SlideShare a Scribd company logo
1 of 59
Venn and the art of 
Identity Relationship 
Management
Using diagrams 
to save your 
identity bacon
Robert Lapes 
• 30 years experience in I.T. 
• 10 years of identity program assurance 
• Head of IAM Advisory Services 
• Capgemini UK’s IAM practice 
• 120,000 staff in 40 countries 
• 200+ identity specialists worldwide
Agenda 
1. IRM context 
2. Why diagrams? 
3. What diagrams? 
– Identity 
– Relationships 
– Management 
4. Summary and questions
context
IRM 
is the new 
IAM
IRM’s four business pillars 
1. CONSUMERS and THINGS over employees 
2. ADAPTABLE over predictable 
3. TOP LINE REVENUE over operating expense 
4. VELOCITY over process
IRM’s four technical pillars 
1. INTERNET SCALE over enterprise scale 
2. DYNAMIC INTELLIGENCE over static 
intelligence 
3. BORDERLESS over perimeter 
4. MODULAR over monolithic
scale complexity 
adaptable dynamic 
bigger faster 
connected diverse 
decentral isation 
non- l inear i ty
IRM 
Scale 
Complexity 
IxM 
Internet
Why 
diagrams?
We learn mainly by sight 
75% 
13% 
6% 
3% 3% 
80% 
70% 
60% 
50% 
40% 
30% 
20% 
10% 
0% 
Sight Hearing Touch Smell Taste
We can process large amounts 
of visual data
Writing is a recent invention
identity 
diagrams
Georg Hegel 
Philosopher 
Newspaper editor 
Headmaster 
1770 – 1831
Hegelian Dialectic
Georg Hegel 
“Identity is the identity of 
identity and non-identity.” 
particularity universality 
individuality
Prof. Ian Goldberg 
• " Cryptographer 
Privacy expert 
b. 1973 Canada 
Inventor of the 
“Nymity Slider”
• " 
“Privacy and national 
security are like 
opposite ends of a 
slider,“
• " "Technology is like a 
magnet that allows 
individuals to pull that 
slider back toward 
themselves.“
The Nymity Slider
John Venn 
Theologian 
Logician 
Cricketer 
1837 – 1923 
Inventor of the 
Venn diagram
Similar to Euler diagram
Business Partners 
Anonymous 
MyAccount Customers
relationship 
diagrams
Prof. Jiro Kawakita 
Anthropologist 
Mountain climber 
Plant collector 
1920 – 2009 
Inventor of the 
Affinity diagram
“Let the facts speak for 
themselves” 
• Too many facts or ideas in 
apparent chaos 
• Issues are too large and 
complex to grasp 
• Group consensus
KJ Method or Affinity diagram
Prof. Peter Chen 
Computer scientist 
Inventor of the Entity- 
Relationship model 
b. 1947
“Entities and 
relationships are a 
natural way to 
organize physical 
things as well as 
information … “
“… The ER concept is 
the basic fundamental 
principle for 
conceptual modelling. 
It has been with us 
since thousands of 
years ago and will be 
with us for many years 
to come.”
Entity–relationship model 
2 Registrar 
5 Attribute 
Authority 
Registers for identity 
Issues identifier 
Asserts access claim 
Enrols for service 
Issues credential 
4 
Provides service 
Credential 
Authority 
Circle of 
Trust 
Authorisation 
1 Policy 6 
Governance 
Subject 
Identity 
service 
Authentication 
service 
Reliant 
party 
Access 
service 
2 Entity 
3 Service or 
Resource
Prof. Shigeru Mizuno 
Quality management 
guru 
Inventor of matrix 
diagram
Matrix diagram 
Strength of Registration 
Strength of Authentication Mechanism
Matrix diagram 
Source: Eve Maler
Matrix diagram 
SAP Microsoft IBM 
Security strong positive strong positive strong positive 
Functionality strong positive neutral positive 
Integration positive positive positive 
Interoperability positive neutral positive 
Usability positive neutral neutral 
Innovativeness positive neutral positive 
Market Position positive strong positive strong positive 
Financial 
strong positive strong positive strong positive 
Strength 
Ecosystem positive strong positive strong positive
Matrix diagram 
TOGAF Policy 
Entities 
& Identity 
Resources 
& Assets 
Authentication 
& Credentials 
Authorization 
& Access 
Operation & 
Governance 
1 Vision 
2 
Business 
Architecture 
3 
Information 
System 
Architecture 
4 
Technology 
Architecture 
5 
Opportunities & 
Solutions 
6 
Migration 
Planning 
7 
Implementation 
Governance 
8 
Change 
Management 
9 Requirements
Y-Matrix Diagram
management 
diagrams
Dr W. Edwards Deming 
Father of modern 
quality control 
Quality 
management 
guru 
1900 - 1993
“It is not enough to 
do your best; you 
must know what to 
do and then do 
your best.”
The Deming Cycle
The Deming Cycle 
Plan 
Do 
Check 
Act 
Identifier and 
credential 
scope 
Collection 
and 
consolidation 
Mapping and 
validation 
Reconcile 
and 
remediation 
Authoritative 
identifiers and 
credentials 
Policy 
scope 
Collection and 
consolidation 
Policy review 
Policy 
remediation 
Authoritative 
policy
Matthew Henry Phineas Riall Sankey 
Engineer 
Introduced the first 
energy flow 
diagram 
1853 – 1926 Ireland
Internet traffic 2010
summary 
and 
questions
IRM is the new IAM 
scale complexi ty 
adaptable dynamic 
bigger faster 
connected diver se 
decent ral isat ion 
non- l inear i ty
Why diagrams? 
• Data can be hard to understand 
especially in written form. 
• Diagrams help us understand complex 
data and information and identify 
complex relationships. 
• We learn better visually.
These people developed 
diagrams to make life easier to 
understand
Thank you
Contact information 
Insert 
contact 
picture 
Robert 
Lapes 
Identity Architect 
robert.lapes@capgemini.com 
Capgemini UK | Bristol 
(Toltec) 
Tel: +44 0 870 194 6658 
Insert 
contact 
picture 
Andrew 
Critchley 
IAM Proposition Lead 
andrew.critchley 
@capgemini.com 
Capgemini UK | Sale 
Tel: + 44 (0)7891 154281

