Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything.

Similar presentations


Presentation on theme: "Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything."— Presentation transcript:

1 Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything

2 IRM Summit Kantara Workshop TimeTopicPresenter 12:00-12:15Welcome Allan Foster 12:15-13:00IRM Landscape, Trusted ID, ICAM, & FCCX Joni Brennan 13:00-13:30NSTIC / IDESG Ian Glazer 13:30-14:15UMA for Enterprise Eve Maler 14:15-14:45Break 14:45-15:15Experian agile IDProofing Kolin Whitley 15:15-15:45Radiant Logic IRM ADAP, Contextual Identity Michel Prompt 15:45-16:15Open-Stand & Collaborative Communities – as core to bizdev Karen McCabe 16:15-16:45Calls to action & Thanks Joni Brennan

3 IRM Summit IRM Landscape Kantara Initiative Overview Trusted ID FICAM & FCCX

4 IRM Summit IRM Landscape

5 The IRM Story

6 Evolution of Identity Employees Consumers Employees & Partners Things Perimeter Perimeter Federation Perimeter-less Federation Cloud / SaaS Perimeter-less Federation Cloud SaaS Mobility Attributes Context Stateless Relationships

7 Identity Relationship Management Model for managing a company’s interactions with current and future customers and “things” using Identity and Access Management (IAM). IRM rapidly and cost effectively unleashes new business opportunities that drive next generation consumer-facing services and top line revenue.

8 Pillars of Identity Relationship Management … CONSUMERS & THINGS over employees ADAPTABLE over predictable REVENUE over operating expense VELOCITY over process and tools INTERNET SCALE over enterprise scale DYNAMIC over static intelligence BORDERLESS over perimeter MODULAR over monolithic BUSINESS PILLARSTECHNICAL PILLARS = = = =

9 CONSUMERS & THINGS over employees only

10 INTERNET SCALE over enterprise scale

11 ADAPTABLE over predictable

12 DYNAMIC INTELLIGENCE over static intelligence

13 TOP LINE REVENUE over operating expense

14 BORDERLESS over perimeter

15 VELOCITY over process and tools

16 MODULAR over monolithic

17 The Next Generation of Identity & Access Management

18 What’s Next?

19 Tell us how you ‘do’ IRM! Join the community @

20 IRM Summit Kantara Initiative Overview

21 Who is Kantara 60+ Leading Organizations, 100’s of Participants, Industry and Governments: Trust Privacy Security Community Trustees At-Large: Government of Canada Trans-European Research Education Networking Association

22 What We Do The building blocks of Trusted Identity…

23 So that you can INFLUENCE CONNECT LEARN PARTNER SHARE GROW

24 What we provide RULES TOOLS EXPERTS

25 IRM Summit Trusted Identity

26 NSTIC – National Strategy for Trusted Identities in Cyberspace Trust is not the goal Identity is not the goal Trust and Identity are tools to enable business and public services growth Trustworthy Identities enable Trusted platforms where businesses connect and services grow.

27 Trusted Identity Kantara Programs verify IdPs and Assessors Policy, Technology, Privacy Reusable program applicable to FICAM, FCCX, NSTIC, EU eIDAS, IDAP, + IdPs, RPs, FOs Our part in the trust chain

28 IRM Summit For FICAM and FCCX

29 FICAM & FCCX FICAM – Federal Identity Credential and Access Management (Policy) Connects citizens to public services leveraging private sector Credential Service Providers Kantara Operates Certification Program – Trust Framework Provider FCCX – Federal Cloud Credential eXchange (Implementation) The technical identity hub that operates FICAM Kantara Operates Certification Program – Trust Framework Provider

30 Trust Framework Model Registration Verification Assessment Certification Trust Status Listing Service Interested Parties Kantara Trust Registry

31 Accredited and Approved Verizon Universal Identity Service (VUIS) IDPV Component Recognition Norton Credential Service Provider Registered Applicant MITREid (LoA 1) organizations in pipeline Kantara Accredited to LoA 1-4 Kantara Approved to LoA 1-3 non-crpyto

32 Component Services Responding to industry experts Kantara members developed the modular component service approach. Component Services: Identity Proofing / Verification Credential Issuance and Management Responding to industry experts Kantara members developed the modular component service approach. Component Services: Identity Proofing / Verification Credential Issuance and Management Identity Proofing & Verification Organizational Trust Credential & Token Management Credential Service Provider

33 MODULAR Assurance

34 CONTEXTUAL Assurance

35 ADAPTABLE Assurance

36 BORDERLESS Assurance

37 Questions? Kantara Executive Director: Joni Brennan joni@kantarainitiative.org General Inquiries: support@kantarainitiative.org JOININNOVATETRUST

38 Shaping the Future of Digital Identity @kantaranews kantarainitiative.org kantarainitiative.org/listinfo/community bit.ly/Kantara_Assurance kantarainitiative.org/membership/


Download ppt "Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything."

Similar presentations


Ads by Google