SlideShare a Scribd company logo
1 of 12
I am not my phone: 
Avoiding Identity Relationship Pitfalls 
Andrew Johnston 
Member of the TELUS Team
About TELUS 
British 
Columbia 
Alberta 
Manitoba 
Saskatchewan 
Ontario 
Quebec 
Atlantic 
Canada 
Canada has a population of 34.88 million. 
Network access 
lines 
3.2 million 
TV subscribers 
865,000 
Wireless 
subscribers 
7.9 million 
Internet 
subscribers 
1.4 million
Pillars of Identity Relationship Management 
BUSINESS PILLARS 
1. CONSUMERS AND 
THINGS over employees 
2. ADAPTABLE over 
predictable 
3. TOP LINE REVENUE over 
operating expense 
4. VELOCITY over process 
TECHNICAL PILLARS 
1. INTERNET SCALE over 
enterprise scale 
2. DYNAMIC INTELLIGENCE 
over static intelligence 
3. BORDERLESS over 
perimeter 
4. MODULAR over monolithic 
https://kantarainitiative.org/irmpillars/
Identity is grounded in the data tier 
• Challenge: IRM encourages Adaptability, Velocity 
• Identity is primarily a data concern 
• Changes to the data tier are slow and expensive 
http://commons.wikimedia.org/wiki/File:Banaue_Rice_Terrace_Close_Up.jpg 
 Data architects are your friends
Users are people, too 
• Business model vs. service model 
• Favour relationships over attributes 
• Born with it? 
Photo by Maurizio Pesce https://www.flickr.com/photos/pestoverde/
Things 
• Intrinsic properties of things 
• Things as credentials 
• Things as service providers 
Photo by A.cilia, Wikimedia Commons
individual  
customer  
 service 
 resource 
Relationships 
Photo courtesy of pixabay.com
Authenticating people 
• “Passwords have reached the end of their useful life.” 
• Credential Service Provider? 
• Credentials have relationships to a person 
Photo by Ranjithsiji, Wikimedia Commons - http://commons.wikimedia.org/wiki/User:Ranjithsiji
How do you know that? 
• Who told you that? 
• When did they tell you that? 
• Would there be any 
advantage to them to 
misrepresent the truth? 
Sculpture by Donald Lipski, 1985; Copyright: Donald Lipski. Photo: Dorothy Zeidman
Process and Controls 
• Use data and relationships for authorization 
• Measure and control data quality 
• Minimize data collection and distribution 
Photo by Lynn Betts, USDA Natural Resources Conservation Service
Be bold, but not reckless, on a path to the IRM future 
• Data architects are your friends 
• What data distinguishes you from others? 
• Everything should have (or be) an API
andrew.johnston@telus.com 
© 2014 TELUS Communications Company 12

More Related Content

What's hot

Digital Identity & Global Health
Digital Identity & Global HealthDigital Identity & Global Health
Digital Identity & Global HealthDeborah Gonzalez
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 
Technology and the Global Marketplace
Technology and the Global MarketplaceTechnology and the Global Marketplace
Technology and the Global Marketplacepadmasree
 
Copying And Copyright
Copying And CopyrightCopying And Copyright
Copying And Copyrightctracey
 
Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...
Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...
Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...Bex Lewis
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES.eu
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
Why Copyright?
Why Copyright?Why Copyright?
Why Copyright?mgeist
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology pptAkhilesh Verma
 

What's hot (12)

Digital Identity & Global Health
Digital Identity & Global HealthDigital Identity & Global Health
Digital Identity & Global Health
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 
Technology and the Global Marketplace
Technology and the Global MarketplaceTechnology and the Global Marketplace
Technology and the Global Marketplace
 
Copying And Copyright
Copying And CopyrightCopying And Copyright
Copying And Copyright
 
Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...
Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...
Raising Children in a Digital Age (@CODECUK Research Seminar, 12th December 2...
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
Why Copyright?
Why Copyright?Why Copyright?
Why Copyright?
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology ppt
 
Concept of ICT
Concept of ICTConcept of ICT
Concept of ICT
 

Viewers also liked

Mobile Learning in a Virtual Work Environment
Mobile Learning in a Virtual Work EnvironmentMobile Learning in a Virtual Work Environment
Mobile Learning in a Virtual Work EnvironmentDr. Robin Yap
 
VMworld 2013: VMware Horizon View Business Process Desktop
VMworld 2013: VMware Horizon View Business Process Desktop VMworld 2013: VMware Horizon View Business Process Desktop
VMworld 2013: VMware Horizon View Business Process Desktop VMworld
 
