Differentiating IAM from Customer-IAM
Facebook Twitter LinkedIn

Differentiating IAM from Customer-IAM

Combined Session
Thursday, May 12, 2016 11:00—12:00
Location: CHIEMSEE

IAM + Big Data + Privacy by Design = Consumer Identity?

Imagine an ideal world where you own your digital identity. It exists in one place, is globally accessible, private by default and simple to maintain. You may want to show parts of it to others, but the choice is yours. Vendors dealing with you would never get into conflict with ever-tightening privacy regulations. They wouldn´t necessarily need to know who you are, as long as there is a relationship in place which allows the vendor to know your needs. 

What do we need to get there? Is traditional Identity & Access Management a good starting point or shouldn´t we even consider to combine consumer & employee identities? In this session, Ivan will focus on the differences between IAM and Customer-IAM (or: Identity Relationship Management, IRM) preparing you for a panel session en suite, where IAM and C-IAM vendors will show their perspectives. 

Ivan Niccolai
Ivan Niccolai
KuppingerCole
Ivan is a Lead Analyst with a focus on risk management and identity & access management. He has a deep technical understanding and lengthy experience in security consulting across three...

Customer Identity Management: What makes the Difference?

Over the last few years there has been a shift from internal employee focused (B2E) IAM installations towards partner and customer focused (B2C) external facing IAM systems. This means that the job market is shifting and many IAM practitioners are taking on roles in the B2C space.

If you are an experienced B2E manager that has been given the job of running a B2C IAM program what should you think about? What are the main differences between B2E and B2C?

Key Takeaways:

Customer Identity Management: What makes the Difference?
Presentation deck
Customer Identity Management: What makes the Difference?
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Amanda de Jong
Amanda de Jong
PwC Technology Consulting
Amanda is a management consultant within the PwC Technology Consulting practice focusing on Identity and Access Management as part of PwC Everett. As practice manager Consumer Identity and Access...
Bram Neuteboom
Bram Neuteboom
Qiy Foundation
Bram Neuteboom is co-founder of Qiy Foundation, creating a scheme and an open standard to put people back in control of their personal data. He is the chairman of the WorkStream...
Thorsten Niebuhr
Thorsten Niebuhr
WedaCon
With nearly 30 years experience in IT and in the fields of Directory Technologies, Identity Management and Data Privacy, Thorsten is a recognized expert in our industry. As a technical trainer,...
Jason Rose
Jason Rose
Gigya
Jason leads Gigya's global marketing initiatives. He has experience in marketing technology platforms and applications for both start-ups and large enterprises. Most recently, Jason led marketing...
Martin Sandren
Martin Sandren
Nixu Cybersecurity
Martin Sandren is a CISSP and SABSA certified security professional with over fifteen years of experience of various information security related roles. Primarily focused on security architecture...
Jackson Shaw
Jackson Shaw
One Identity
Jackson Shaw is Senior Director of Product Management for One Identity, the Identity & Access Management (IAM) business of Quest Software. Prior to Quest, Jackson was an integral member of...
Markus Weber
Markus Weber
ForgeRock
Subscribe for updates
Please provide your email address