SlideShare a Scribd company logo
1 of 17
Cloud Identity Summit
Pre-conference workshop
Monday June 6th, 2016
Colin Wallis
Executive Director, Kantara Initiative
Fluid agenda
0900: Welcome from President Allan and Intro from ED Colin
0920: Eve Maler – Chair UMA WG
0940: Jamie Clark - Kantara Assurance Review Board & IDESG-Kantara ‘orchestrator’ :
1000: Joni Brennan/Andrew Hughes – Andrew, LC & IAWG Chair, Joni, KI friend & DIACC liaison
1020: Cameo appearance #1 (SW) and #2 (JR):
1030: bio break and conference badge ribbon hand out to ID Pro pledge signers
1045: Panel #1 with Cameo appearance #3 (IG) and #4
1105: Mark Lizar and Mary Hodder - Consent & Information Sharing, User Submitted Terms Chairs
1125: 1140: Mike Schwartz - OTTO WG Chair
1155: Closing Cameos
1200: Close and conference badge ribbon hand out to ID Pro pledge signers
How can governments, industry and
users work together to better manage
data generated by new technologies
and digital services?
Answer: Collaborate, innovate and
take action.
How?
Kantara delivers its mission and vision
for identity and privacy..
 Based on its values of openness, transparency and fairness
 Building off the Open Stand 5 Principles
cooperation, SD principles, collective empowerment, availability, voluntary adoption
 Using its ‘Connected Life’ communities to develop ‘Trust
Services’ programs…
 To operationalize its strategic vision for wide market adoption
and growth of trusted identity and privacy–related services.
What (and who) is Kantara?
 Non-profit founded in 2009.
 Comprises 60+ Leading Organizations, hundreds of Participants,
Enterprise & Governments.
 Connects the best of business, Government, Research & Education.
 Develops Innovations and Programs developing trustworthy on-line
experiences.
Do you recognize our members?
Kantara at a glance
 Trust Framework provider of identity assurance
Trusted accreditation and approval program
 Emerging provider of Privacy services
Consent Receipt to enable compliant personal data sharing
 Secure authorization & delegation
UMA (User Managed Access) profile of OAuth
 Digital Identity Professional Community
Body of knowledge, education, marketing, outreach
 Blockchain for Smart Contracts
immutable “trusted” distributed ledger for ‘smart contracts’
 Privacy & Identity Incubator
Up to US$1M funding. First grant to Lockstep Technologies
Game- changing the digital economy
Have you signed the pledge?
Authorization & Delegation is the new oil
Consent Receipt: GDPR-ready (soon)
Not sexy but hot!
Up to $1,000,000 R&D Program
Join. Innovate. Trust.
Colin Wallis, Executive Director Kantara Initiative:
colin@kantarainitiative.org
+44 7490 266 778
Fluid agenda
0900: Welcome from President Allan and Intro from ED Colin
0920: Eve Maler – Chair UMA WG
0940: Jamie Clark - Kantara Assurance Review Board & IDESG-Kantara ‘orchestrator’ :
1000: Joni Brennan/Andrew Hughes – Andrew, LC & IAWG Chair, Joni, KI friend & DIACC liaison
1020: Cameo appearance #1 (SW) and #2:
1030: bio break and conference badge ribbon hand out to ID Pro pledge signers
1045: Panel #1 with Cameo appearance #3 (IG) and #4
1105: Mark Lizar and Mary Hodder - Consent & Information Sharing, User Submitted Terms Chairs
1125: 1140: Mike Schwartz - OTTO WG Chair
1155: Closing Cameos
1200: Close and conference badge ribbon hand out to ID Pro pledge signers

More Related Content

What's hot

Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspectiveFuture Agenda
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own IdentityNetIQ
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0Aladdin Dandis
 
Virtual Interactive Working Environments
Virtual Interactive Working EnvironmentsVirtual Interactive Working Environments
Virtual Interactive Working EnvironmentsEdward Lange
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020OpenID Foundation Japan
 
Various blockchain specialization domains
Various blockchain specialization domainsVarious blockchain specialization domains
Various blockchain specialization domainsBlockchain Council
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareIonixx Technologies Inc.
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of AuthorityUbisecure
 

