The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University

Slides:



Advertisements
Similar presentations
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Advertisements

Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Paul Caskey Technology Architect June 21, 2007 The University of Texas System Federated Identity Management Initiative
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
HIPAA Vendor Conference Greg Moody Executive Assistant for Health and Human Services Office of Ohio Governor Bob Taft.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Leveraging a Single Platform - Connecting a Statewide Healthcare Ecosystem Michigan Association of Health Plans Rick Murdock Executive Director Michigan.
Starting Your Roadmap: Concepts and Terms Paul Caskey, The University of Texas System Copyright Paul Caskey This work is the intellectual property.
Federations in Texas Barry Ribbeck University of Texas Health Science Center at Houston.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Regents Update New Business Architecture Project 2010 Jan00 meeting notes.doc March 17, 2004 Accelerating the New Business Architecture An Update for the.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Single Sign-On, Federated Authentication and Beyond at NIH Dr. Peter Alterman National Institutes of Health.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Presentation Speakers: Billy Herndon Angel Dronsfield May 2001 duke.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Use case: Federated Identity for Education (Feide) Identity collaboration and federation in Norwegian education Internet2 International Workshop, Chicago,
Athens Building Communities Ed Zedlewski & Lyn Norris UKSG, Warwick, April 2002.
The InCommon Federation The U.S. Access and Identity Management Federation
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Tbilisi, Georgia June 2013 Government Services and Registries.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
CRIX: toward a secure, standards-based, clinical research information exchange.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Federated Authentication at NIH: Trusting External Credentials at Known Levels of Assurance Debbie Bucci and Peter Alterman November, 2009.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
1 Support For Research & National Identity Snapshot Jim Leous, Penn State Ann West, Internet2/InCommon Federation.
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
Hajar Sabuur Johnson & Johnson Worldwide Information Security June 16, 2005
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Enabling Secure Multi-Organization Collaboration Andrew Porter IT Director, Enterprise Architecture Merck & Co., Inc.
1 EDUCAUSE Mid-Atlantic Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Tom Barton, Senior Director for Integration, University of Chicago
University of Texas System
A Business Case for Identity Management in Higher Education
Presentation transcript:

The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University

NMI-EDIT  I dentity management is often seen as a technological infrastructure that supports portals or reduces logins required for central systems. However, emerging trends point to opportunities to leverage it for bottom-line contributions to the institution. Sponsored by NMI-EDIT, this session will discuss why identity management should be part of your business strategy

NMI-EDIT Changes  HE Institutions are not islands  Partnerships and collaborations  Business  Government  Communities  Interactions with externals are increasingly becoming electronic based  HE Institutions are not islands  Partnerships and collaborations  Business  Government  Communities  Interactions with externals are increasingly becoming electronic based

NMI-EDIT Examples  Government - Online Grants  Banks - Online payroll transactions  Utilities & Vendors- Online payments  Students - Online registration  Financial - Online Federal Aid  Information - Online Libraries  Research - Grids, Fastlane, etc..  Courseware - Online course management  Government - Online Grants  Banks - Online payroll transactions  Utilities & Vendors- Online payments  Students - Online registration  Financial - Online Federal Aid  Information - Online Libraries  Research - Grids, Fastlane, etc..  Courseware - Online course management

NMI-EDIT Business Challenges  Support  Scale - too many accounts  Security -  account requirements differences  Management  Trust - the keystone of inter institutional collaboration and a critical business practice  Costs  Support  Scale - too many accounts  Security -  account requirements differences  Management  Trust - the keystone of inter institutional collaboration and a critical business practice  Costs

NMI-EDIT ROI Potentials  Pharmaceutical Industry numbers  > $1 billion per year in identity credentialing models  40% of annual R&D costs attributed to paper based business processes  NE Journal of Medicine  Paperwork = 31% of all health costs ($500 billion in 2004)  Pharmaceutical Industry numbers  > $1 billion per year in identity credentialing models  40% of annual R&D costs attributed to paper based business processes  NE Journal of Medicine  Paperwork = 31% of all health costs ($500 billion in 2004)

