1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Role of Senior Management
Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Global Congress Global Leadership Vision for Project Management.
The Changing Face of Higher Ed and the Role of IT as a Strategic Enabler Dave Wallace Chief Information Officer University of Waterloo December 4, 2012.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
Advancing Our Profession INTRODUCTION Why Does It Matter?
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
TEQSA Registration and Material Change Processes Senior Management Summit 15 February 2012 Professor Merran Evans, Pro Vice-Chancellor, Planning and Quality.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
IT Governance and Management
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
EEN [Canada] Forum Shelley Borys Director, Evaluation September 30, 2010 Developing Evaluation Capacity.
Alliance for Strategic Technology (AST) SUNY Business Intelligence Initiative January 8, 2009.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
1 Governance in Identity Management Federations Clair Goldsmith, Ph.D. The University of Texas System Administration.
Building Public Health / Clinical Health Information Exchanges: The Minnesota Experience Marty LaVenture, MPH, PhD Director, Center for Health Informatics.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
National Association of College and University Attorneys 1 November 11, 2009 NACUA Fall 2009 Workshop November 2009.
Internal Auditing and Outsourcing
Peer Information Security Policies: A Sampling Summer 2015.
National Smartcard Project Work Package 8 – Security Issues Report.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Roles and Responsibilities
STRATEGIC DIRECTION UPDATE JANUARY THE VISION AND MISSION THE VISION: ENRICHING LIVES AND CREATING SUCCESSFUL FUTURES. THE MISSION: EDUCATION EXCELLENCE.
Prepared for IAC Scott Baily, Interim Director of ACNS August 13, 2008.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Alaska Staff Development Network – Follow-Up Webinar Emerging Trends and issues in Teacher Evaluation: Implications for Alaska April 17, :45 – 5:15.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
Advancing Our Profession INTRODUCTION Why Does It Matter?
University of Idaho Successful External Program Review Archie George, Director Institutional Research and Assessment Jane Baillargeon, Assistant Director.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Assessment of Portal Options Presented to: Technology Committee UMS Board of Trustees May 18, 2010.
Public Health Data Standards Consortium
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Outsourcing Student at USC Institute for Computer Policy and Law Cornell University, August 2008 Asbed Bedrossian Director of Enterprise Applications.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
DGS Recommendations to the Governor’s Task Force on Contracting & Procurement Review Report Overview August 12, 2002.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Unit 8.2: Effective Implementation Planning HIT Implementation Planning for Quality and Safety Component 12/Unit 81 Health IT Workforce Curriculum Version.
Symposium on Global Scientific Data Infrastructures Panel Two: Stakeholder Communities in the DWF Ann Wolpert, Massachusetts Institute of Technology Board.
Aligning IT Investments (Plan) and the Institutional Strategic Plan Team 2 Ed Pokraka Shelley Reed Jeff Cepull Will Krause Educause Seminars On Academic.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Welcome To Implementation Science 8 Part Webinar Series Kathleen Ryan Jackson Erin Chaparro, Ph.D University of Oregon.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Moving the National Health Information Technology Agenda Forward The Fourth Health Information Technology Summit March 28, 2007 Robert M. Kolodner, MD.
Student Success  What is it?  How can we assess it?  Whose responsibility is it?  What role do you play?
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Community-Based Care Readiness Assessment and Peer Review Overview Department of Children and Families And Florida Mental Health Institute.
Department of Water Affairs and Forestry Department of Water Affairs and Forestry Department of Water Affairs and Forestry Department of Water Affairs.
The Workforce, Education Commissioning and Education and Learning Strategy Enabling world class healthcare services within the North West.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Policy Research Center At Alcorn State University (ASU) Eloris D. Speight, Policy Research Center, Socially Disadvantaged Farmers & Ranchers.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Shared Services and Third Party Assurance: Panel May 19, 2016.
1 EDUCAUSE Mid-Atlantic Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Higher Education’s 2016 Top 10 IT Issues: Divest, Reinvest,
IT Governance Planning Overview
The EDUCAUSE 2019 Top 10 IT Issues
Data, Policy, Stakeholders, and Governance
The EDUCAUSE 2019 Top 10 IT Issues
Presentation transcript:

1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark Bruhn, Associate Vice President for Telecommunications, Indiana University Steve Worona, Director of Policy and Networking Programs, EDUCAUSE March 12, 2007

2 Overview of the Summit Summit with Thought Leaders and Experts  Held in Washington D.C., Nov. 2-3, 2006 –Key message was in the organization of the summit: A highly diverse group of higher education leaders from a wide range of institutional offices –Range of issues discussed reflected in subsequent slides of this presentation  Definition –IdM is an integrated system of business processes, policies, and technologies that enable organizations to facilitate and control their users’ access to online applications and resources, while protecting confidential personal and business information from unauthorized users Identity verification Transaction-time authentication (passwords, PKI, biometric,…) Authorized access Profiles, groups, templates, roles Provisioning, de-provisioning Cross-departmental and cross-institutional Community-wide

3 Drivers for Identity Management  Services, Stakeholder Expectations, Security  Why is IdM needed on campus?  What services, federal compliances, and other advantages are evident?  What responsibilities does the institution have to students, faculty, staff?  How much time do institutions have to accommodate these drivers? 

4 The Business Case for Identity Management Key Points, Strategies, and Follow-up Steps  What key points should be in a business case for IdM?  How and by whom should the business case be developed and presented?  What are the follow-up steps in the case of a positive response; a negative response; a lukewarm response?

5 Institutional Ownership/Governance Breadth of Functional Engagement, Collaboration  Consider that IdM is not just an IT issue. How then do offices such as student enrollment services, human resources, internal auditing, financial services, library, faculty research, instruction, legal counsel, security offices, policy offices, alumni, advancement, card services, health centers, IT and others define their identity management needs on campus?  How can these groups effectively work together on the policy, business process, and technology to develop and move forward on a plan to institute a common identity management system?  What are the responsibilities of the Board, President, Provost?  How would a governance process be instituted and work effectively to accommodate continuous change in requirements, legislation and opportunities?

6 Policy Considerations Scope and Implementation  What should policy cover?  How should policy be established and managed?  How are decisions made on such issues as who gets access, cradle- to-grave management, interim access, proper checks and balances, ease of use vs. more conservative processes, privacy, other security requirements?

7 Risk Management and Assessment Level of Risk, Cost/Benefit Considerations  What are the risks of not properly managing the identities of users?  How should institutions decide on the level of risk they are willing to absorb?  What are the costs/benefits of protecting resources?  How does IdM fit into security strategies?

8 Communication and Education Strategies and Responsibilities  How should users of institutional resources be educated on the importance of IdM? Whose responsibility is this and more general communications?  What part does each component of the institution play?

9 Implementation and Operational Issues Priorities, Resources, Engagement, Tradeoffs, Other Information Systems, Operations  CAMPUS PRIORITIES AND RESOURCES – How does IdM relate to other priorities at our institutions and how does planning and implementation of an IdM infrastructure fit into the ongoing work of the institution? What strategies can a campus use to make progress on implementing of a robust identity management environment on our campuses?  ENGAGEMENT – How can business units on campus stay engaged in the implementation process and maintain a sense of buy-in and urgency?  TRADEOFFS - How does the campus ensure that the IdM plan has an integrated approach to policy, process and technology?  OTHER INFORMATION SYSTEMS – Given that the campus must integrate the IdM system with existing and new information systems, how does this affect application choices of the various functional units and departments? What can be done with information systems that incorporate their own way of doing identity management?  OPERATIONS - What mechanisms are needed to support IdM? What business processes and related technologies are needed?

10 Recommendations to EDUCAUSE Brian Hawkins to deliver message to campus CEOs Develop short readable brochures Provide external consultants Help forge new relationships between technical staff and functional offices Collect and publish best practices Apply cybersecurity taskforce model to IdM Advocacy with government---monitor status of legislation Work with non-IT higher ed associations

11 Questions/Discussion Materials and notes from the IdM Summit are available at: