Consumer-Focused Identity Management
- LANGUAGE: English DATE: Thursday, April 14, 2016 TIME: 4:00pm AEST
Re-thinking the traditional differences between employees and customers: moving from Identity Management to Identity Relationship Management
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos and other traditional businesses with large user bases are finding it hard to grapple with the IAM needs of the services they deliver. What's worse, these organisations are missing out on opportunities to build deep, engaging relationships with their customers through an archipelago-like siloed approach to customer identity.
By simply creating duplicate IAM systems for consumers, often confusing consumer IAM requirements with employee requirements, is not only costly and risky approach, due to the increased attack surface, but lacks the flexibility to make use of the the complex relationships between consumers, organisations, devices and things that the digital transformation is bringing. It also fails to provide a user experience which consumers, accustomed to social media platforms, now expect.
Digital transformation is here to stay, and it is more than just the Internet of Things (IoT). Everyone and everything is connected, and identity is the glue that enables this interconnectivity. Therefore, we need to move from IAM to Identity Relationship Management (IRM).
- The Digital Transformation affects every organization and is here to stay
- Digital Transformation mandates organizational change
- More than humans, everything & Everyone becomes connected. It’s also about Identities of things, devices, services, and apps
- Relationships over identities: customer-organisation, person-person, person-device, organisation-organisation
- Security is a risk – and an opportunity
- Identity is the glue – who or what may get access to what?
- Leverage the popularity of social networking platforms for authentication and basic personal information
- Your requirements are not unique: configuration rather than coding
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.