SlideShare a Scribd company logo
1 of 59
Download to read offline
@Sarah_Cecc Women in Identity
How to Write a
Conference Proposal
Sarah Cecchetti, Principal Product Manager, AWS Identity
@Sarah_Cecc Women in Identity
Be Difficult to Discourage
“A woman with a voice is, by definition, a strong woman.”
- Melinda Gates
@Sarah_Cecc Women in Identity
Understanding
the market
@Sarah_Cecc Women in Identity
Market Players
1
Attendees are customers
2
3
4
@Sarah_Cecc Women in Identity
Market Players
1
Attendees are customers
2
Vendors are customers
3
4
@Sarah_Cecc Women in Identity
Market Players
1
Attendees are customers
2
Vendors are customers
3
Keynote speakers are customers
4
@Sarah_Cecc Women in Identity
Market Players
1
Attendees are customers
2
Vendors are customers
3
Keynote speakers are customers
4
You are the product
What makes a good product?
@Sarah_Cecc Women in Identity
Attendees want to
see...
● First-hand experience
@Sarah_Cecc Women in Identity
Attendees want to
see...
● First-hand experience
● New ideas and concepts
@Sarah_Cecc Women in Identity
Attendees want to
see...
● First-hand experience
● New ideas and concepts
● Explanation of new standards
@Sarah_Cecc Women in Identity
Attendees want to
see...
● First-hand experience
● New ideas and concepts
● Explanation of new standards
● Stories from the field
@Sarah_Cecc Women in Identity
Attendees want to
see...
● First-hand experience
● New ideas and concepts
● Explanation of new standards
● Stories from the field
● Basics of emerging technologies
Writing a Good Bio
@Sarah_Cecc Women in Identity
Bio Tips
● One paragraph (about 100 words)
@Sarah_Cecc Women in Identity
Bio Tips
● One paragraph (about 100 words)
● Consistency - conferences will google you
@Sarah_Cecc Women in Identity
Bio Tips
● One paragraph (about 100 words)
● Consistency - conferences will google you
● Write in third-person and use the voice of your
biggest supporter
@Sarah_Cecc Women in Identity
Bio Tips
● One paragraph (about 100 words)
● Consistency - conferences will google you
● Write in third-person and use the voice of your
biggest supporter
● Stick to the facts
@Sarah_Cecc Women in Identity
Bio Tips
● One paragraph (about 100 words)
● Consistency - conferences will google you
● Write in third-person and use the voice of your
biggest supporter
● Stick to the facts
● Keep personal information, if any, limited and put it
at the end
@Sarah_Cecc Women in Identity
Experienced Bio
Sarah Cecchetti is a Principal Product Manager at AWS Identity. She is a co-author of NIST Special Publication 800-63C Digital Identity
Guidelines, which outlines federated authentication standards for all US federal agencies. She serves as Vice Chair on the Board of
Directors for IDPro. She has been named one of the top 100 influencers in identity. Sarah holds a Bachelor of Science in Physics and a
Master of Science in Information Management from the University of Washington where she was a NASA Space Grant Scholar. She is also
a Certified Information Security System Professional (CISSP).
@Sarah_Cecc Women in Identity
Experienced Bio
Sarah Cecchetti is a Principal Product Manager at AWS Identity. She is a co-author of NIST Special Publication 800-63C Digital Identity
Guidelines, which outlines federated authentication standards for all US federal agencies. She serves as Vice Chair on the Board of
Directors for IDPro. She has been named one of the top 100 influencers in identity. Sarah holds a Bachelor of Science in Physics and a
Master of Science in Information Management from the University of Washington where she was a NASA Space Grant Scholar. She is also
a Certified Information Security System Professional (CISSP).
Newbie Bio
Sarah Cecchetti is the founder and principal consultant at Engage Identity. She has contributed to several open standards working groups including OpenID Foundation’s
HEAlthRelationship Trust (HEART) and the Kantara Initiative’s User Managed Access (UMA) and Consent Receipts projects. She has worked on identity and security
technology with a focus on the higher education and nonprofit sectors. Sarah holds a Bachelor of Science in Physics and a Master of Science in Information Management from
the University of Washington where she was a NASA Space Grant Scholar.
Proposals that will be immediately
rejected and how to avoid them