What's hot (20)

Kantara May 2012
Kantara May 2012Kantara May 2012
Kantara May 2012
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0
 
Virtual Interactive Working Environments
Virtual Interactive Working EnvironmentsVirtual Interactive Working Environments
Virtual Interactive Working Environments
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
Blockchain in HR
Blockchain in HRBlockchain in HR
Blockchain in HR
 
HR Blockchain User Experience
HR Blockchain User ExperienceHR Blockchain User Experience
HR Blockchain User Experience
 
The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020
 
Various blockchain specialization domains
Various blockchain specialization domainsVarious blockchain specialization domains
Various blockchain specialization domains
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
 

Viewers also liked

Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)kantarainitiative
 
Genares Brochure
Genares BrochureGenares Brochure
Genares Brochurelolagrace
 
Brochure_SolarShading_screen_LR
Brochure_SolarShading_screen_LRBrochure_SolarShading_screen_LR
Brochure_SolarShading_screen_LRaajo
 
РИФ 2016, Big data. Скрытые возможности для площадок.
РИФ 2016, Big data. Скрытые возможности для площадок.РИФ 2016, Big data. Скрытые возможности для площадок.
РИФ 2016, Big data. Скрытые возможности для площадок.Тарасов Константин
 
Chinaς μοναστήρια
Chinaς μοναστήριαChinaς μοναστήρια
Chinaς μοναστήριαKostas Tampakis
 
42 chistov-optimization2010 сабскрайб про корпоративная рассылка
42 chistov-optimization2010 сабскрайб про корпоративная рассылка42 chistov-optimization2010 сабскрайб про корпоративная рассылка
42 chistov-optimization2010 сабскрайб про корпоративная рассылкаТарасов Константин
 
РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...
РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...
РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...Тарасов Константин
 
Hotel SocialBooker Facebook
Hotel SocialBooker FacebookHotel SocialBooker Facebook
Hotel SocialBooker Facebooklolagrace
 
Комплаенс — новое направление для Нового поколения
Комплаенс — новое направление для Нового поколенияКомплаенс — новое направление для Нового поколения
Комплаенс — новое направление для Нового поколенияFormulaS
 
ПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RU
ПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RUПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RU
ПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RUТарасов Константин
 
РИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунгли
РИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунглиРИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунгли
РИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунглиТарасов Константин
 
РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...
РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...
РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...Тарасов Константин
 
Raamfolies
RaamfoliesRaamfolies
RaamfoliesRavi Bos
 
Telling Tales - Helping users for profit and pleasure
Telling Tales - Helping users for profit and pleasureTelling Tales - Helping users for profit and pleasure
Telling Tales - Helping users for profit and pleasureRellyAB
 

Viewers also liked (20)

Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Genares Brochure
Genares BrochureGenares Brochure
Genares Brochure
 
Brochure_SolarShading_screen_LR
Brochure_SolarShading_screen_LRBrochure_SolarShading_screen_LR
Brochure_SolarShading_screen_LR
 
Canada
CanadaCanada
Canada
 
РИФ 2016, Big data. Скрытые возможности для площадок.
РИФ 2016, Big data. Скрытые возможности для площадок.РИФ 2016, Big data. Скрытые возможности для площадок.
РИФ 2016, Big data. Скрытые возможности для площадок.
 
Ushuaia
UshuaiaUshuaia
Ushuaia
 
Chinaς μοναστήρια
Chinaς μοναστήριαChinaς μοναστήρια
Chinaς μοναστήρια
 
42 chistov-optimization2010 сабскрайб про корпоративная рассылка
42 chistov-optimization2010 сабскрайб про корпоративная рассылка42 chistov-optimization2010 сабскрайб про корпоративная рассылка
42 chistov-optimization2010 сабскрайб про корпоративная рассылка
 
РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...
РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...
РИФ 2016, Кейс Bookmate. Как удерживать CPI до 40р. с помощью поисковых запро...
 