More Related Content

Similar to TWELVE DIAGRAMS TO SAVE YOUR IDENTITY BACON

Value and values: AI and the path to a more human web
Value and values: AI and the path to a more human webValue and values: AI and the path to a more human web
Value and values: AI and the path to a more human webWP Engine
 
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j   graphs in the real world - graph days d.c. - april 14, 2015Neo4j   graphs in the real world - graph days d.c. - april 14, 2015
Neo4j graphs in the real world - graph days d.c. - april 14, 2015Neo4j
 
Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...
Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...
Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...Neo4j
 
Newcastle Intro 2015
Newcastle Intro 2015Newcastle Intro 2015
Newcastle Intro 2015Lee Schlenker
 
Technologies and Innovation - Introduction
Technologies and Innovation - IntroductionTechnologies and Innovation - Introduction
Technologies and Innovation - IntroductionLee Schlenker
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
DataSpryng Overview
DataSpryng OverviewDataSpryng Overview
DataSpryng Overviewjkvr
 
Unicom Big Data Innovation Conference - The return of the narrative
Unicom Big Data Innovation Conference - The return of the narrativeUnicom Big Data Innovation Conference - The return of the narrative
Unicom Big Data Innovation Conference - The return of the narrativeVenkataraman Ramachandran
 
Energizing Change Through Network Leadership
Energizing Change Through Network LeadershipEnergizing Change Through Network Leadership
Energizing Change Through Network LeadershipRobin Teigland
 
Energizing Change Through Network Leadership 1225920401627479 8
Energizing Change Through Network Leadership 1225920401627479 8Energizing Change Through Network Leadership 1225920401627479 8
Energizing Change Through Network Leadership 1225920401627479 8Guido Heijman
 
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid Doret
 
CI or FS Poly Cleared Job Fair Handbook | November 9
CI or FS Poly Cleared Job Fair Handbook | November 9CI or FS Poly Cleared Job Fair Handbook | November 9
CI or FS Poly Cleared Job Fair Handbook | November 9ClearedJobs.Net
 
The Power of Data Visualization
The Power of Data VisualizationThe Power of Data Visualization
The Power of Data VisualizationGautham Pallapa
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris Perficient, Inc.
 