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...CA Technologies
 
Customer Presentation - Telus
Customer Presentation - TelusCustomer Presentation - Telus
Customer Presentation - TelusSplunk
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...
The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...
The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...Frank Wagman
 

Viewers also liked (7)

Mobile Learning in a Virtual Work Environment
Mobile Learning in a Virtual Work EnvironmentMobile Learning in a Virtual Work Environment
Mobile Learning in a Virtual Work Environment
 
VMworld 2013: VMware Horizon View Business Process Desktop
VMworld 2013: VMware Horizon View Business Process Desktop VMworld 2013: VMware Horizon View Business Process Desktop
VMworld 2013: VMware Horizon View Business Process Desktop
 
TELUS 2014 Annual Report
TELUS 2014 Annual ReportTELUS 2014 Annual Report
TELUS 2014 Annual Report
 
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
TELUS Implements End-to-End Testing to Ensure Customer First Strategy and Cus...
 
Customer Presentation - Telus
Customer Presentation - TelusCustomer Presentation - Telus
Customer Presentation - Telus
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...
The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...
The TELUS Way: An OpenSpan Customer's Journey for Optimizing the Call Center ...
 

Similar to I AM NOT MY PHONE - Avoiding Identity Relationship Pitfalls

Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data EraPieter De Leenheer
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data eraPieter De Leenheer
 
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...Pieter De Leenheer
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Let Your Data Run Free and Run Your University
Let Your Data Run Free and Run Your UniversityLet Your Data Run Free and Run Your University
Let Your Data Run Free and Run Your UniversitySteve Fischer
 
ERN-Data-Ethics.pptx
ERN-Data-Ethics.pptxERN-Data-Ethics.pptx
ERN-Data-Ethics.pptxChirsMitty
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real WorldNeo4j
 
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...Health IT Conference – iHT2
 
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris
 
Crowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data MeetupCrowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data MeetupEdward Curry
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big DataBrendan Aldrich
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...IT Network marcus evans
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteNeo4j
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipLoren Davie
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
ASA conference Feb 2013
ASA conference Feb 2013ASA conference Feb 2013
ASA conference Feb 2013mrkwr
 
Rise of the Data Democracy
Rise of the Data DemocracyRise of the Data Democracy
Rise of the Data DemocracyBrendan Aldrich
 

Similar to I AM NOT MY PHONE - Avoiding Identity Relationship Pitfalls (20)

Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Data Governance in a big data era
Data Governance in a big data eraData Governance in a big data era
Data Governance in a big data era
 
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Big data
Big dataBig data
Big data
 
Let Your Data Run Free and Run Your University
Let Your Data Run Free and Run Your UniversityLet Your Data Run Free and Run Your University
Let Your Data Run Free and Run Your University
 
ERN-Data-Ethics.pptx
ERN-Data-Ethics.pptxERN-Data-Ethics.pptx
ERN-Data-Ethics.pptx
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real World
 
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
 
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
 
Crowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data MeetupCrowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
Crowdsourcing Approaches to Big Data Curation - Rio Big Data Meetup
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big Data
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
ASA conference Feb 2013
ASA conference Feb 2013ASA conference Feb 2013
ASA conference Feb 2013
 
Rise of the Data Democracy
Rise of the Data DemocracyRise of the Data Democracy
Rise of the Data Democracy
 

More from ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 

More from ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Recently uploaded

WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 

Recently uploaded (20)

WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 

I AM NOT MY PHONE - Avoiding Identity Relationship Pitfalls

  • 1. I am not my phone: Avoiding Identity Relationship Pitfalls Andrew Johnston Member of the TELUS Team
  • 2. About TELUS British Columbia Alberta Manitoba Saskatchewan Ontario Quebec Atlantic Canada Canada has a population of 34.88 million. Network access lines 3.2 million TV subscribers 865,000 Wireless subscribers 7.9 million Internet subscribers 1.4 million
  • 3. Pillars of Identity Relationship Management BUSINESS PILLARS 1. CONSUMERS AND THINGS over employees 2. ADAPTABLE over predictable 3. TOP LINE REVENUE over operating expense 4. VELOCITY over process TECHNICAL PILLARS 1. INTERNET SCALE over enterprise scale 2. DYNAMIC INTELLIGENCE over static intelligence 3. BORDERLESS over perimeter 4. MODULAR over monolithic https://kantarainitiative.org/irmpillars/
  • 4. Identity is grounded in the data tier • Challenge: IRM encourages Adaptability, Velocity • Identity is primarily a data concern • Changes to the data tier are slow and expensive http://commons.wikimedia.org/wiki/File:Banaue_Rice_Terrace_Close_Up.jpg  Data architects are your friends
  • 5. Users are people, too • Business model vs. service model • Favour relationships over attributes • Born with it? Photo by Maurizio Pesce https://www.flickr.com/photos/pestoverde/
  • 6. Things • Intrinsic properties of things • Things as credentials • Things as service providers Photo by A.cilia, Wikimedia Commons
  • 7. individual  customer   service  resource Relationships Photo courtesy of pixabay.com
  • 8. Authenticating people • “Passwords have reached the end of their useful life.” • Credential Service Provider? • Credentials have relationships to a person Photo by Ranjithsiji, Wikimedia Commons - http://commons.wikimedia.org/wiki/User:Ranjithsiji
  • 9. How do you know that? • Who told you that? • When did they tell you that? • Would there be any advantage to them to misrepresent the truth? Sculpture by Donald Lipski, 1985; Copyright: Donald Lipski. Photo: Dorothy Zeidman
  • 10. Process and Controls • Use data and relationships for authorization • Measure and control data quality • Minimize data collection and distribution Photo by Lynn Betts, USDA Natural Resources Conservation Service
  • 11. Be bold, but not reckless, on a path to the IRM future • Data architects are your friends • What data distinguishes you from others? • Everything should have (or be) an API
  • 12. andrew.johnston@telus.com © 2014 TELUS Communications Company 12