Hotel SocialBooker Facebook
Hotel SocialBooker FacebookHotel SocialBooker Facebook
Hotel SocialBooker Facebook
 
Комплаенс — новое направление для Нового поколения
Комплаенс — новое направление для Нового поколенияКомплаенс — новое направление для Нового поколения
Комплаенс — новое направление для Нового поколения
 
ПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RU
ПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RUПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RU
ПОВЫШЕНИЕ ПРОДАЖ В ИНТЕРНЕТ-МАГАЗИНЕ: ОТВЕТЫ НА ВОПРОСЫ ESHOPSALES.RU
 
РИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунгли
РИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунглиРИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунгли
РИФ 2016, Проект2018: Водопад иссяк, тигр ушел в джунгли
 
Bebiszitterek
BebiszitterekBebiszitterek
Bebiszitterek
 
Finding the future_online_rus
Finding the future_online_rusFinding the future_online_rus
Finding the future_online_rus
 
РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...
РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...
РИФ 2016, Размер не имеет значения: маленький бюджет на маркетинг - не повод ...
 
Syria. . f
Syria. . fSyria. . f
Syria. . f
 
РИФ 2016, ЮФО: Кластер «РАЭК / Digital»
РИФ 2016, ЮФО: Кластер «РАЭК / Digital»РИФ 2016, ЮФО: Кластер «РАЭК / Digital»
РИФ 2016, ЮФО: Кластер «РАЭК / Digital»
 
Raamfolies
RaamfoliesRaamfolies
Raamfolies
 
Telling Tales - Helping users for profit and pleasure
Telling Tales - Helping users for profit and pleasureTelling Tales - Helping users for profit and pleasure
Telling Tales - Helping users for profit and pleasure
 

Similar to Cloud Identity Summit

Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...CA Technologies
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
The Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar DeckThe Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar DeckThe Digital Insurer
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...Marek Pietrzyk
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsDale Butler
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsPeteAndersen
 
Alfresco Day in Milano 2015
Alfresco Day in Milano 2015Alfresco Day in Milano 2015
Alfresco Day in Milano 2015John Newton
 
Building Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBuilding Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBlocktech brew
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Embedding the Use of Blockchain in Smart Government to Increase Transparency ...
Embedding the Use of Blockchain in Smart Government to Increase Transparency ...Embedding the Use of Blockchain in Smart Government to Increase Transparency ...
Embedding the Use of Blockchain in Smart Government to Increase Transparency ...Cris TRAN
 
50 most valuable brands of the year 2019
50 most valuable brands of the year 201950 most valuable brands of the year 2019
50 most valuable brands of the year 2019Pavan Kumar
 
Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011harding77
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdfCIO Look Magazine
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Andrew Hughes
 
Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Lifelog Health
 

Similar to Cloud Identity Summit (20)

Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
The Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar DeckThe Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar Deck
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
2012 Summer Conference Brochure
2012 Summer Conference Brochure2012 Summer Conference Brochure
2012 Summer Conference Brochure
 
Alfresco Day in Milano 2015
Alfresco Day in Milano 2015Alfresco Day in Milano 2015
Alfresco Day in Milano 2015
 
Building Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBuilding Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development Services
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Embedding the Use of Blockchain in Smart Government to Increase Transparency ...
Embedding the Use of Blockchain in Smart Government to Increase Transparency ...Embedding the Use of Blockchain in Smart Government to Increase Transparency ...
Embedding the Use of Blockchain in Smart Government to Increase Transparency ...
 
50 most valuable brands of the year 2019
50 most valuable brands of the year 201950 most valuable brands of the year 2019
50 most valuable brands of the year 2019
 
Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08
 
Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTkantarainitiative
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
The state of uma 2014 11-03
The state of uma 2014 11-03The state of uma 2014 11-03
The state of uma 2014 11-03
 
Laws of relationships v7
Laws of relationships v7Laws of relationships v7
Laws of relationships v7
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoT
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Uma webinar 2014 06-19
Uma webinar 2014 06-19Uma webinar 2014 06-19
Uma webinar 2014 06-19
 
Uma webinar 2014 03-20
Uma webinar 2014 03-20Uma webinar 2014 03-20
Uma webinar 2014 03-20
 