Where cloud computing meets Enterprise Architecture
Where cloud computing meets Enterprise ArchitectureWhere cloud computing meets Enterprise Architecture
Where cloud computing meets Enterprise ArchitectureSoftware Park Thailand
 
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and ExcellenceTesting in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and ExcellenceTechWell
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 

Similar to TWELVE DIAGRAMS TO SAVE YOUR IDENTITY BACON (20)

Value and values: AI and the path to a more human web
Value and values: AI and the path to a more human webValue and values: AI and the path to a more human web
Value and values: AI and the path to a more human web
 
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j   graphs in the real world - graph days d.c. - april 14, 2015Neo4j   graphs in the real world - graph days d.c. - april 14, 2015
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
 
Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...
Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...
Neo4j GraphTalk Düsseldorf - How Graphs revolutionise Identity & Access Manag...
 
NBSintro2013
NBSintro2013NBSintro2013
NBSintro2013
 
Newcastle Intro 2015
Newcastle Intro 2015Newcastle Intro 2015
Newcastle Intro 2015
 
Technologies and Innovation - Introduction
Technologies and Innovation - IntroductionTechnologies and Innovation - Introduction
Technologies and Innovation - Introduction
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
DataSpryng Overview
DataSpryng OverviewDataSpryng Overview
DataSpryng Overview
 
Unicom Big Data Innovation Conference - The return of the narrative
Unicom Big Data Innovation Conference - The return of the narrativeUnicom Big Data Innovation Conference - The return of the narrative
Unicom Big Data Innovation Conference - The return of the narrative
 
Energizing Change Through Network Leadership
Energizing Change Through Network LeadershipEnergizing Change Through Network Leadership
Energizing Change Through Network Leadership
 
Energizing Change Through Network Leadership 1225920401627479 8
Energizing Change Through Network Leadership 1225920401627479 8Energizing Change Through Network Leadership 1225920401627479 8
Energizing Change Through Network Leadership 1225920401627479 8
 
Social networks
Social networksSocial networks
Social networks
 
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
 
CI or FS Poly Cleared Job Fair Handbook | November 9
CI or FS Poly Cleared Job Fair Handbook | November 9CI or FS Poly Cleared Job Fair Handbook | November 9
CI or FS Poly Cleared Job Fair Handbook | November 9
 
The Power of Data Visualization
The Power of Data VisualizationThe Power of Data Visualization
The Power of Data Visualization
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris
 
Where cloud computing meets Enterprise Architecture
Where cloud computing meets Enterprise ArchitectureWhere cloud computing meets Enterprise Architecture
Where cloud computing meets Enterprise Architecture
 
Misceb intro2014
Misceb intro2014Misceb intro2014
Misceb intro2014
 
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and ExcellenceTesting in the Year 2020: The Erosion of Governance, Management, and Excellence
Testing in the Year 2020: The Erosion of Governance, Management, and Excellence
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 