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
0
2
0
3
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
The Sales Pitch
0
2
0
3
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
The Sales Pitch
Solution: “I solemnly swear that I will not mention
Ping, Ping products, or Ping marketing jargon in
the talk at all. I would like to be seen as an industry
expert, and I'd like to be invited back, and I
understand that the smallest whiff of sales will get
me booed off stage and not invited back. :)”
0
2
0
3
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
The Sales Pitch
Solution: “I solemnly swear that I will not mention
Ping, Ping products, or Ping marketing jargon in
the talk at all. I would like to be seen as an industry
expert, and I'd like to be invited back, and I
understand that the smallest whiff of sales will get
me booed off stage and not invited back. :)”
0
2
The Soapbox
0
3
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
The Sales Pitch
Solution: “I solemnly swear that I will not mention
Ping, Ping products, or Ping marketing jargon in
the talk at all. I would like to be seen as an industry
expert, and I'd like to be invited back, and I
understand that the smallest whiff of sales will get
me booed off stage and not invited back. :)”
0
2
The Soapbox
Solution: The proposal should relate to your
work, your field, or at the very least, the
conference.
0
3
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
The Sales Pitch
Solution: “I solemnly swear that I will not mention
Ping, Ping products, or Ping marketing jargon in
the talk at all. I would like to be seen as an industry
expert, and I'd like to be invited back, and I
understand that the smallest whiff of sales will get
me booed off stage and not invited back. :)”
0
2
The Soapbox
Solution: The proposal should relate to your
work, your field, or at the very least, the
conference.
0
3
The Rulebreaker
@Sarah_Cecc Women in Identity
The Discard Pile
0
1
The Sales Pitch
Solution: “I solemnly swear that I will not mention
Ping, Ping products, or Ping marketing jargon in
the talk at all. I would like to be seen as an industry
expert, and I'd like to be invited back, and I
understand that the smallest whiff of sales will get
me booed off stage and not invited back. :)”
0
2
The Soapbox
Solution: The proposal should relate to your
work, your field, or at the very least, the
conference.
0
3
The Rulebreaker
Solution: Read the rules. Twice.
Generating Submission Ideas
@Sarah_Cecc Women in Identity
Five Questions
01 | What have I been working on?
@Sarah_Cecc Women in Identity
Five Questions
01 | What have I been working on?
02 | What stories do I tell people about my work?
@Sarah_Cecc Women in Identity
Five Questions
01 | What have I been working on?
02 | What stories do I tell people about my work?
03 | What do I find fascinating and want to try or learn about?
@Sarah_Cecc Women in Identity
Five Questions
01 | What have I been working on?
02 | What stories do I tell people about my work?
03 | What do I find fascinating and want to try or learn about?
04 | What do most people not know or misunderstand about my field?
@Sarah_Cecc Women in Identity
Five Questions
01 | What have I been working on?
02 | What stories do I tell people about my work?
03 | What do I find fascinating and want to try or learn about?
04 | What do most people not know or misunderstand about my field?
05 | What could transform my field in the next ten years?
Building a narrative
@Sarah_Cecc Women in Identity
Are any of these
ideas interrelated?
What have I been working on?
NIST Digital Identity Guidelines
What do most people not know or
misunderstand about my field?
Vectors of Trust
@Sarah_Cecc Women in Identity
Are any of these
ideas interrelated?
What have I been working on?
NIST Digital Identity Guidelines
What do most people not know or
misunderstand about my field?
Vectors of Trust
Can I build a causal
or temporal
relationship?
NIST Digital Identity Guidelines
came after and was inspired by
Vectors of Trust
@Sarah_Cecc Women in Identity
Are any of these
ideas interrelated?
What have I been working on?
NIST Digital Identity Guidelines
What do most people not know or
misunderstand about my field?
Vectors of Trust
Can I build a causal
or temporal
relationship?
NIST Digital Identity Guidelines
came after and was inspired by
Vectors of Trust