NMI-EDIT External Drivers  Federal eGov Initiative  Fastlane  Digital Content Providers  Banking industry  SAFE - Pharmaceutical industry  Certipath -Aerospace  Federal eGov Initiative  Fastlane  Digital Content Providers  Banking industry  SAFE - Pharmaceutical industry  Certipath -Aerospace

NMI-EDIT Fundamentals & Federations  A federation is an association of organizations that come together to exchange information as appropriate about their users and resources in order to enable collaborations and transactions.  Policy based authentication and authorization  IAA are business processes not just technical processes  Provide for Scaleable Identity Management  Standards based community infrastructure  Well defined Trusts  A federation is an association of organizations that come together to exchange information as appropriate about their users and resources in order to enable collaborations and transactions.  Policy based authentication and authorization  IAA are business processes not just technical processes  Provide for Scaleable Identity Management  Standards based community infrastructure  Well defined Trusts

NMI-EDIT IdM Business Practice  We (HE) need to know who we are interacting with as do our partners.  Identity management is evolving from pure technical practices to a business process.  We will not be able to continue using the old methods and practices in the near future.  Government is aware that IdM is an important issue and is making changes in the way they interact electronically with HE.  Legal compliance  We need to understand the value of TRUST  We (HE) need to know who we are interacting with as do our partners.  Identity management is evolving from pure technical practices to a business process.  We will not be able to continue using the old methods and practices in the near future.  Government is aware that IdM is an important issue and is making changes in the way they interact electronically with HE.  Legal compliance  We need to understand the value of TRUST

NMI-EDIT Transitions  How do I sell this to administration?  Not hard to find support in business circles, Pick any IT consulting firm, CIO magazine, Educause, IT auditor reports.  How / where do I begin?  Resources, roadmaps, self evaluations, IT audits See appendix  Business drivers that make IdM a real need for HE  The future of Access?  How do I sell this to administration?  Not hard to find support in business circles, Pick any IT consulting firm, CIO magazine, Educause, IT auditor reports.  How / where do I begin?  Resources, roadmaps, self evaluations, IT audits See appendix  Business drivers that make IdM a real need for HE  The future of Access?

NMI-EDIT Reading the Signs  Title 2 of H.R. 418 (Real ID Act)  HIPAA (PRIVACY)  eGOV (authentication initiative of the Fed)  GLB (protecting consumer personal financial information)  Texas Medical Privacy Act (SB11) (Hipaa on steroids)  Texas S.B. 122 (identity theft - information spill)  Texas BPM 66 (SSN use reform)  Title 2 of H.R. 418 (Real ID Act)  HIPAA (PRIVACY)  eGOV (authentication initiative of the Fed)  GLB (protecting consumer personal financial information)  Texas Medical Privacy Act (SB11) (Hipaa on steroids)  Texas S.B. 122 (identity theft - information spill)  Texas BPM 66 (SSN use reform)

NMI-EDIT What Should campuses do today?  Start building your IdM infrastructure  Approach from a business practice perspective. Look at security, confidentiality, trust and business continuity.  Join a federation, prepare for eGov CAF  Encourage business partners to embrace IdM  Define your policies around good business practices not just easiest technology to implement.  Start building your IdM infrastructure  Approach from a business practice perspective. Look at security, confidentiality, trust and business continuity.  Join a federation, prepare for eGov CAF  Encourage business partners to embrace IdM  Define your policies around good business practices not just easiest technology to implement.

NMI-EDIT  Change is upon us but we don’t have to panic, we just need to prepare.  IdM is a core business practice, and we need to begin to address it in that manner  Trust is a precious and tenuous commodity. We should protect it the way we do other business resources.  Change is upon us but we don’t have to panic, we just need to prepare.  IdM is a core business practice, and we need to begin to address it in that manner  Trust is a precious and tenuous commodity. We should protect it the way we do other business resources.

NMI-EDIT REFERENCES   cuments/CAF.pdf cuments/CAF.pdf    gementWorkingGroup/928   cuments/CAF.pdf cuments/CAF.pdf    gementWorkingGroup/928