1 EDUCAUSE Mid-Atlantic Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit.

Slides:



Advertisements
Similar presentations
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Advertisements

The Changing Face of Higher Ed and the Role of IT as a Strategic Enabler Dave Wallace Chief Information Officer University of Waterloo December 4, 2012.
Advancing Our Profession INTRODUCTION Why Does It Matter?
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
IT Governance and Management
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Peer Information Security Policies: A Sampling Summer 2015.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity Management 2.0 George O. Strawn NSF CIO.
Prepared for IAC Scott Baily, Interim Director of ACNS August 13, 2008.
Advancing Our Profession INTRODUCTION Why Does It Matter?
Outsourcing Student at USC Institute for Computer Policy and Law Cornell University, August 2008 Asbed Bedrossian Director of Enterprise Applications.
DGS Recommendations to the Governor’s Task Force on Contracting & Procurement Review Report Overview August 12, 2002.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Shared Services and Third Party Assurance: Panel May 19, 2016.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
January 23,  Balance state’s higher education long range plan and agency operations in the required strategic plan;  Involve agency staff in.
JMFIP Financial Management Conference
Moving Towards Information Literacy Through Data Governance
Tom Barton, Senior Director for Integration, University of Chicago
Principles of Good Governance
Job Titles Examples Used for HISD Nonexempt Jobs
BruinTech Vendor Meet & Greet December 3, 2015
Dr. Jo Alice Blondin, President, Clark State Community College
IT Audit Processes and Audit
Updating the Value Proposition:
FY17 End of Year Goals Summary FY17: Top 40 Goals Assessment
New Faculty Orientation Provost’s Report August 22, 2016
SACSCOC Fifth-Year Readiness Audit
Higher Education’s 2016 Top 10 IT Issues: Divest, Reinvest,
Trust, Accountability and Integrity: Board Responsibility for
Ivor Beazley, World Bank
Decrypting Data Compliance in China
Orlando Leon • Cynthia Herrera Lindstrom • Joanna Lyn Grama
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
The EDUCAUSE 2018 Top 10 IT Issues
Information Security: Risk Management or Business Enablement?
IT Governance Planning Overview
Institute of Medicine’s Community Health Improvement Process (CHIP)
Enterprise Risk Management
UNLV Data Governance Executive Sponsors Meeting
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
IS4550 Security Policies and Implementation
PASSHE InCommon & Federated Identity Workshop
Registrars are a Barrier to Collaboration: Truth or CIO Pretext?
Engaging Institutional Leadership
“We don’t have enough staff assigned to making IT accessible!”
Assistant Vice President and Chief Technology Officer
The EDUCAUSE 2019 Top 10 IT Issues
Student Data & Privacy.
Survey on IT Governance CSG Winter Duke January 4, 2006
Selecting a Health Care
Trends in Postsecondary Data Policy & Institutional Data Use
Penn State University Change Initiatives Presented By: Matthew Bell Anjaih Clemons Obie Evans Bruce Kastner.
Technical Issues with Establishing Levels of Assurance
Data, Policy, Stakeholders, and Governance
Assessing Students With Disabilities: IDEA and NCLB Working Together
The EDUCAUSE 2019 Top 10 IT Issues
Project leader: Richard Morton Lead Editor: Jalal Benhayoun
Shasta CCD Board Retreat CEO Search, Accreditation & Student Success
Presentation transcript:

1 EDUCAUSE Mid-Atlantic Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Suresh Balakrishnan, Deputy CIO, University System of Maryland Mary Anne Mahin, Vice President of HR, Georgetown University Dr. Donald Z. Spicer, CIO, University System of Maryland January 18, 2007

2 Overview of the Summit Summit with Thought Leaders and Experts  Held in Washington D.C., Nov. 2-3, 2006 –Key message was in the organization of the summit: A highly diverse group of higher education leaders from a wide range of institutional offices –Range of issues discussed reflected in subsequent slides of this presentation  Definition –IdM is an integrated system of business processes, policies, and technologies that enable organizations to facilitate and control their users’ access to online applications and resources, while protecting confidential personal and business information from unauthorized users User Authentication Access and restrictions Account profiles Passwords and other attributes supportive of users’ roles/profiles on one or more applications or systems

3 Drivers for Identity Management Services, Stakeholder Expectations, Security  Why is IdM needed on campus?  What services, federal compliances, and other advantages are evident?  What responsibilities does the institution have to students, faculty, staff?  How much time do institutions have to accommodate these drivers?

4 The Business Case for Identity Management Key Points, Strategies, and Follow-up Steps  What key points should be in a business case for IdM?  How and by whom should the business case be developed and presented?  What are the follow-up steps in the case of a positive response; a negative response; a lukewarm response?

5 Institutional Ownership/Governance Breadth of Functional Engagement, Collaboration  Consider that IdM is not just an IT issue. How then do offices such as student enrollment services, human resources, internal auditing, financial services, library, faculty research, instruction, legal counsel, security offices, policy offices, alumni, advancement, card services, health centers, IT and others define their identity management needs on campus?  How can these groups effectively work together on the policy, business process, and technology to develop and move forward on a plan to institute a common identity management system?  What are the responsibilities of the Board, President, Provost?  How would a governance process be instituted and work effectively to accommodate continuous change in requirements, legislation and opportunities?

6 Policy Considerations Scope and Implementation  What should policy cover?  How should policy be established and managed?  How are decisions made on such issues as who gets access, cradle- to-grave management, interim access, proper checks and balances, ease of use vs. more conservative processes, privacy, other security requirements?

7 Risk Management and Assessment Level of Risk, Cost/Benefit Considerations  What are the risks of not properly managing the identities of users?  How should institutions decide on the level of risk they are willing to absorb?  What are the costs/benefits of protecting resources?  How does IdM fit into security strategies?

8 Communication and Education Strategies and Responsibilities  How should users of institutional resources be educated on the importance of IdM? Whose responsibility is this and more general communications?  What part does each component of the institution play?

9 Implementation and Operational Issues Priorities, Resources, Engagement, Tradeoffs, Other Information Systems, Operations  CAMPUS PRIORITIES AND RESOURCES – How does IdM relate to other priorities at our institutions and how does planning and implementation of an IdM infrastructure fit into the ongoing work of the institution? What strategies can a campus use to make progress on implementing of a robust identity management environment on our campuses?  ENGAGEMENT – How can business units on campus stay engaged in the implementation process and maintain a sense of buy-in and urgency?  TRADEOFFS - How does the campus ensure that the IdM plan has an integrated approach to policy, process and technology?  OTHER INFORMATION SYSTEMS – Given that the campus must integrate the IdM system with existing and new information systems, how does this affect application choices of the various functional units and departments? What can be done with information systems that incorporate their own way of doing identity management?  OPERATIONS - What mechanisms are needed to support IdM? What business processes and related technologies are needed?

10 Recommendations to Educause Brian Hawkins to deliver message to campus CEOs Develop short readable brochures Provide external consultants Help forge new relationships between technical staff and functional offices Collect and publish best practices Apply cybersecurity taskforce model to IdM Advocacy with government---monitor status of legislation Work with non-IT higher ed associations

11 Questions/Discussion Materials and notes from the IdM Summit are available at: