|
IDENTITY AND PRIVACY STRATEGIES TRACK 2005
Wednesday July 13, 2005
Thursday July 14, 2005
<< Return to 2005
Archive Index
Identity's Ascendancy: Managing Critical
Business Infrastructure
Effective identity management (IdM) systems have
become a core requirement for today's networked
business. They're essential for controlling access
to protected resources, for example, ensuring
the level of accountability required by auditors.
IdM is also a critical component of customer-facing
applications, enabling the personalization and
self-service features that today's Web-savvy customer’s
demand, while complying with global privacy regulations.
In other words, digital identity and the tools
necessary to manage it are now critical parts
of the business infrastructure.
The Identity and Privacy Strategies (IdPS) track
at Catalyst Conference 2005 will continue Burton
Group's leadership in defining where identity
management is, and where it's going. We'll focus
on the identity management strategies that are
crucial to securing today's virtual enterprise
and give you a clear picture of how to manage
identity infrastructure, not as a set of technologies,
but as the critical business infrastructure it
has become.
To help you understand how best to leverage identity
infrastructure in your organization, the IdPS
track will address deployment and scaling issues,
and assess progress toward widely accepted identity,
privacy, federation, and trust standards. We'll
also explore the key trends that impact enterprise
deployment of identity management systems, including
a reality check on whether these systems are fulfilling
their promise. You'll learn about business obstacles
to broad adoption of federated identity, consequences
of further industry consolidation, and the emergence
of a new generation of identity services.
TOP
Identity and Privacy Strategies
Track - Wednesday July 13,
2005
Reality Check: Delivering on the IdM
Promise
On the first day of the conference, the IdPS track
will examine the regulatory, governance, and process
challenges that organizations face as they deploy
and manage identity programs. Effective identity
management requires a program that combines technical
architecture, products, and an understanding of
the forces that drive requirements, including
business priorities, processes, organizational
responsibilities, audit and security controls,
and privacy issues.
Regulatory compliance pressures are accelerating
investments in identity infrastructure and identity-based
security technologies. At the same time, business
infrastructure must be flexible enough to accommodate
mergers, acquisitions, and divestitures while
maintaining audit, privacy, and security controls.
Well-architected identity systems leverage identity
integration, virtualization, and federation services
to enable appropriate distribution of identity
administration between internal and external organizations.
The IdPS track will give you a better understanding
of the identity program you need to succeed. We'll
define that program in terms of its elements.
We'll also tell you what you can (and should)
do today, and how to prepare for tomorrow.
Topics include:
- Identity Reality Check
>
- Assessing the maturity of
identity programs and enabling technologies
- Are organizations achieving
the expected ROI and business benefits?
- Will the next generation
of identity services break down the barriers
between applications and the identity infrastructure?
- Privacy and Other Regulations
- Are you meeting the spirit
or letter of law(s)?
- What are the enforcement
trends and legal precedents?
- Stance on regulatory compliance:
Minimalist view or over-engineered solution,
how far do you go, and what are the implications?
- Building a privacy compliance
framework
- Organizational Models
and Governance
- How to organize and govern
your identity management environment
- Preparing a business justification
that shows how identity earns its keep
- Managing identities when
outsourcing
- Responding to the failed
audit
- Role Engineering
- In search of taxonomy: What
are the distinctions between roles, rules,
and policies?
- When do roles make sense,
and for what purpose?
- Understand the problem, and
recognize the risks
- Identity Lifecycle
and Process Workflow(s)
- Rigorous identity assurance/proofing
practices for strong identity
- Knowledge-based authentication
- Audit requirements for control,
approval, and separation of duties
- Self-service and delegated
administration
- Identity Program Capabilities
and Metrics
- How to assess the effectiveness
of identity management programs
- Assessing the strength of
your identity domain, or your partner's
- Do capability maturity models
help?
- Incorporating awareness training
into the identity program
TOP
Identity and Privacy Strategies
Track - Thursday July 14,
2005
IdM Markets and Architecture: Evolution
and Innovation
Identity management plays a strategic role in
application platform and network infrastructures.
That crucial role is driving a transition in the
identity management market. It's also driving
innovation in identity management architectures.
On the second day of the IdPS track, Catalyst
Conference will focus on the evolving market and
architectural innovation.
As service-oriented architecture (SOA) evolves,
along with the Web services framework and on-demand
computing, identity management will emerge as
a set of services. Within the service-oriented
architecture, identity services will enable better
application integration. And by creating the foundation
for security and compliance within SOAs, identity
services will play a significant role in turning
the network into the platform. But getting there
from here will require flexible architectures,
and a clear understanding of how and when to implement
identity infrastructure to support SOA.
These architectural innovations are also playing
a role in the evolution of the identity management
market. Increasingly, for example, customers are
buying identity services from very large IT vendors
with global channels, huge customer bases, and
extensive support services. Product suites are
now common, and identity services themselves are
moving from standalone after-market products into
platform products, including application servers,
operating systems, and middleware components.
But can these suites meet all needs? And how will
products integrate and interoperate?
On the second day of the conference, we'll explore
these issues in depth, giving you a clear picture
of where things are, and where things are going.
Burton Group experts and enterprise customers
will share deployment experiences and best practices,
which will give you a head start on deploying
solutions in your organization. As the IdPS track
covers these and other topics, you'll gain a better
understanding of what's real and what's hype,
and what infrastructure components you can count
on.
Topics include:
- Identity Market and
Trends
- Next wave of consolidation
- Product suites that don't
deliver benefits of deep integration
- Risk to innovation as smaller
vendors vanish
- Identity Services
- Systematic inter-relation
of technologies
- Identity integration
- Synchronization and virtualization
- Federation
- Status of convergence
- Single sign-on (SSO) across
identity domains
- Overcoming obstacles and
business challenges
- Assessing various industry
initiatives
- Provisioning
- Implementation reality check
- Basic provisioning - an essential
tool for internal control
- Advanced provisioning successes
and disappointments
- Relation of provisioning
to roles, virtual directory services, and
federation
- Setting the right expectations,
meeting enterprise needs
- The Big Challenge:
Policy and Semantics
- What's the probability of
interoperable policy, and when does it make
sense to push the envelope?
- What can you do today with
attributes, policy expressions, and policy
tools?
TOP
<< Back to Catalyst
Conference North America 2005 Archive
|
|