Is Cloud Identity Management Ready

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Presentation Brought to you by: New Thinking. Are your Managers at Risk ? Are Fleet costs to high ?
Information Technology Division Executive Office for Administration and Finance IT Accessibility Services A new statewide contract - ITS52.
Cloud Brokers and the Health Industry Andrea Bilobrk.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
The Evolution of IT Risk & Compliance February 2012 Rosalyn Ellis, CRISC Susan Hoffman, CISA,CGEIT 1.
Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director.
Jean-Pierre Simonis (Data # 3) Bruce Smith (Data # 3)
Information Security as a Business Enabler Panos Dimitriou, MSc InfoSec, CISSP,CISM Director, Managed Security Services 2007.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Auditing Information Systems (AIS)
Organizational Information So what… Structured 20% Unstructured 80%
SOA in Tax Administration Meeting DG Taxud and SKAT Friday the 12 th of October 2012 Copenhagen.
RBM and Asset Strategy.
Novell Compliance Management Platform Update CMP & CMP Extension for SAP Environments Leo Castro Product Marketing Manager Patrick Gookin.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
SAP Identity Management 7.2 Implementation
Educause Security 2006 © Baylor University Security Assessments for Information Technology Bob Hartland Director of IT Servers and Network Services.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
By : Hisham Kahlifa Shreef Foda Khaled monir Tamer medhat Supervisor : Dr Doaa Nabil.
PRESENTATION ON ENTERPRISE RESOURCE PLANNING. TRAINING VENUE B-SQUARE SOLUTIONS PVT. LTD OKHLA INDUSTRIAL AREA, NEW DELHI  Set up in year 2000  Basically.
ISO Certification For Laboratory Accreditation ISO Certification For Laboratory Accreditation.
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
Digital Asset Management & Storage Program Program Summary
Upgrade to Dynamics 365 Online From On Premise
Eyes Wide Open A little about us…..
Office 365 Futures 8 December 2016.
Company Bundesdruckerei GmbH Headquarters Berlin Industry High tech
Transforming business
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
User-centred system design process
Education Council Work Programme
Using excel as an enterprise business platform
PRESENTED BY MICHAEL PREMUZAK
Company Link Technologies S.A.P.I. de C.V. Headquarters
Auditing Cloud Services
VP, Institutional Services
Introduction to the Federal Defense Acquisition Regulation
Security. Audit. Compliance
Introducing the Standard Financial Statement
and Contract Management
System Development Life Cycle (SDLC)
Auditing Application Controls
Sonata Accelerated Upgrade Assessment
Defining Processes BEFORE ERP
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
Sage HRMS Cyber Recruiter Introduction
Welcome: How to use this presentation
Security. Audit. Compliance.
Knowledge Based Management
Project Management Methodology Documentation Chart
Contents subject to change.
System Development Life Cycle (SDLC)
The Path to IAM Maturity
Accountability Issues in Proposal Writing
What are IAM Key Processes.
Journey to the Cloud – Guidance and Lessons Learned
University of Northern Colorado
Establishing a Strategic Process Roadmap
Presented By: Pravin Parmar
Sachiko A. Kuwabara, PhD, MA
Simplified Supplier Management and eProcurement
STEALTHbits Technologies, Inc.
3PL Software Solutions | Global Shipping Software
Agility Business Management System
Presentation transcript:

Is Cloud Identity Management Ready for Higher Education? PRESENTED BY: Jon Allen

About Baylor Chartered in 1845 Largest Baptist University in the world 17,000 students 3,000 full time employees Waco Texas

Why IDM Security lifecycle Compliance One of the main controls left

Seriously Cloud Keys to the kingdom It nothing sacred IDM is security

History Homebuilt scripts Customized local database Lack of clear ownership Documentation was from memory and code

IDM is Difficult Nothing flashy about being a plumber Ultimate of integrations Project failures rarely technical

Evaluating a Solution Understand your needs Technical requirements Gather information from across the organization

Technical Needs Integrations User interface Flexibility

Often Overlooked Vendor integrations are critical Consultants must know your business Do you want to build the car or drive it

Implementation Six months from start to Go Live Staff must be bought in Testing is critical

Integrations

Full Provisioning Accounts created Licensing managed Authorizations

Soft Provisioning Accounts created Access approvals Manual authorization

Termination List Replaces non interactive emails Allows for audit trail Deprovisioning the most critical part of IDM

Going Live Flipped the switch Edge cases Bad SOA data

IDM is lifecycle Identity is constantly changing Time spent on edge cases Perfection is not possible

Lessons learned Communication Wrong assumptions We want real time Testing is good but….

Journey Continues Added integrations Further refinement Expanding reach (applicants)

Vendor Assessments Include IDM considerations Lack of integrations open risk HECVAT

Results Account provisioning smoother Account removal happening Identities have owners Self service

Questions?