Editor's Notes

  1. Hi, I'm Andrew Johnston; I work on Identity and APIs in the office of the CTO at TELUS. I hope today to leave you with some ideas for how to avoid potential pitfalls as you evolve your identity capabilities. Please feel free to interrupt me with any questions you have during the presentation. I’d also be happy to take your questions at the end.
  2. TELUS is Canada’s fastest-growing national telecommunications company, with 13.4 million customer connections, including 7.9 million wireless subscribers, 3.2 million wireline network access lines, 1.4 million Internet subscribers and 865,000 TELUS TV customers. TELUS provides a wide range of communications products and services, including wireless, data, Internet protocol (IP), voice, television, entertainment and video, and is Canada's largest healthcare IT provider. In support of our philosophy to give where we live, TELUS, our team members and retirees have contributed hundreds of millions of dollars to charitable and not-for-profit organizations and volunteered million hours of service to local communities since 2000. TELUS was honoured to be named the most outstanding philanthropic corporation globally for 2010 by the Association of Fundraising Professionals, becoming the first Canadian company to receive this prestigious international recognition.
  3. The challenge that identity in general, and Identity Relationship Management in particular, sets before is the establishment of an identity system, or a set of identity services, that are Adaptable and that we can evolve with Velocity. The challenge stems from two important facts: Identity is primarily a data concern. This data is used for authentication, authorization and personalization. There's a fair helping of security mixed in there, but if your data isn't properly organized and supported by good processes, you won't be delivering good security or customer experience. As experience with multi-tiered architecture has shown us, the data tier is the hardest to change. It impacts all the other tiers in our architecture. Significant changes can require data-conversion or data-migration efforts. Any system that depends on the data that's changing requires comprehensive re-testing at a minimum. In cases when the data might impact on customer privacy or security, you may also need to talk to all of your customers. You might need to ask them all skill-testing questions, or get them all to provide some new consent, or negotiate a new credential with them all. Customers may see this as the act of a concerned and responsible service provider, but they're more likely to see this as an annoying inconvenience. I recommend working with a good data architect. I'm not a data architect, but I've had the opportunity to work with some great ones. I've seen good data architecture decisions continue to pay dividends for more than a decade, while customer-facing applications have been replaced 3 times to keep up with technology and customer expectations. Image: http://commons.wikimedia.org/wiki/File:Banaue_Rice_Terrace_Close_Up.jpg
  4. You should know if and how and where the idea of "person" fits into your business and service models. In a business model, there are almost always people. Someone orders a service. Someone is invoiced for a service. Strength of identity assurance may not need to be high, but it's unusual to do business without people. For service models, involvement of people is common, but less essential. The delivery of liquid natural gas to a home, for example, doesn't require any human involvement once the service has been provisioned. Donald Knuth wrote that "premature optimization is the root of all evil." Don't optimize entities and relationships away too early in the interest of having a representation that fits neatly into, say, a hierarchical model supported by directory servers. It's better to optimize this later, once you have a better handle on what you might be trading off for simplicity or performance. If you are in doubt about documenting a new relationship vs. defining a new "person" attribute, ask yourself if people are born with the attribute. Was I born with a mobile phone number? Image: http://www.flickr.com/photos/pestoverde/15051962555 by Maurizio Pesce https://www.flickr.com/photos/pestoverde/
  5. If you are looking to the Internet of Things as part of your service, consider how those things might fit in your model. I think it will be rare to have to consider intrinsic properties of things as part the delivery of a service. As the Internet benefitted from the abstraction and standardization of the protocols and formats of the web, the Internet of Things will establish standards and protocols to make itself more generally useful. Providers of IoT services and applications may need to get into the details, but most others won't. One key exception to this is likely to be for things that your service uses as tokens of authentication. By looking to things as a "something you have" authentication factor, you'll need to get involved in the details for each of the things that will become part of your authentication story. This could involve enrolling device serial numbers, MAC addresses, network service identifiers and even network addresses in tightly controlled environments. These things will have their own lifecycles that need to be managed and controlled. Plan to model things separately, with their own attributes. It would be much easier to consider things as providers of services. Your system may rely on an IoT service provider to deliver temperature, or location information from one or many things. The service provider can worry about concerns like battery life, radio range, power and interference or hardware failures. Image: http://commons.wikimedia.org/wiki/File:Htcpcp_teapot.jpg Photo by A.cilia, Wikimedia Commons