More from ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 

More from ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

TWELVE DIAGRAMS TO SAVE YOUR IDENTITY BACON

  • 1. Venn and the art of Identity Relationship Management
  • 2. Using diagrams to save your identity bacon
  • 3. Robert Lapes • 30 years experience in I.T. • 10 years of identity program assurance • Head of IAM Advisory Services • Capgemini UK’s IAM practice • 120,000 staff in 40 countries • 200+ identity specialists worldwide
  • 4. Agenda 1. IRM context 2. Why diagrams? 3. What diagrams? – Identity – Relationships – Management 4. Summary and questions
  • 6. IRM is the new IAM
  • 7. IRM’s four business pillars 1. CONSUMERS and THINGS over employees 2. ADAPTABLE over predictable 3. TOP LINE REVENUE over operating expense 4. VELOCITY over process
  • 8. IRM’s four technical pillars 1. INTERNET SCALE over enterprise scale 2. DYNAMIC INTELLIGENCE over static intelligence 3. BORDERLESS over perimeter 4. MODULAR over monolithic
  • 9. scale complexity adaptable dynamic bigger faster connected diverse decentral isation non- l inear i ty
  • 10. IRM Scale Complexity IxM Internet
  • 12. We learn mainly by sight 75% 13% 6% 3% 3% 80% 70% 60% 50% 40% 30% 20% 10% 0% Sight Hearing Touch Smell Taste
  • 13. We can process large amounts of visual data
  • 14. Writing is a recent invention
  • 16. Georg Hegel Philosopher Newspaper editor Headmaster 1770 – 1831
  • 18. Georg Hegel “Identity is the identity of identity and non-identity.” particularity universality individuality
  • 19. Prof. Ian Goldberg • " Cryptographer Privacy expert b. 1973 Canada Inventor of the “Nymity Slider”
  • 20. • " “Privacy and national security are like opposite ends of a slider,“
  • 21. • " "Technology is like a magnet that allows individuals to pull that slider back toward themselves.“
  • 23. John Venn Theologian Logician Cricketer 1837 – 1923 Inventor of the Venn diagram
  • 24.
  • 25. Similar to Euler diagram
  • 26.
  • 27.
  • 28. Business Partners Anonymous MyAccount Customers
  • 30. Prof. Jiro Kawakita Anthropologist Mountain climber Plant collector 1920 – 2009 Inventor of the Affinity diagram
  • 31. “Let the facts speak for themselves” • Too many facts or ideas in apparent chaos • Issues are too large and complex to grasp • Group consensus
  • 32. KJ Method or Affinity diagram
  • 33. Prof. Peter Chen Computer scientist Inventor of the Entity- Relationship model b. 1947
  • 34. “Entities and relationships are a natural way to organize physical things as well as information … “
  • 35. “… The ER concept is the basic fundamental principle for conceptual modelling. It has been with us since thousands of years ago and will be with us for many years to come.”
  • 36.
  • 37. Entity–relationship model 2 Registrar 5 Attribute Authority Registers for identity Issues identifier Asserts access claim Enrols for service Issues credential 4 Provides service Credential Authority Circle of Trust Authorisation 1 Policy 6 Governance Subject Identity service Authentication service Reliant party Access service 2 Entity 3 Service or Resource
  • 38.
  • 39. Prof. Shigeru Mizuno Quality management guru Inventor of matrix diagram
  • 40. Matrix diagram Strength of Registration Strength of Authentication Mechanism
  • 42. Matrix diagram SAP Microsoft IBM Security strong positive strong positive strong positive Functionality strong positive neutral positive Integration positive positive positive Interoperability positive neutral positive Usability positive neutral neutral Innovativeness positive neutral positive Market Position positive strong positive strong positive Financial strong positive strong positive strong positive Strength Ecosystem positive strong positive strong positive
  • 43. Matrix diagram TOGAF Policy Entities & Identity Resources & Assets Authentication & Credentials Authorization & Access Operation & Governance 1 Vision 2 Business Architecture 3 Information System Architecture 4 Technology Architecture 5 Opportunities & Solutions 6 Migration Planning 7 Implementation Governance 8 Change Management 9 Requirements
  • 46. Dr W. Edwards Deming Father of modern quality control Quality management guru 1900 - 1993
  • 47. “It is not enough to do your best; you must know what to do and then do your best.”
  • 49. The Deming Cycle Plan Do Check Act Identifier and credential scope Collection and consolidation Mapping and validation Reconcile and remediation Authoritative identifiers and credentials Policy scope Collection and consolidation Policy review Policy remediation Authoritative policy
  • 50. Matthew Henry Phineas Riall Sankey Engineer Introduced the first energy flow diagram 1853 – 1926 Ireland
  • 51.
  • 52.
  • 55. IRM is the new IAM scale complexi ty adaptable dynamic bigger faster connected diver se decent ral isat ion non- l inear i ty
  • 56. Why diagrams? • Data can be hard to understand especially in written form. • Diagrams help us understand complex data and information and identify complex relationships. • We learn better visually.
  • 57. These people developed diagrams to make life easier to understand
  • 59. Contact information Insert contact picture Robert Lapes Identity Architect robert.lapes@capgemini.com Capgemini UK | Bristol (Toltec) Tel: +44 0 870 194 6658 Insert contact picture Andrew Critchley IAM Proposition Lead andrew.critchley @capgemini.com Capgemini UK | Sale Tel: + 44 (0)7891 154281