Can I tell a story?
NIST 800-63-3 went into public review last
year. It outlines three new scales for
measuring the assurance of an
authentication event. Those scales were
heavily informed by Vectors of Trust, which
is on track to become an IETF informational
draft this year. Find out how Vectors of
Trust influenced NIST 800-63, and how
authentication will be measured in the
future domestically and internationally.
Making a new framework
@Sarah_Cecc Women in Identity
Do these ideas
reflect a new way of
thinking?
What do most people not know or
misunderstand about my field?
jargon
What do I find fascinating and want
to try or learn about?
Thing Explainer
@Sarah_Cecc Women in Identity
Do these ideas
reflect a new way of
thinking?
What do most people not know or
misunderstand about my field?
jargon
What do I find fascinating and want
to try or learn about?
Thing Explainer
What makes me
uniquely passionate
about these things?
I frequently evangelize the value of
identity to people who aren’t
identity nerds (with no prompting)
@Sarah_Cecc Women in Identity
Do these ideas
reflect a new way of
thinking?
What do most people not know or
misunderstand about my field?
jargon
What do I find fascinating and want
to try or learn about?
Thing Explainer
What makes me
uniquely passionate
about these things?
I frequently evangelize the value of
identity to people who aren’t
identity nerds (with no prompting)
How can my
perspective change
the way people think
about this?
Can you describe the value of identity
management using only the thousand most
common words in the English language? In
the style of Randall Munroe’s "Thing
Explainer" you can learn how to explain
important identity concepts using simple
words. Identity is incredibly important in
today's market, and the ability to express
that importance to non-technical people is
critical.
Finding commonality
@Sarah_Cecc Women in Identity
Do these ideas have
something in
common?
What could transform my field in
the next ten years?
zero-trust networks
zero login
one-identity initiatives
@Sarah_Cecc Women in Identity
Do these ideas have
something in
common?
What could transform my field in
the next ten years?
zero-trust networks
zero login
one-identity initiatives
Can the details
inform a common
theme?
These are all large security
initiatives that can transform the
way businesses implement
identity.eifjccikcgufiivjcdlcfducvdle
fijdevhddedbrdue
@Sarah_Cecc Women in Identity
Do these ideas have
something in
common?
What could transform my field in
the next ten years?
zero-trust networks
zero login
one-identity initiatives
Can the details
inform a common
theme?
These are all large security
initiatives that can transform the
way businesses implement
identity.eifjccikcgufiivjcdlcfducvdle
fijdevhddedbrdue
Can I explain why
people should care?
Identity innovations like zero-trust
networks, zero login, and one identity
initiatives are transforming today's most
successful organizations from within. Trust
boundaries are changing. Find out the
technical details behind these innovations
and take home a game plan to start
transforming your organization today, this
week, and in the long run.
Titling your talk
@Sarah_Cecc Women in Identity
Keep. It. Stupid. Simple.
Submission Etiquettte
@Sarah_Cecc Women in Identity
Etiquette
Can I submit more than one
proposal?
@Sarah_Cecc Women in Identity
Etiquette
Can I submit more than one
proposal?
Can I submit a proposal to two
places?
@Sarah_Cecc Women in Identity
Etiquette
Can I submit more than one
proposal?
Can I submit a proposal to two
places?
Can I submit a proposal for
multiple years?
Accepting not being accepted
@Sarah_Cecc Women in Identity
Accepting Rejection
● It’s okay to grieve (and even cry!)
@Sarah_Cecc Women in Identity
Accepting Rejection
● It’s okay to grieve (and even cry!)
● Be proud of yourself for not throwing away your
shot
@Sarah_Cecc Women in Identity
Accepting Rejection
● It’s okay to grieve (and even cry!)
● Be proud of yourself for not throwing away your
shot
● Remember that the acceptance committee
doesn’t actually know you as a person
@Sarah_Cecc Women in Identity
Accepting Rejection
● It’s okay to grieve (and even cry!)
● Be proud of yourself for not throwing away your
shot
● Remember that the acceptance committee
doesn’t actually know you as a person
● Try again when you’re ready
Thank you.

More Related Content

Similar to Explaining Identity Concepts Simply

Mulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan Pelanggan
Mulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan PelangganMulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan Pelanggan
Mulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan PelangganAmazon Web Services
 
From Aha! to Eureka Smartees Seminar
From Aha! to Eureka Smartees Seminar From Aha! to Eureka Smartees Seminar
From Aha! to Eureka Smartees Seminar InSites on Stage
 
How to Create a Social Media Strategy That Works
How to Create a Social Media Strategy That WorksHow to Create a Social Media Strategy That Works
How to Create a Social Media Strategy That WorksDarrian Wright
 
Backstage 2019 - The UX of Data - Lex Roman
Backstage 2019 - The UX of Data - Lex RomanBackstage 2019 - The UX of Data - Lex Roman
Backstage 2019 - The UX of Data - Lex RomanAmplitude
 
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean CampbellSourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean CampbellReynolds Center for Business Journalism
 
Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...
Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...
Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...Kiwi Creative
 
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015n|u - The Open Security Community
 
Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...
Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...
Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...ProductCamp Boston
 
"Is Your Net Working?"
"Is Your Net Working?""Is Your Net Working?"
"Is Your Net Working?"Eric Smith
 
Dr. Sassi's Trifecta of Skills: Your Formula for Future Readiness
Dr. Sassi's Trifecta of Skills: Your Formula for Future ReadinessDr. Sassi's Trifecta of Skills: Your Formula for Future Readiness
Dr. Sassi's Trifecta of Skills: Your Formula for Future ReadinessDr. Melissa Sassi
 
Final capitalising on female strenghts in it
Final   capitalising on female strenghts in it Final   capitalising on female strenghts in it
Final capitalising on female strenghts in it Mia Horrigan
 
Uncovering the Hidden Assumptions in Your Business
Uncovering the Hidden Assumptions in Your BusinessUncovering the Hidden Assumptions in Your Business
Uncovering the Hidden Assumptions in Your BusinessAndrew Ngui
 
Crafting a Compelling (and Honest) Speaker Bio
Crafting a Compelling (and Honest) Speaker BioCrafting a Compelling (and Honest) Speaker Bio
Crafting a Compelling (and Honest) Speaker BioSage Franch
 
Create Your Elevator Pitch - Pat Drew and Ivy Exec
Create Your Elevator Pitch - Pat Drew and Ivy ExecCreate Your Elevator Pitch - Pat Drew and Ivy Exec
Create Your Elevator Pitch - Pat Drew and Ivy ExecIvy Exec
 
Internet marketing 101 MATI course
Internet marketing 101 MATI course Internet marketing 101 MATI course
Internet marketing 101 MATI course Shari Wright-Pilo
 
Content Marketing Superstars
Content Marketing SuperstarsContent Marketing Superstars
Content Marketing SuperstarsRyan Skinner
 
Monetizing useractivityonsocialnetworks challenges[1]
Monetizing useractivityonsocialnetworks challenges[1]Monetizing useractivityonsocialnetworks challenges[1]
Monetizing useractivityonsocialnetworks challenges[1]Damien Ravé
 
How to build your professional profile - 5 tactics
How to build your professional profile - 5 tacticsHow to build your professional profile - 5 tactics
How to build your professional profile - 5 tacticsJoanne Spain
 

Similar to Explaining Identity Concepts Simply (20)

Mulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan Pelanggan
Mulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan PelangganMulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan Pelanggan
Mulai Cepat dengan AWS (Level 100) | Bekerja Sesuai Keinginan Pelanggan
 
From Aha! to Eureka Smartees Seminar
From Aha! to Eureka Smartees Seminar From Aha! to Eureka Smartees Seminar
From Aha! to Eureka Smartees Seminar
 
Socialmedia 101 - MATI
Socialmedia 101  - MATI Socialmedia 101  - MATI
Socialmedia 101 - MATI
 
How to Create a Social Media Strategy That Works
How to Create a Social Media Strategy That WorksHow to Create a Social Media Strategy That Works
How to Create a Social Media Strategy That Works
 
Backstage 2019 - The UX of Data - Lex Roman
Backstage 2019 - The UX of Data - Lex RomanBackstage 2019 - The UX of Data - Lex Roman
Backstage 2019 - The UX of Data - Lex Roman
 
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean CampbellSourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
 
Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...
Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...
Beyond Blogging: How B2B Tech Marketers Can Build Trust Through Content Marke...
 
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
 
Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...
Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...
Women in Product Management - Perilous Path or Rewarding Roadmap? (Xenia Kwee...
 
"Is Your Net Working?"
"Is Your Net Working?""Is Your Net Working?"
"Is Your Net Working?"
 
Dr. Sassi's Trifecta of Skills: Your Formula for Future Readiness
Dr. Sassi's Trifecta of Skills: Your Formula for Future ReadinessDr. Sassi's Trifecta of Skills: Your Formula for Future Readiness
Dr. Sassi's Trifecta of Skills: Your Formula for Future Readiness
 
Final capitalising on female strenghts in it
Final   capitalising on female strenghts in it Final   capitalising on female strenghts in it
Final capitalising on female strenghts in it
 
6 secrets for introverts
6 secrets for introverts6 secrets for introverts
6 secrets for introverts
 
Uncovering the Hidden Assumptions in Your Business
Uncovering the Hidden Assumptions in Your BusinessUncovering the Hidden Assumptions in Your Business
Uncovering the Hidden Assumptions in Your Business
 
Crafting a Compelling (and Honest) Speaker Bio
Crafting a Compelling (and Honest) Speaker BioCrafting a Compelling (and Honest) Speaker Bio
Crafting a Compelling (and Honest) Speaker Bio
 
Create Your Elevator Pitch - Pat Drew and Ivy Exec
Create Your Elevator Pitch - Pat Drew and Ivy ExecCreate Your Elevator Pitch - Pat Drew and Ivy Exec
Create Your Elevator Pitch - Pat Drew and Ivy Exec
 
Internet marketing 101 MATI course
Internet marketing 101 MATI course Internet marketing 101 MATI course
Internet marketing 101 MATI course
 
Content Marketing Superstars
Content Marketing SuperstarsContent Marketing Superstars
Content Marketing Superstars
 
Monetizing useractivityonsocialnetworks challenges[1]
Monetizing useractivityonsocialnetworks challenges[1]Monetizing useractivityonsocialnetworks challenges[1]
Monetizing useractivityonsocialnetworks challenges[1]
 
How to build your professional profile - 5 tactics
How to build your professional profile - 5 tacticsHow to build your professional profile - 5 tactics
How to build your professional profile - 5 tactics
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Explaining Identity Concepts Simply

