Open Identity Standards
Facebook Twitter LinkedIn

Open Identity Standards

Combined Session
Thursday, May 11, 2017 11:00—12:00
Location: AMMERSEE II

New Tools & Rules for Identity Management

There are many instruments, “tools and rules”, of trust within the identity ecosystem. Some are known and proven while others are emerging and having an immediate impact. The challenge is aligning technology tools and legal rules to deploy identity management services globally.

This presentation will provide a pragmatic perspective of how efforts focused on the business, legal and technical aspects of the identity ecosystem are being advanced by industry leaders.

This overview of open identity standards along with new tools such as self-certifications and registration enhances online transactions via trust frameworks. We’ll review how governments are partnering with industry to advance national identity initiatives using the GOV.UK Verify program as a benchmark for public-private partnerships in the US and Europe.

Key Takeaways:

New Tools & Rules for Identity Management
Presentation deck
New Tools & Rules for Identity Management
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Don Thibeau
Don Thibeau
OpenID Foundation
Don is President and Chairman of the Open Identity Exchange (OIX) a non-profit organization of leaders from competing sectors, including enterprise, data services, telecommunications, consulting...

How do Standards and Conformity Assessment Schemes Increase Trust in Digital Identity Systems?

Use of external services providing federated identity management, access, credentials and authentication is growing with increased adoption of cloud service delivery models. Risk is introduced to any organization that ‘outsources’ critical services. By using an external service provider, even one in the same overall organization, the reliant organization becomes dependent on the security, operational stability and reliability of the external provider.

We will explore how systems operated according to standards of practice can be assessed and certified to demonstrate that they are capable of delivering the promised critical services. Use of 1st, 2nd and 3rd party assessments play a critical role in federated architectures and trust frameworks. Specific examples from assessment schemes and standards for digital identity practices will be discussed.

Key Takeaways

How do Standards and Conformity Assessment Schemes Increase Trust in Digital Identity Systems?
Presentation deck
How do Standards and Conformity Assessment Schemes Increase Trust in Digital Identity Systems?
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Andrew Hughes
Andrew Hughes
Kantara Initiative
Andrew Hughes CISM CISSP has been providing IM/IT consulting services for over 20 years with a focus on security, privacy and digital identity operations, strategy and policy. He brings Canadian...

Should Digital Identity be a National Asset?

Digital identities have the potential to unlock huge savings in how services are delivered to us, but only if they are treated as a national asset and part of the national digital infrastructure, not if we have a diverse range of schemes. This presentation will share our opinions on why we are still a long way from being able to share a digital identity created in one market with another and thoughts on who should set the agenda.

Emma Lindley
Emma Lindley
Women in Identity, Caf
Emma Lindley is Managing Director of International Expansion for CAF a digital identity company located in Brazil, USA and UK. She is also co-founder and Chair of Women in Identity a not-for-profit...
Subscribe for updates
Please provide your email address