risk Model(s)   IEF Compliance/Conformance Program   Implementation Tools  
  • 15. Use  Cases   •  Frame  the  IDESG’s  ini@al  objec@ves  and  scope  of  work     •  Provide  a  basis  for  the  development  of  IDESG  work  products     •  Drive  consensus  among  IDESG  plenary  members  about  the   characteris@cs  of  the  ecosystem  and  iden@ty  ecosystem  framework   they  are  trying  to  bring  into  existence     •  Provide  a  method  for  the  elicita@on  and  capture  the  requirements   of  the  various  NSTIC  cons@tuencies     •  Make  more  concrete  the  applica@on  of  the  NSTIC  guiding  principles   in  terms  of  real-­‐  world  scenarios     •  Serve  as  a  test  target  against  which  IDESG  work  products  can  be   evaluated     •  Serve  as  a  guide  for  the  collec@ve  efforts  of  the  IDESG,  to  maintain   a  common  focus  and  alignment     hp://www.idecosystem.org/index.php?q=filedepot_download/944/1272   hps://www.idecosystem.org/wiki/Use_Cases  
  • 17. Why  and  how  to   get  involved  
  • 18. Why  be  involved   •  Help  shape  an  alterna@ve  to  /  augmenta@on   of  the  status  quo   •  Aid  in  the  crea@on  of  a  true  market  for   iden@ty   •  Grow  your  business   •  Work  with  industry  peers  
  • 19. Why  am  I  involved   •  I’m  walking  catalog  of  an@-­‐paerns   •  Amazing  opportuni@es  to  enrich  our  society   and  businesses  of  kinds  to  beer  achieve  their   missions     •  Rare  that  you  get  an  opportunity  to  of  this   scope  in  any  industry   •  To  know  I  helped  
  • 20. www.idecosystem.org Rules of Association, Membership Agreements, Policies, etc. Can all be found under About - Governance
  • 21. Joining the IDESG —  www.idecosystem.org —  Click Membership - Join
  • 22. How to Get Involved Connect with Members. Join one of the email discussion lists - Post on a forum - Contribute to the Wiki and other projects. Learn and Develop. Read the Member E-Newsletter – Read about upcoming events on the Website - Attend online and in person. Run for a Leadership Position. Advocate. Tell your associates - Include IEDSG in your industry presentations, etc. Present Your Ideas. Submit an idea for group discussion. Share your own experience with your colleagues! Participate. Be a part of the solution!
  • 23. IDESG  10th  Plenary   •  September  17  –  19th  Tampa,  FL   •  In  conjunc@on  with  the  Global  Iden@ty   Summit   •  Hear  about  commiee  progress   •  Help  determine  IDESG’s  roadmap  for  2014   and  beyond   •  hps://www.idecosystem.org/content/save-­‐ date-­‐10th-­‐plenary  
  • 24. More  Info   •  NSTIC  Program  Office   – hp://www.nist.gov/ns@c/npo.html   •  NSTIC  Blog   – hp://ns@c.blogs.govdelivery.com/   •  IDESG   – hps://www.idecosystem.org/