  • 1. @Sarah_Cecc Women in Identity How to Write a Conference Proposal Sarah Cecchetti, Principal Product Manager, AWS Identity
  • 2. @Sarah_Cecc Women in Identity Be Difficult to Discourage “A woman with a voice is, by definition, a strong woman.” - Melinda Gates
  • 3. @Sarah_Cecc Women in Identity Understanding the market
  • 4. @Sarah_Cecc Women in Identity Market Players 1 Attendees are customers 2 3 4
  • 5. @Sarah_Cecc Women in Identity Market Players 1 Attendees are customers 2 Vendors are customers 3 4
  • 6. @Sarah_Cecc Women in Identity Market Players 1 Attendees are customers 2 Vendors are customers 3 Keynote speakers are customers 4
  • 7. @Sarah_Cecc Women in Identity Market Players 1 Attendees are customers 2 Vendors are customers 3 Keynote speakers are customers 4 You are the product
  • 8. What makes a good product?
  • 9. @Sarah_Cecc Women in Identity Attendees want to see... ● First-hand experience
  • 10. @Sarah_Cecc Women in Identity Attendees want to see... ● First-hand experience ● New ideas and concepts
  • 11. @Sarah_Cecc Women in Identity Attendees want to see... ● First-hand experience ● New ideas and concepts ● Explanation of new standards
  • 12. @Sarah_Cecc Women in Identity Attendees want to see... ● First-hand experience ● New ideas and concepts ● Explanation of new standards ● Stories from the field
  • 13. @Sarah_Cecc Women in Identity Attendees want to see... ● First-hand experience ● New ideas and concepts ● Explanation of new standards ● Stories from the field ● Basics of emerging technologies
  • 15. @Sarah_Cecc Women in Identity Bio Tips ● One paragraph (about 100 words)
  • 16. @Sarah_Cecc Women in Identity Bio Tips ● One paragraph (about 100 words) ● Consistency - conferences will google you
  • 17. @Sarah_Cecc Women in Identity Bio Tips ● One paragraph (about 100 words) ● Consistency - conferences will google you ● Write in third-person and use the voice of your biggest supporter
  • 18. @Sarah_Cecc Women in Identity Bio Tips ● One paragraph (about 100 words) ● Consistency - conferences will google you ● Write in third-person and use the voice of your biggest supporter ● Stick to the facts
  • 19. @Sarah_Cecc Women in Identity Bio Tips ● One paragraph (about 100 words) ● Consistency - conferences will google you ● Write in third-person and use the voice of your biggest supporter ● Stick to the facts ● Keep personal information, if any, limited and put it at the end
  • 20. @Sarah_Cecc Women in Identity Experienced Bio Sarah Cecchetti is a Principal Product Manager at AWS Identity. She is a co-author of NIST Special Publication 800-63C Digital Identity Guidelines, which outlines federated authentication standards for all US federal agencies. She serves as Vice Chair on the Board of Directors for IDPro. She has been named one of the top 100 influencers in identity. Sarah holds a Bachelor of Science in Physics and a Master of Science in Information Management from the University of Washington where she was a NASA Space Grant Scholar. She is also a Certified Information Security System Professional (CISSP).
  • 21. @Sarah_Cecc Women in Identity Experienced Bio Sarah Cecchetti is a Principal Product Manager at AWS Identity. She is a co-author of NIST Special Publication 800-63C Digital Identity Guidelines, which outlines federated authentication standards for all US federal agencies. She serves as Vice Chair on the Board of Directors for IDPro. She has been named one of the top 100 influencers in identity. Sarah holds a Bachelor of Science in Physics and a Master of Science in Information Management from the University of Washington where she was a NASA Space Grant Scholar. She is also a Certified Information Security System Professional (CISSP). Newbie Bio Sarah Cecchetti is the founder and principal consultant at Engage Identity. She has contributed to several open standards working groups including OpenID Foundation’s HEAlthRelationship Trust (HEART) and the Kantara Initiative’s User Managed Access (UMA) and Consent Receipts projects. She has worked on identity and security technology with a focus on the higher education and nonprofit sectors. Sarah holds a Bachelor of Science in Physics and a Master of Science in Information Management from the University of Washington where she was a NASA Space Grant Scholar.
  • 22. Proposals that will be immediately rejected and how to avoid them