Editor's Notes

  1. Speaker biography Robert Lapes is head of identity advisory services in Capgemini’s IAM practice in the UK. He is a chartered engineer with nearly 30 years of insight and lessons learnt in I.T. For the last ten years he has been working on assurance of large scale identity programs. He has helped senior stakeholders in Government, agencies, NGOs and global businesses to transform and assure their identity strategy and architecture. His architectural research for the EU Guide project has given him a unique insight into fundamentals of identity, trust, privacy and consent. He has combined his experience of over 65 client engagements to develop an IAM framework to help clients to understand how identity drives their business and structure their approach to identity. He lives in the West of England and in his spare time enjoys philosophy, cycling, cider and cider making.
  2. The objective of your presentation: My presentation will last twenty minutes with five minutes for questions. My presentation is split into four key areas. IRM context Why diagrams? What diagrams? Identity Relationships Management Summary and questions
  3. Preface about IRM and IAM Pillars of IRM BUSINESS PILLARS CONSUMERS AND THINGS over employees ADAPTABLE over predictable TOP LINE REVENUE over operating expense VELOCITY over process TECHNICAL PILLARS INTERNET SCALE over enterprise scale DYNAMIC INTELLIGENCE over static intelligence BORDERLESS over perimeter MODULAR over monolithic
  4. https://kantarainitiative.org/irmpillars/
  5. https://kantarainitiative.org/irmpillars/
  6. Context?? 7.1B population 3 B employed 205 unemployed 2.5B have bank accounts 2.5 B do not have bank accounts World's top ten largest public and private employers, 2012 = employed 17.6M people Employer Employees Headquarters United States Department of Defense 3.2 million United States People's Liberation Army 2.3 million China Wal-Mart 2.1 million United States McDonald's 1.9 million United States National Health Service (NHS) 1.7 million United Kingdom China National Petroleum Corporation 1.0 million China State Grid Corporation of China 1.5 million China Indian Railways 1.4 million India Indian Armed Forces 1.3 million India Hon Hai Precision Industry (Foxconn) 1.2 million Taiwan Rank Company Country Industry Revenue in USD 1 Wal-Mart USA Retail $476.3 billion 2 Royal Dutch Shell NL/UK Petroleum $459.6 billion 3 Sinopec China Petroleum $457.2 billion 4 Nat. Petroleum Corp. China Petroleum $432.0 billion 5 ExxonMobil USA Petroleum $407.7 billion 6 BP UK Petroleum $396.2 billion 7 State Grid Corp. China Power $333.4 billion 8 Volkswagen Germany Automobiles $261.5 billion 9 Toyota Japan Automobiles $256.5 billion 10 Glencore Switz Commodities $232.7 billion
  7. 7.1B population 3 B employed 205 unemployed 2.5B have bank accounts 2.5 B do not have bank accounts World's top ten largest public and private employers, 2012 = employed 17.6M people Employer Employees Headquarters United States Department of Defense 3.2 million United States People's Liberation Army 2.3 million China Wal-Mart 2.1 million United States McDonald's 1.9 million United States National Health Service (NHS) 1.7 million United Kingdom China National Petroleum Corporation 1.0 million China State Grid Corporation of China 1.5 million China Indian Railways 1.4 million India Indian Armed Forces 1.3 million India Hon Hai Precision Industry (Foxconn) 1.2 million Taiwan Rank Company Country Industry Revenue in USD 1 Wal-Mart USA Retail $476.3 billion 2 Royal Dutch Shell NL/UK Petroleum $459.6 billion 3 Sinopec China Petroleum $457.2 billion 4 Nat. Petroleum Corp. China Petroleum $432.0 billion 5 ExxonMobil USA Petroleum $407.7 billion 6 BP UK Petroleum $396.2 billion 7 State Grid Corp. China Power $333.4 billion 8 Volkswagen Germany Automobiles $261.5 billion 9 Toyota Japan Automobiles $256.5 billion 10 Glencore Switz Commodities $232.7 billion
  8. My job is to help clients understand their identity problems and find solutions to them. In many cases clients don’t know what to do or what they want. Frequently this means helping clients to understand the data and information that they already know. I’ve found that diagrams are an excellent way to bring understanding to data and information. Diagrams can be used to visualise: Data; Information; Concepts; Strategy; Metaphors; Compound concepts. This presentation looks at a few useful data, information and concept diagrams. Why are diagrams effective? See also: http://en.wikipedia.org/wiki/Data_visualization http://www.visual-literacy.org/periodic_table/periodic_table.html
  9. We learn mainly by sight.
  10. Humans have evolved to process large amounts of visual information. While awake a human has a total brain bandwidth of approximately 100Mb/s or about 10MB/s Diagram: http://en.wikipedia.org/wiki/Tor_N%C3%B8rretranders http://www.mu-sigma.com/uvnewsletter/links.html#a
  11. In terms of human evolution, writing is a recent innovation. So it is not hard to see why we find pictures, pictograms and diagrams useful ways to convey information. Picture: http://bigpicturehistory.com/wp-content/uploads/2012/08/evolutionOfWriting.jpg
