Register for Burton Group Catalyst 2006
Burton Group Catalyst Conference Burton Group Catalyst Conference 2006 - San Francisco June 12-14

IDENTITY AND PRIVACY STRATEGIES TRACK 2005

Wednesday July 13, 2005
Thursday July 14, 2005
<< Return to 2005 Archive Index

Identity's Ascendancy: Managing Critical Business Infrastructure

Effective identity management (IdM) systems have become a core requirement for today's networked business. They're essential for controlling access to protected resources, for example, ensuring the level of accountability required by auditors. IdM is also a critical component of customer-facing applications, enabling the personalization and self-service features that today's Web-savvy customer’s demand, while complying with global privacy regulations. In other words, digital identity and the tools necessary to manage it are now critical parts of the business infrastructure.

The Identity and Privacy Strategies (IdPS) track at Catalyst Conference 2005 will continue Burton Group's leadership in defining where identity management is, and where it's going. We'll focus on the identity management strategies that are crucial to securing today's virtual enterprise and give you a clear picture of how to manage identity infrastructure, not as a set of technologies, but as the critical business infrastructure it has become.

To help you understand how best to leverage identity infrastructure in your organization, the IdPS track will address deployment and scaling issues, and assess progress toward widely accepted identity, privacy, federation, and trust standards. We'll also explore the key trends that impact enterprise deployment of identity management systems, including a reality check on whether these systems are fulfilling their promise. You'll learn about business obstacles to broad adoption of federated identity, consequences of further industry consolidation, and the emergence of a new generation of identity services.

TOP

Identity and Privacy Strategies Track - Wednesday July 13, 2005

Reality Check: Delivering on the IdM Promise

On the first day of the conference, the IdPS track will examine the regulatory, governance, and process challenges that organizations face as they deploy and manage identity programs. Effective identity management requires a program that combines technical architecture, products, and an understanding of the forces that drive requirements, including business priorities, processes, organizational responsibilities, audit and security controls, and privacy issues.

Regulatory compliance pressures are accelerating investments in identity infrastructure and identity-based security technologies. At the same time, business infrastructure must be flexible enough to accommodate mergers, acquisitions, and divestitures while maintaining audit, privacy, and security controls. Well-architected identity systems leverage identity integration, virtualization, and federation services to enable appropriate distribution of identity administration between internal and external organizations.

The IdPS track will give you a better understanding of the identity program you need to succeed. We'll define that program in terms of its elements. We'll also tell you what you can (and should) do today, and how to prepare for tomorrow.

Topics include:

  • Identity Reality Check >
    • Assessing the maturity of identity programs and enabling technologies
    • Are organizations achieving the expected ROI and business benefits?
    • Will the next generation of identity services break down the barriers between applications and the identity infrastructure?
  • Privacy and Other Regulations
    • Are you meeting the spirit or letter of law(s)?
    • What are the enforcement trends and legal precedents?
    • Stance on regulatory compliance: Minimalist view or over-engineered solution, how far do you go, and what are the implications?
    • Building a privacy compliance framework
  • Organizational Models and Governance
    • How to organize and govern your identity management environment
    • Preparing a business justification that shows how identity earns its keep
    • Managing identities when outsourcing
    • Responding to the failed audit
  • Role Engineering
    • In search of taxonomy: What are the distinctions between roles, rules, and policies?
    • When do roles make sense, and for what purpose?
    • Understand the problem, and recognize the risks
  • Identity Lifecycle and Process Workflow(s)
    • Rigorous identity assurance/proofing practices for strong identity
    • Knowledge-based authentication
    • Audit requirements for control, approval, and separation of duties
    • Self-service and delegated administration
  • Identity Program Capabilities and Metrics
    • How to assess the effectiveness of identity management programs
    • Assessing the strength of your identity domain, or your partner's
    • Do capability maturity models help?
    • Incorporating awareness training into the identity program

TOP


Identity and Privacy Strategies Track - Thursday July 14, 2005

IdM Markets and Architecture: Evolution and Innovation

Identity management plays a strategic role in application platform and network infrastructures. That crucial role is driving a transition in the identity management market. It's also driving innovation in identity management architectures. On the second day of the IdPS track, Catalyst Conference will focus on the evolving market and architectural innovation.

As service-oriented architecture (SOA) evolves, along with the Web services framework and on-demand computing, identity management will emerge as a set of services. Within the service-oriented architecture, identity services will enable better application integration. And by creating the foundation for security and compliance within SOAs, identity services will play a significant role in turning the network into the platform. But getting there from here will require flexible architectures, and a clear understanding of how and when to implement identity infrastructure to support SOA.

These architectural innovations are also playing a role in the evolution of the identity management market. Increasingly, for example, customers are buying identity services from very large IT vendors with global channels, huge customer bases, and extensive support services. Product suites are now common, and identity services themselves are moving from standalone after-market products into platform products, including application servers, operating systems, and middleware components. But can these suites meet all needs? And how will products integrate and interoperate?

On the second day of the conference, we'll explore these issues in depth, giving you a clear picture of where things are, and where things are going. Burton Group experts and enterprise customers will share deployment experiences and best practices, which will give you a head start on deploying solutions in your organization. As the IdPS track covers these and other topics, you'll gain a better understanding of what's real and what's hype, and what infrastructure components you can count on.

Topics include:

  • Identity Market and Trends
    • Next wave of consolidation
    • Product suites that don't deliver benefits of deep integration
    • Risk to innovation as smaller vendors vanish
  • Identity Services
    • Systematic inter-relation of technologies
    • Identity integration
    • Synchronization and virtualization
    • Federation
    • Status of convergence
    • Single sign-on (SSO) across identity domains
    • Overcoming obstacles and business challenges
    • Assessing various industry initiatives
  • Provisioning
    • Implementation reality check
    • Basic provisioning - an essential tool for internal control
    • Advanced provisioning successes and disappointments
    • Relation of provisioning to roles, virtual directory services, and federation
    • Setting the right expectations, meeting enterprise needs
  • The Big Challenge: Policy and Semantics
    • What's the probability of interoperable policy, and when does it make sense to push the envelope?
    • What can you do today with attributes, policy expressions, and policy tools?

TOP

 

<< Back to Catalyst Conference North America 2005 Archive

 

Register by February 28, 2006 for best Early Bird pricing

CLICK HERE for details