Identity - Best Practice II
Facebook Twitter LinkedIn

Identity - Best Practice II

Combined Session
Wednesday, May 15, 2019 15:30—16:30
Location: ALPSEE

A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry

In these tempestuous times, Mobile Operators (MNOs) and the mobile industry are increasingly exploring ways in which they can help customers transact more safely online, and in particular through the provision of:
- Authentication services
- Identity claims verification (GDPR)
- PSD2-compliant authorisation services
- Network signals for mitigating fraud
- Secure conversational commerce (chatbots)
- Identity wallet/agent services

This presentation will provide an update on the worldwide Mobile Connect initiative active today, the pivotal role of identity within conversational commerce facilitated by RCS (chatbots), the importance of an identity layer in next generation systems (5G, IoT) and the likely roles for MNOs in the decentralised identity frameworks of tomorrow.

A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry
Presentation deck
A Hitchhiker's Guide to the Growing Pace and Innovation of Identity Services in the Mobile Industry
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
David Pollington
David Pollington
GSMA
David Pollington is the Head of Services at the GSMA, providing technical & strategic steer on identity across a number of GSMA's programmes including Mobile Connect (a worldwide x-MNO...

Bring-Your-Own-Identity to the Digital Enterprise

BYO-Scenarios promise borderless collaboration at low cost for employees, external staff, partners, customers and guests. We will take a brief look at these promises and do some reality-check on limitations and consequences.

Key topics:

Bring-Your-Own-Identity to the Digital Enterprise
Presentation deck
Bring-Your-Own-Identity to the Digital Enterprise
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Eleni Richter
Eleni Richter
EnBW
Eleni Richter is working as chief architect of the identity and organizational data management at a large German energy supplier (EnBW AG) and as part-time lecturer in IAM and Cyber Security...

Clustering Methods Used for IAM Role Mining

Have you ever thought of a better way to do role modelling?
The goal of this presentation is to show how Big Data analysis can be used to obtain a different and effective way of role modelling. Just like in traditional role mining, we take entitlement data from the source applications, but apply tools from the Big Data “world” and use these for analyzing the data.
By comparing accounts and entitlements by definition of their similarity, it is possible to make a visual presentation indicating logical groupings of accounts and entitlements, and use the visualizations to present the actual data to the business.
Hereby we can make a model showing what could be a proper role mining scheme for the actual entitlement data.

Key takeaways:
(1) a strict way to define account and entitlement similarity
(2) a proposal for visualization of logical groups of accounts and entitlements based on real data
(3) an analytical approach for combining a top-down and bottom-up approach in role mining

Clustering Methods Used for IAM Role Mining
Presentation deck
Clustering Methods Used for IAM Role Mining
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Thomas Aagren Jensen
Thomas Aagren Jensen
PwC
Thomas has a master in Computer Science and has many years of experience implementing Identity Management (IdM) and Access Management (AM) as well as ERP systems. The work covers design, data...
Subscribe for updates
Please provide your email address