  12. I’d like to start with a diagram that is based on the work on the German philosopher Georg Hegel. He is regarded as one of Germany’s greatest philosophers. Georg Wilhelm Friedrich Hegel was born in 1770 in Stuttgart, Germany He studied theology, philosophy and logic. He took jobs as a newspaper editor and also as a headmaster to fund his studies. He was interested in philosophy for the common man and building on the ideas of the philosopher Immanuel Kant. Hegel is considered as one of the hardest philosophers to read Hegel dialectic work builds on the works of: Zeno; Heraclitus; Socrates; Plato; and Kant It was a major influence on: Marx; and Engels.
  13. Hegelian Dialectic The dialectic diagram is a triad of: thesis, antithesis, synthesis It is often used to describe the thought of Hegel, although he never used the term himself. Dialectic is a method of argument for resolving conflict or disagreement. It is a method that is central to both European and Indian philosophy. G.W.F. Hegel reintroduced the idea of dialectics just as the industrial revolution was beginning. Hegel suggested that for every idea that exists (thesis) an opposite and counter idea (anti-thesis) exists. The Synthesis solves the conflict between the thesis and antithesis by reconciling their common truths and forming a new thesis. When applied to IRM it helps us consider what we want, what we don’t want and an acceptable compromise. For example it can help us consider what assurance we need before we make a decision to trust
  14. Here’s how helpful it can be when you need to sort out identity problems. Three Kinds of Contradiction Being the opposed pair of concepts at first seem flatly opposed, as if they would have nothing at all to do with one another: Being Nothing / Quantity Quality. Only be means of analysis or deduction can they be shown to be intimately interrelated. Essence the opposed pairs immediately imply one another. The Inner and the Outer, for example: to define one is at the same time to define the other. Notion where pairs are linked by a more sophisticated conceptual link, for example the concept of Identity whose component parts, Universality and Particularity, are conceptually interrelated.
  15. The second identity diagram builds on this concept that identity is not a binary state. Professor Ian Goldberg Born 1973 Canada His Ph.D. thesis at Berkley in 2000 was: “A Pseudonymous Communications Infrastructure for the Internet” This contained the nymity slider. http://en.wikipedia.org/wiki/Ian_Goldberg
  16. We can trace the origins of the slider back to 1998 when Ian is quoted as saying: “Privacy and national security are like opposite ends of a slider,“ "Technology is like a magnet that allows individuals to pull that slider back toward themselves.“
  17. We can trace the origins of the slider back to 1998 when Ian is quoted as saying: “Privacy and national security are like opposite ends of a slider,“ "Technology is like a magnet that allows individuals to pull that slider back toward themselves.“
  18. This is how the Nymity Slider appeared in Goldberg’s thesis. The Nymity Slider builds on Hegel’s dialectic view. In Enterprise IAM you are either identified or you are not. In IRM and the IoT the consumer wants to take control of how they identify themselves.
  19. John Venn was a noted logician and philosopher born 1837 Kingston upon Hull, Yorkshire, England. Died 1923, Cambridge, England. A Venn diagram or set diagram is a diagram that shows all possible logical relations between a finite collection of sets. It is used in the fields of set theory, probability, logic, statistics, and computer science. Introduced by John Venn in 1880. Published in “On the Diagrammatic and Mechanical Representation of Propositions and Reasonings”
  20. A Venn diagram or set diagram is a diagram that shows all possible logical relations between a finite collection of sets. It is used in the fields of set theory, probability, logic, statistics, and computer science. Introduced by John Venn in 1880. Published in “On the Diagrammatic and Mechanical Representation of Propositions and Reasonings” This is what his first diagram looked like. The American philosopher Clarence Irving Lewis was the first to use the term "Venn diagram" in his book "A Survey of Symbolic Logic“ published in 1918. http://en.wikipedia.org/wiki/Venn_diagram
  21. Venn diagrams have regions for all possible combinations of groups whether there are things in those regions or not.  Shading indicates if things are actually found in those regions. Euler diagrams only show a region if things exist in that region. An advantage of the Venn diagram is that it can show gaps and missing groups. Diagram source: http://d5lx5634mkgoi.cloudfront.net/wp-content/uploads/2009/09/vennvenn2.png
  22. In IAM Venn diagrams are useful tools for set and gap analysis. Source: Eve Maler
  23. A Venn diagram or set diagram is a diagram that shows all possible logical relations between a finite collection of sets. It is used in the fields of set theory, probability, logic, statistics, and computer science. Introduced by John Venn in 1880. Published in “On the Diagrammatic and Mechanical Representation of Propositions and Reasonings” Born 1837 Kingston upon Hull, Yorkshire, England
