irmsummit europe 2014 - selected highlights
Post on 02-Jul-2015
294 Views
Preview:
DESCRIPTION
TRANSCRIPT
IRMSummit Europe
Selected Highlights
http://irmsummit.com
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
Predictions on identity use cases -- what is in 2015-2018-2020 ?
Identity management in 2020 will be redefining concepts to include what people own, share and use.
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Minimize user friction by merging enterprise and B2C architecture design teams, giving preference to
consumer-oriented designs.
Provide brokers between modern cloud and legacy applications.
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
Banks and governments to be identity providers.
Of course there will the idea of social identity...But how much can you trust a Facebook Identity? -
It's a matter of the identity assurance-level .Get the right level at the right price!
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
Role based access control shifts to Attribute-based access control!Attributes that (may also) come from other IdPs.
Action required: Shift slowly from RBAC to ABAC, esp. in new applications.
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
We've got homework :
1. Update and explain IAM vision2. Create an adaptive IAM team3. Pilot an adaptive IAM intiative4. Encourage to take risks
Future-proofing consumer identity - Gregg Kreizman (Gartner Research)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Using identities to empower CIOs - Mike Ellis (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
IAM Market / Foundation is originally created for the employee internal zone
IRM is the next step from IAM where "Relationship" stands for the awareness of the identities and interaction in-between identity aware subjects likes devices, providers, services and
other persons.
Using identities to empower CIOs - Mike Ellis (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Customers are expecting a seamless, secure and insightful way to get identified and get access to their digital products.
Identity projects are shifting from a cost centers to revenue generators.
Using identities to empower CIOs - Mike Ellis (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Using identities to empower CIOs - Mike Ellis (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Do we have a round wheel yet? - Ian Glazer (SalesForces)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
The right access to the right people-and-things, the right time+right place ... but how round are the IAM Industry Standards available as of today?
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Do we have a round wheel yet? - Ian Glazer (SalesForces)
Today we can handle a reasonable number of identities. But will it be enough in the future?
Unreasonably large number of relationships between unreasonably large number of people and things,
each with attributes.
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Do we have a round wheel yet? - Ian Glazer (SalesForces)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Do we have a round wheel yet? - Ian Glazer (SalesForces)
Spoiler Alert :)
With OpenID Connect and SAML the identity assurance works.
But the collective shame of IAM is password vaulting.
The mobile world will put preassure on it, because entering password on smartphone suck..
.. use federated SSO instead.
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Do we have a round wheel yet? - Ian Glazer (SalesForces)
First: Adopt standards, if you aren't using identity standards, you are inventing your own wheel.
Second: Help other to adopt standards. Build SDKs to help people use OpenID and SAML.
Third: Demand standards. From your identity technology providers. Demand standards. From your business service
providers. Demand standards. From your own development teams. Demand standards.
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Do we have a round wheel yet? - Ian Glazer (SalesForces)
Identity Management and Behavioral Analytics – Eric LaBadie (Guardian Analytics, Inc.)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Identities get stolen by using weak credentials. All to often...
How can we trust the consumer with passwords like "Password123" or "monkey"?
Criminals today are more effective than ever at targeting users..
Identity Management and Behavioral Analytics – Eric LaBadie (Guardian Analytics, Inc.)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
The Bad News: Unpleasant actors successfully can hide behind good credentials.
Identity Management and Behavioral Analytics – Eric LaBadie (Guardian Analytics, Inc.)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
The Good News: Bad behaviour always stands out!
Identity Management and Behavioral Analytics – Eric LaBadie (Guardian Analytics, Inc.)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Identity Management and Behavioral Analytics – Eric LaBadie (Guardian Analytics, Inc.)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Identity Management and Behavioral Analytics – Eric LaBadie (Guardian Analytics, Inc.)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Focus on the Business – Identitiy will support you – Henk Marsman (Deloitte)
Focus on the Business – Identitiy will support you – Henk Marsman (Deloitte)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Focus on the Business – Identitiy will support you – Henk Marsman (Deloitte)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Bundespolizei
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Bundespolizei
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Touch ID for IRM – Thomas Bostrom Jorgensen (Encap Sucurity)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Touch ID for IRM – Thomas Bostrom Jorgensen (Encap Sucurity)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
The Apple Touch ID is not a strong security control. It's more like a "convenient" security concept.
It can reduce customer friction and increase convenience. That's much better than touching a 4
digit pin.
Idea is, to use the TouchID as a dynamic multi-factor authentication for service providers.
Touch ID for IRM – Thomas Bostrom Jorgensen (Encap Sucurity)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Touch ID for IRM – Thomas Bostrom Jorgensen (Encap Sucurity)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
New Innovations in Consent, Privacy and User-Managed Access - Eva Maler (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
New Innovations in Consent, Privacy and User-Managed Access - Eva Maler (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
UMA is a OAuth-based and web-based access management protocol for sharing sensitive
information.
Individual empowerment and privacy enhancement require control over and visibility into data sharing
with a variety of parties, not just applications that the individual himself or herself uses.
New Innovations in Consent, Privacy and User-Managed Access - Eva Maler (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Selective person-to-person“Alice to Dr.Bob Corporation” sharing.
New Innovations in Consent, Privacy and User-Managed Access - Eva Maler (ForgeRock)
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Stimmen , Zitate und Plauderei
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Identity Management is first of all a big integration challenge.
CRM vs. IRM ?! Der 'Kunde im CRM' istder 'User im LDAP' !
Honor the legacy! Establish a bimodal IAM.
Identity is the brain behind what your connected applications or connected products can do.
Stimmen , Zitate und Plauderei
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
The key piece is the value of identity. The single customer profile and the identity platform ties business units together!
CRM did not really “touch” the customer. IRM does....identity is real customer relationship management.
The TouchID is not just a “unlock iphone” feature. It essentially turns the smartphone into a fingerprint device.
Stimmen , Zitate und Plauderei
IRM Summit Europe | Selected Highlights | Team KD IT Business Partner & Architecture
Behind every device is a customer. Not the product is connected to the company, it is the customer who is connected.
Think about why you are collecting data.
Be bold, but not reckless on a path to the IRM Future
There’s a common understanding that all the things will have identities and relations with other identities.
http://de.slideshare.net/ForgeRock/2-8-20consumer-identity-for-forgerock-irm-summithttp://www.axiomatics.com/solutions/role/business-managers/abac-beyond-rbac.html
http://de.slideshare.net/ForgeRock/1-8-20ellisirmsummit169
https://www.tuesdaynight.org/2014/09/04/do-we-have-a-round-wheel-yet.htmlhttp://www.slideshare.net/ForgeRock/3-8-50salesforcedo-we-have-a-round-wheel-v8
https://www.youtube.com/watch?v=kP6JQsEtLaQ
http://de.slideshare.net/ForgeRock/6-10-50ga-fr-euro-summit-2014
http://www.easypass.eu(not presented at the conference)
http://de.slideshare.net/ForgeRock/3-9-20emea-summit-new-innovations-in-consent-privacy-and-umahttps://beta.forgerock.org/openuma/
Background Footage
Ludovic Poitoufreedigitalphotos.netThomas Havemeister
https://ludopoitou.wordpress.com/
top related