  • 23. @Sarah_Cecc Women in Identity The Discard Pile 0 1 0 2 0 3
  • 24. @Sarah_Cecc Women in Identity The Discard Pile 0 1 The Sales Pitch 0 2 0 3
  • 25. @Sarah_Cecc Women in Identity The Discard Pile 0 1 The Sales Pitch Solution: “I solemnly swear that I will not mention Ping, Ping products, or Ping marketing jargon in the talk at all. I would like to be seen as an industry expert, and I'd like to be invited back, and I understand that the smallest whiff of sales will get me booed off stage and not invited back. :)” 0 2 0 3
  • 26. @Sarah_Cecc Women in Identity The Discard Pile 0 1 The Sales Pitch Solution: “I solemnly swear that I will not mention Ping, Ping products, or Ping marketing jargon in the talk at all. I would like to be seen as an industry expert, and I'd like to be invited back, and I understand that the smallest whiff of sales will get me booed off stage and not invited back. :)” 0 2 The Soapbox 0 3
  • 27. @Sarah_Cecc Women in Identity The Discard Pile 0 1 The Sales Pitch Solution: “I solemnly swear that I will not mention Ping, Ping products, or Ping marketing jargon in the talk at all. I would like to be seen as an industry expert, and I'd like to be invited back, and I understand that the smallest whiff of sales will get me booed off stage and not invited back. :)” 0 2 The Soapbox Solution: The proposal should relate to your work, your field, or at the very least, the conference. 0 3
  • 28. @Sarah_Cecc Women in Identity The Discard Pile 0 1 The Sales Pitch Solution: “I solemnly swear that I will not mention Ping, Ping products, or Ping marketing jargon in the talk at all. I would like to be seen as an industry expert, and I'd like to be invited back, and I understand that the smallest whiff of sales will get me booed off stage and not invited back. :)” 0 2 The Soapbox Solution: The proposal should relate to your work, your field, or at the very least, the conference. 0 3 The Rulebreaker
  • 29. @Sarah_Cecc Women in Identity The Discard Pile 0 1 The Sales Pitch Solution: “I solemnly swear that I will not mention Ping, Ping products, or Ping marketing jargon in the talk at all. I would like to be seen as an industry expert, and I'd like to be invited back, and I understand that the smallest whiff of sales will get me booed off stage and not invited back. :)” 0 2 The Soapbox Solution: The proposal should relate to your work, your field, or at the very least, the conference. 0 3 The Rulebreaker Solution: Read the rules. Twice.
  • 31. @Sarah_Cecc Women in Identity Five Questions 01 | What have I been working on?
  • 32. @Sarah_Cecc Women in Identity Five Questions 01 | What have I been working on? 02 | What stories do I tell people about my work?
  • 33. @Sarah_Cecc Women in Identity Five Questions 01 | What have I been working on? 02 | What stories do I tell people about my work? 03 | What do I find fascinating and want to try or learn about?
  • 34. @Sarah_Cecc Women in Identity Five Questions 01 | What have I been working on? 02 | What stories do I tell people about my work? 03 | What do I find fascinating and want to try or learn about? 04 | What do most people not know or misunderstand about my field?
  • 35. @Sarah_Cecc Women in Identity Five Questions 01 | What have I been working on? 02 | What stories do I tell people about my work? 03 | What do I find fascinating and want to try or learn about? 04 | What do most people not know or misunderstand about my field? 05 | What could transform my field in the next ten years?
  • 37. @Sarah_Cecc Women in Identity Are any of these ideas interrelated? What have I been working on? NIST Digital Identity Guidelines What do most people not know or misunderstand about my field? Vectors of Trust
  • 38. @Sarah_Cecc Women in Identity Are any of these ideas interrelated? What have I been working on? NIST Digital Identity Guidelines What do most people not know or misunderstand about my field? Vectors of Trust Can I build a causal or temporal relationship? NIST Digital Identity Guidelines came after and was inspired by Vectors of Trust