  24. Kawakita Jiro (KJ) Japanese anthropologist 1920-2009 Studied at Kyoto University Whilst studying ethno-geography in Nepal during 1960’s he developed a systematic way to find messages in complex qualitative data. It was a bottom-up approach that abducts an idea from data Known as the KJ Method or Affinity diagram http://en.wikipedia.org/wiki/Seven_Management_and_Planning_Tools
  25. The KJ-Method is an effective a mix of independent brainstorming, group dynamics, and democracy. It allows a team to be creative and critical in a productive manner, to the independent perspectives and experience of the team. It avoids problems created by strong personalities and politics. Note that this method use Eastern philosophy rather than Western scientific approach to capture issues.
  26. A KJ diagram can be helpful when: • issues are complex – lots of information available, but many potential interpretations team would benefit by learning together – based on facts – developing common understanding and focus • communication and reuse of the information is important – KJ is a powerful way to store and transmit data Record ideas on notes. Look for related ideas. Sort into groups. Thanks to: the inventors of the post-it note: Dr. Spencer Silver and Art Fry
  27. Prof. Peter Pin-Shan Chen b. 1947 Korea Computer Scientist Developed the Entity Relationship Model His 1976 paper on the Entity-Relationship model (ER model) is one of the most cited papers in the computer software field. An entity-relationship model is a systematic way of describing and defining a business process. It helps to discover “hidden relationships” between entities and associated data. They are the foundation of many systems analysis, design and software engineering methods. In Enterprise IAM – technologist define permissible relationships. In Consumer IRM – relationships are made by consumers and discovered by analysis
  28. „Entities and relationships are a natural way to organize physical things as well as information … The ER concept is the basic fundamental principle for conceptual modelling. It has been with us since thousands of years ago and will be with us for many years to come.” Many of you have heard about data mining. If you think deeply about what the data mining actually does, you will see the linkage between data mining and the ER model. What is data mining? What does the data mining really is doing? In our view, it is a discovery of “hidden relationships” between data entities. The relationships exist already, and we need to discover them and then take advantage of them. This is different from conventional database design in which the database designers identify the relationships. In data mining, algorithms instead of humans are used to discover the hidden relationships.
  29. „Entities and relationships are a natural way to organize physical things as well as information … The ER concept is the basic fundamental principle for conceptual modelling. It has been with us since thousands of years ago and will be with us for many years to come.” Many of you have heard about data mining. If you think deeply about what the data mining actually does, you will see the linkage between data mining and the ER model. What is data mining? What does the data mining really is doing? In our view, it is a discovery of “hidden relationships” between data entities. The relationships exist already, and we need to discover them and then take advantage of them. This is different from conventional database design in which the database designers identify the relationships. In data mining, algorithms instead of humans are used to discover the hidden relationships.
  30. The entity-relationship model can be used as a basis for unification of different views of data:  the network model, the relational model and the entity set model. When trying to understand links between ideas or cause–and–effect relationships, such as when trying to identify an area of greatest impact for improvement. When a complex issue is being analyzed for causes. When a complex solution is being implemented. After generating an affinity diagram, cause–and–effect diagram or tree diagram, to more completely explore the relations of ideas.
  31. The entity-relationship model can be used as a basis for unification of different views of data:  the network model, the relational model and the entity set model.
  32. The matrix diagram shows the relationship between two, three or four groups of information. It also can give information about the relationship, such as its strength, the roles played by various individuals or measurements. Matrix Diagram came out of the work of a committee of the Japanese Society for Quality Control Technique Development that operated from 1972-1979 The matrix diagram was part of the second wave of Japanese quality improvement in the late 1970’s. Shigeru Mizuno included the diagram in his 1988 book, Management for Quality Improvement. Six differently shaped matrices are possible: L, T, Y, X, C and roof–shaped, depending on how many groups must be compared. See: http://asq.org/learn-about-quality/new-management-planning-tools/overview/matrix-diagram.html
  33. This is a 2D L-shaped matrix. Registration and Authentication assurance The example shows the level of assurance for combinations of registration and authentication strength.