Kantara Overview June 2013
Kantara Overview June 2013Kantara Overview June 2013
Kantara Overview June 2013
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cloud Identity Summit

  • 1. Cloud Identity Summit Pre-conference workshop Monday June 6th, 2016 Colin Wallis Executive Director, Kantara Initiative
  • 2. Fluid agenda 0900: Welcome from President Allan and Intro from ED Colin 0920: Eve Maler – Chair UMA WG 0940: Jamie Clark - Kantara Assurance Review Board & IDESG-Kantara ‘orchestrator’ : 1000: Joni Brennan/Andrew Hughes – Andrew, LC & IAWG Chair, Joni, KI friend & DIACC liaison 1020: Cameo appearance #1 (SW) and #2 (JR): 1030: bio break and conference badge ribbon hand out to ID Pro pledge signers 1045: Panel #1 with Cameo appearance #3 (IG) and #4 1105: Mark Lizar and Mary Hodder - Consent & Information Sharing, User Submitted Terms Chairs 1125: 1140: Mike Schwartz - OTTO WG Chair 1155: Closing Cameos 1200: Close and conference badge ribbon hand out to ID Pro pledge signers
  • 3. How can governments, industry and users work together to better manage data generated by new technologies and digital services?
  • 4. Answer: Collaborate, innovate and take action.
  • 6. Kantara delivers its mission and vision for identity and privacy..  Based on its values of openness, transparency and fairness  Building off the Open Stand 5 Principles cooperation, SD principles, collective empowerment, availability, voluntary adoption  Using its ‘Connected Life’ communities to develop ‘Trust Services’ programs…  To operationalize its strategic vision for wide market adoption and growth of trusted identity and privacy–related services.
  • 7. What (and who) is Kantara?  Non-profit founded in 2009.  Comprises 60+ Leading Organizations, hundreds of Participants, Enterprise & Governments.  Connects the best of business, Government, Research & Education.  Develops Innovations and Programs developing trustworthy on-line experiences.
  • 8. Do you recognize our members?
  • 9. Kantara at a glance  Trust Framework provider of identity assurance Trusted accreditation and approval program  Emerging provider of Privacy services Consent Receipt to enable compliant personal data sharing  Secure authorization & delegation UMA (User Managed Access) profile of OAuth  Digital Identity Professional Community Body of knowledge, education, marketing, outreach  Blockchain for Smart Contracts immutable “trusted” distributed ledger for ‘smart contracts’  Privacy & Identity Incubator Up to US$1M funding. First grant to Lockstep Technologies
  • 10. Game- changing the digital economy
  • 11. Have you signed the pledge?
  • 12. Authorization & Delegation is the new oil
  • 14. Not sexy but hot!
  • 15. Up to $1,000,000 R&D Program
  • 16. Join. Innovate. Trust. Colin Wallis, Executive Director Kantara Initiative: colin@kantarainitiative.org +44 7490 266 778
  • 17. Fluid agenda 0900: Welcome from President Allan and Intro from ED Colin 0920: Eve Maler – Chair UMA WG 0940: Jamie Clark - Kantara Assurance Review Board & IDESG-Kantara ‘orchestrator’ : 1000: Joni Brennan/Andrew Hughes – Andrew, LC & IAWG Chair, Joni, KI friend & DIACC liaison 1020: Cameo appearance #1 (SW) and #2: 1030: bio break and conference badge ribbon hand out to ID Pro pledge signers 1045: Panel #1 with Cameo appearance #3 (IG) and #4 1105: Mark Lizar and Mary Hodder - Consent & Information Sharing, User Submitted Terms Chairs 1125: 1140: Mike Schwartz - OTTO WG Chair 1155: Closing Cameos 1200: Close and conference badge ribbon hand out to ID Pro pledge signers

Editor's Notes

  1. Enabling communities to verify high-value ID credentials for Trust. Kantara Members have a wealth of experience: Identity Assurance, Privacy, Policy and Information Systems Assessment. We’re here to help your community ensure Federated Identity Systems are verified for trust.