  • 39. @Sarah_Cecc Women in Identity Are any of these ideas interrelated? What have I been working on? NIST Digital Identity Guidelines What do most people not know or misunderstand about my field? Vectors of Trust Can I build a causal or temporal relationship? NIST Digital Identity Guidelines came after and was inspired by Vectors of Trust Can I tell a story? NIST 800-63-3 went into public review last year. It outlines three new scales for measuring the assurance of an authentication event. Those scales were heavily informed by Vectors of Trust, which is on track to become an IETF informational draft this year. Find out how Vectors of Trust influenced NIST 800-63, and how authentication will be measured in the future domestically and internationally.
  • 40. Making a new framework
  • 41. @Sarah_Cecc Women in Identity Do these ideas reflect a new way of thinking? What do most people not know or misunderstand about my field? jargon What do I find fascinating and want to try or learn about? Thing Explainer
  • 42. @Sarah_Cecc Women in Identity Do these ideas reflect a new way of thinking? What do most people not know or misunderstand about my field? jargon What do I find fascinating and want to try or learn about? Thing Explainer What makes me uniquely passionate about these things? I frequently evangelize the value of identity to people who aren’t identity nerds (with no prompting)
  • 43. @Sarah_Cecc Women in Identity Do these ideas reflect a new way of thinking? What do most people not know or misunderstand about my field? jargon What do I find fascinating and want to try or learn about? Thing Explainer What makes me uniquely passionate about these things? I frequently evangelize the value of identity to people who aren’t identity nerds (with no prompting) How can my perspective change the way people think about this? Can you describe the value of identity management using only the thousand most common words in the English language? In the style of Randall Munroe’s "Thing Explainer" you can learn how to explain important identity concepts using simple words. Identity is incredibly important in today's market, and the ability to express that importance to non-technical people is critical.
  • 45. @Sarah_Cecc Women in Identity Do these ideas have something in common? What could transform my field in the next ten years? zero-trust networks zero login one-identity initiatives
  • 46. @Sarah_Cecc Women in Identity Do these ideas have something in common? What could transform my field in the next ten years? zero-trust networks zero login one-identity initiatives Can the details inform a common theme? These are all large security initiatives that can transform the way businesses implement identity.eifjccikcgufiivjcdlcfducvdle fijdevhddedbrdue
  • 47. @Sarah_Cecc Women in Identity Do these ideas have something in common? What could transform my field in the next ten years? zero-trust networks zero login one-identity initiatives Can the details inform a common theme? These are all large security initiatives that can transform the way businesses implement identity.eifjccikcgufiivjcdlcfducvdle fijdevhddedbrdue Can I explain why people should care? Identity innovations like zero-trust networks, zero login, and one identity initiatives are transforming today's most successful organizations from within. Trust boundaries are changing. Find out the technical details behind these innovations and take home a game plan to start transforming your organization today, this week, and in the long run.
  • 49. @Sarah_Cecc Women in Identity Keep. It. Stupid. Simple.
  • 51. @Sarah_Cecc Women in Identity Etiquette Can I submit more than one proposal?
  • 52. @Sarah_Cecc Women in Identity Etiquette Can I submit more than one proposal? Can I submit a proposal to two places?
  • 53. @Sarah_Cecc Women in Identity Etiquette Can I submit more than one proposal? Can I submit a proposal to two places? Can I submit a proposal for multiple years?
  • 55. @Sarah_Cecc Women in Identity Accepting Rejection ● It’s okay to grieve (and even cry!)
  • 56. @Sarah_Cecc Women in Identity Accepting Rejection ● It’s okay to grieve (and even cry!) ● Be proud of yourself for not throwing away your shot
  • 57. @Sarah_Cecc Women in Identity Accepting Rejection ● It’s okay to grieve (and even cry!) ● Be proud of yourself for not throwing away your shot ● Remember that the acceptance committee doesn’t actually know you as a person
  • 58. @Sarah_Cecc Women in Identity Accepting Rejection ● It’s okay to grieve (and even cry!) ● Be proud of yourself for not throwing away your shot ● Remember that the acceptance committee doesn’t actually know you as a person ● Try again when you’re ready