  34. Another assurance example this time from Eve Maler http://www.xmlgrrl.com/blog/2009/12/31/how-to-rest-assured/
  35. This matrix diagram example is from a client’s vendor assessment.
  36. This example L-Matrix maps an identity framework onto an Enterprise Architecture framework.
  37. Dr William Edwards Deming American engineer, statistician, professor, author, lecturer, and management consultant. 1900 - 1993 Seen by many as the father of modern quality control and a quality management guru Plan; Do; Check (Study); Act It reminds us that IAM programs are one of continuous process improvement
  38. Father of modern quality control Plan; Do; Check (Study); Act It reminds us that IAM programs are one of continuous process improvement
  39. Deming championed the work of Dr. Walter Shewhart Plan; Do; Check (Study); Act It reminds us that IAM programs are one of continuous process improvement
  40. Deming cycle applied to identity framework for an identity data quality review.
  41. Matthew Henry Phineas Riall Sankey Born County Tipperary in 1853 Sankey introduced the first energy flow diagram in an 1898 article about the energy efficiency of a steam engine in the Minutes of Proceedings of The Institution of Civil Engineers Joiners, Movers, Leavers Identity and identifier types Credentials types and lifecycle events
  42. In an 1898 article about the energy efficiency of a steam engine in the Minutes of Proceedings of The Institution of Civil Engineers Sankey introduced the first energy flow diagram
  43. These were initially made famous by Charles Joseph Minard's statistical graphic of 1869, showing the dramatic decrease in number of Napoleon's troops as his army advanced on Moscow and then retreated, with the size of the army indicated by the width of the line. Minard was a pioneer of the use of graphics in engineering and statistics. He is most well known for his cartographic depiction of numerical data on a map of Napoleon's disastrous losses suffered during the Russian campaign of 1812 (in French, Carte figurative des pertes successives en hommes de l'Armée Française dans la campagne de Russie 1812-1813). The illustration depicts Napoleon's army departing the Polish-Russian border. A thick band illustrates the size of his army at specific geographic points during their advance and retreat. It displays six types of data in two dimensions: the number of Napoleon's troops; the distance travelled; temperature; latitude and longitude; direction of travel; and location relative to specific dates.
  44. Sankey diagram for global Internet traffic in 2010. Source: http://www.telegeography.com/assets/website/images/maps/global-traffic-map-2010/global-traffic-map-2010-l.jpg Joiners, Movers, Leavers Identity and identifier types Credentials types and lifecycle events
  45. Context?? 7.1B population 3 B employed 205 unemployed 2.5B have bank accounts 2.5 B do not have bank accounts World's top ten largest public and private employers, 2012 = employed 17.6M people Employer Employees Headquarters United States Department of Defense 3.2 million United States People's Liberation Army 2.3 million China Wal-Mart 2.1 million United States McDonald's 1.9 million United States National Health Service (NHS) 1.7 million United Kingdom China National Petroleum Corporation 1.0 million China State Grid Corporation of China 1.5 million China Indian Railways 1.4 million India Indian Armed Forces 1.3 million India Hon Hai Precision Industry (Foxconn) 1.2 million Taiwan Rank Company Country Industry Revenue in USD 1 Wal-Mart USA Retail $476.3 billion 2 Royal Dutch Shell NL/UK Petroleum $459.6 billion 3 Sinopec China Petroleum $457.2 billion 4 Nat. Petroleum Corp. China Petroleum $432.0 billion 5 ExxonMobil USA Petroleum $407.7 billion 6 BP UK Petroleum $396.2 billion 7 State Grid Corp. China Power $333.4 billion 8 Volkswagen Germany Automobiles $261.5 billion 9 Toyota Japan Automobiles $256.5 billion 10 Glencore Switz Commodities $232.7 billion
  46. Analysis paralysis Diagrams can be used to visualise: Data; Information; Concepts; Strategy; Metaphors; Compound concepts. http://www.visual-literacy.org/periodic_table/periodic_table.html
  47. Left to Right Ian Goldberg – Nymity Slider W.Edwards Deming - Deming Cycle Peter Chen - Entity Relationship diagram Shigeru Mizuno - Matrix diagram Kawakita Jiro - KJ method / Affinity diagram Matthew Sankey - Sankey diagram John Venn - Venn diagram Georg Hegel - Dialectic
  48. Speaker biography Robert Lapes is head of identity advisory services in Capgemini’s IAM practice in the UK. He is a chartered engineer with nearly 30 years of insight and lessons learnt in I.T. For the last ten years he has been working on assurance of large scale identity programs. He has helped senior stakeholders in Government, agencies, NGOs and global businesses to transform and assure their identity strategy and architecture. His architectural research for the EU Guide project has given him a unique insight into fundamentals of identity, trust, privacy and consent. He has combined his experience of over 65 client engagements to develop an IAM framework to help clients to understand how identity drives their business and structure their approach to identity. He lives in the West of England and in his spare time enjoys philosophy, cycling, cider and cider making.