  6. --> individual --> customer <--> service <-- resource Whenever I'm thinking about a new service, I find this mnemonic very helpful. Start with any concern, and consider whether a single example might have a relationship with one or more of any of the other concerns; then consider whether any of those concerns might share a single example, or relate to many. The "resource" concern is exclusively part of the service model, I think. Just as "customer" is exclusively part of the business model. All the concerns are likely to have direct or indirect relationships with one another. For example, we might ask whether a person could represent more than one customer. Then we would ask whether a customer might be represented by more than one person. To consider the example in the title of this talk, assume that a phone number is a resource that is only ever used by one instance of the mobile-phone service. Could a person have more than one mobile-phone service? Of course! Could more than one person share a single mobile-phone service? It's certainly possible. Regardless of the answers, the mnemonic has helped us recognize that I am not my phone. * It's useful at this point to remember that time is the great disruptor of beautiful models. Ownership of resources will change over time. Resources may be assigned to different services. Individuals will stop representing certain customers, and start representing others.
  7. A few words on authentication. This quote from Bruce Schneier is from February, 2005. Please do everything you reasonably can not to give your customers a new password. If you must issue your own credentials, consider combining it with a second authentication factor, so you don't need to impose arbitrarily difficult password format rules. A simple 4-digit PIN with a second authentication factor, such as proof of possession of a mobile device. Another approach to consider would be to rely on a Credential Service Provider to authenticate your end-users. If authentication isn't a core part of your service, look into the services offered by those for whom it is. This could be as simple as letting your users log in to your web site with Facebook or Google. If you're going to worry about end-user credentials at all, I suggest modeling credentials as separate entities that might have a relationship with a person. This allows for the possibility that your users may use a number of different kinds of credentials; that the credentials you choose to recognize and honour may change over time; and that there may be different circumstances that require the authentication of different credentials. High-value transactions, for example, may require the use of a stronger credential, or an additional credential type. It might be worth thinking of an authentication assertion from a Credential Service Provider as a logically distinct credential. Reference: - The Curse of the Secret Question - https://www.schneier.com/blog/archives/2005/02/the_curse_of_th.html Image: http://commons.wikimedia.org/wiki/File:Pendrive_Shape_of_key.JPG Photo by Ranjithsiji, Wikimedia Commons - http://commons.wikimedia.org/wiki/User:Ranjithsiji
  8. Cite birthday example. This kind of information is useful for actively or retroactively mitigating risk (access control, authorization, credential integrity, ...). Image: http://en.wikipedia.org/wiki/File:The_Book_of_Knowledge_%28Lipski_sculpture%29.jpg Sculpture by Donald Lipski, 1985; Copyright: Donald Lipski. Photo: Dorothy Zeidman.
  9. Authorization at scale can simply rely on your service model relationships For large-scale, consider a simple, static authorization model based on these relationships Integrity - enforce constraints at the data tier, save yourself huge grief - some day, what you create now will become legacy - decide on a "minimal" profile; what defines the entity? What is truly unique? (frequently this is artificial and assigned) - who is the (single!) authority for uniqueness? - domain names --> ICANN - email addresses --> service provider + ICANN - PKI subject --> Cert. Authority data minimization as a security and privacy strategy - "Person" entity with as few attributes as possible - "There are two kinds of companies. Thost that know they have been breached, ..." - point of contrast between CRM and IRM (?) - impulse to collect and hoard data - if you want to play with data, look at - web analytics - transaction analytics - fall-out analytics (phone call, customer ticket, etc.) -> measure that! Image: http://commons.wikimedia.org/wiki/File:TerracesBuffers.JPG Photo by Lynn Betts, USDA Natural Resources Conservation Service
  10. Thank you for your attention. Questions?