© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges.

Slides:



Advertisements
Similar presentations
Economic Tussles in Federated Identity Management Tyler Moore joint work with Susan Landau WEIS 2011.
Advertisements

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. trans for ma tion : a.
1 GROUP-8. 2 PPT downloaded from
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Identity HP Labs: Challenges and Opportunities
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
The State of Security Management By Jim Reavis January 2003.
Alice E. Marwick New York University PhD Candidate Department of Culture and Communication Selling Your Self: Examining Values in Identity 2.0 September.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Mashing Up with User-Centric Identity America Online LLC John Panzer, Praveen Alavilli.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Policy Management: An Overview Marco.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Panel: Business Impact of Research.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Using Digital Credentials On The World-Wide Web M. Winslett.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Anywhere Defect.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Identity and Access Management Business Ready Security Solutions.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 Enterprise and Global Management of Information Technology.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
John “JG” Chirapurath Director, Identity & Security BG Microsoft SIA-205 Business Ready Security.
Overview of COBIT5 and Impact on Local Content for IT By Mrs Tokunbo Martins Director Banking Supervision (Central Bank of Nigeria)
Component 6 - Health Management Information Systems Unit 2-2 -Hardware and Software Supporting Health Information Systems.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
What does the future hold? Threat Horizon 2011 Adrian Davis 2009 Workshop on Cyber Security and Global Affairs August 2009.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP-ITU Innovation Center Dicle Erkul.
Identity Assurance Emory University Security Conference March 26, 2008.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
An SAIC Company Rich Fialkoff Executive Director Customer Care and Billing Solutions (732) March 15, 2001 Operations Support.
Identity Management and Enterprise Single Sign-On (ESSO)
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Global Big Data Infrastructure Market WEBSITE Single User License: US$ 2500 No of Pages: 51 Corporate User License:
Global Multi-factor Authentication Market WEBSITE Single User License: US$ 2500 No of Pages: 51 Corporate User License:
INNOVATIVE USE OF ICTS: TOWARDS A CITIZEN- DRIVEN PUBLIC SECTOR Barbara-Chiara Ubaldi Project Manager, E-government Public Sector Reform Directorate for.
- Company Confidential - Corporate Overview March 2015.
Health Management Information Systems Health Information Systems Overview Lecture b This material Comp6_Unit2b was developed by Duke University, funded.
Data and Applications Security Developments and Directions
Federated IdM Across Heterogeneous Clouding Environment
Secure & Unified Identity
Company Overview & Strategy
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Azure Enables Mobility, Easy Sync and Share, and Allows Companies to Retain Data Control MINI-CASE STUDY “Azure provides the full stack of technology that.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Collaboration Oriented Architecture COA Position Paper An Overview
E-identities (and e-signatures)
Presentation transcript:

© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges and Opportunities IdM Panel at TrustBus 2007 Marco Casassa Mont Hewlett-Packard Labs

Overview Identity Management (IdM): A Very Complex & Active Area  Consolidation of “Classic” IdM in the Enterprise  New Trends Impacting on Identity and IdM  New IdM Initiatives Old and New Identity Management Issues Top Challenges and Opportunities

31 June, 2015 Identity Management: A Very Complex Area … Users Enterprises/ Orgs Government Old and New Threats Consolidation of Traditional Identity Management in Enterprises Flow of Identity Information Across Boundaries … Whole New Set of Initiatives in the Identity Management Space Identity Information Stored all Over the Places (Devices, Service Providers, Enterprises/Orgs, Govs Sites, etc.)

41 June, 2015 Identity Management: Consolidation in the Enterprise …

51 June, 2015 New Trends Impacting Identity Management Users Enterprises/ Orgs Government - Web 2.0, - Collaborative Networks, - Content Generation & Mash-up, … - Enterprise (Web) Convergence IP/Telco Networks (NGN) - Business-driven IT Management - Risk & Assurance Management - New Laws and Legislation - … - Terrorism, - New Global Threats, - New Legislation, Laws, … - Mobility, - New types and range of Personal Devices - New Services - Convergence of IP/Telco in Next Generation Networking (NGN)

61 June, 2015 Identity Management: A Whole New Set of Initiatives … Users Enterprises/ Orgs Government User-Centric IdM (Identity 2.0) Driven by Web 2.0 & Federated IdM: - OpenId - InfoCard - Sxip - … Identity 2.0 & Web 2.0 for Enterprises: - Content-aware Access Control … National Identity IDs/Cards (biometric IDs, etc.) Device-based Identity Mgmt: - Liberty Alliance Identity-Capable Platforms (ICP) - Next Generation Trusted Computing (TCG) - Network-based Identities … Identity as a Service Privacy Laws, Other Legislation (US RealID, etc.) Business-driven IT Management and Implications for IdM: - ITIL, Cobit, BS7799, … - Federated Identity Assurance Identity Governance & Compliance to Laws - Role Mining in Complex Orgs/M&As, …

71 June, 2015 Identity Management: Old and New Issues … Users Enterprises/ Orgs Government - Privacy: (pseudo-)anonymity vs. need to disclose - New Potential Risks introduced by Identity 2.0 (e.g. Identity Phishing …) - Identity Thefts and Frauds - Lack of (Digital) Education - Lack of User Control on Data - Lack of Assurance and Trust - Too much reliance on Human-based Processes: Lack of Automation of Privacy Management and Compliance Management. … - Lack of IdM + Privacy Standards - Little control given to users over data - Lack of Control, Assurance and Accountability in Outsourced Environments - … - New Potential Privacy Threats for Citizens - Cross-Organisations Data Correlations - …

81 June, 2015 IdM: Challenges and Opportunities (Next 5 Years) Top Challenges Top Opportunities 1. Improve Users’ Control on Their Personal Data (within Devices and Orgs) 2. Enterprise Privacy Management: Automation of Privacy Management and Regulatory Compliance in Enterprises 3. Alignment of Enterprise IdM Practices and Solutions to Business-driven IT Management (ITIL, etc.): Identity Governance, Risk and Assurance Mgmt 4. Secure, Privacy-aware and Trustworthy Federated IdM/SSO 5.Interoperability between various Federated IdM/SSO initiatives 6. Standards to enable Data Exchange between Enterprises/Orgs driven by Security and Privacy Policies and Users’ Preferences Exploitation of Web Identity 2.0 in Enterprises/Organisations … 1. Improve overall Enterprise IdM Practice and User Experience/Control … 2. New Research & Development Opportunities in the Identity Management Area both at the User and Enterprise sides 3. New Business Opportunities in the Identity Management space in terms of IdM Services, Solutions, Products, …