SlideShare a Scribd company logo
EMBRACING
DISRUPTION
BUSINESS AGILITY ENABLED THROUGH IDENTITY
Or…
“Better living through modern (Identity)”
Business Drivers
• Increasing commodity price volatility in the era of over supply of
low cost energy
• Stated business objective of significantly increasing cashflow
while maintaining current staff levels
• Adoption of a data-driven, technology focused approach to use
data to drive business decisions and insights
• Disruptive technologies impacting entire energy industry (i.e.
SMAC, Edge compute, OT vs. IT, the era of “things”)
• Reality of flat or reduced budgets
IAM Problem Statements
• Identity & Access Management had lost support people and
purpose over time
• Side efforts and point solutions had been put in place as stop
gap measures, but have been retained and have added risk
• Result over time is accidental architecture that has both
duplication in capabilities and gaps in functionality and is
challenged to support today’s needs
• Gaps and inconsistencies increase support costs
and create information security risk
Why Identity data has changed
Identity in the past
Identity in the era of
digital
Identity as Innovation
Technology foundation to increase competitive advantage
IAM Program Goals
• Improve responsiveness to business requirements
• Simplify gaining and maintaining access
• Abstract identity sources from consuming apps and systems
• Simplify environment / right sizing
• Increase automation and support drive to enable “self service”
• Support improved security posture
Evolve and modernize legacy IAM
• Rebrand legacy “Directory Services”
• Intentional adoption of extensible, standards-based
technologies
• Seek out and partner with business facing champions,
advocates
• Embrace and reward “Shadow IT”: choice, self admin
• Orient solutions in light of hybrid Identity reality: on prem/cloud
• Consolidated view of identity; “Identity Data Lake” for
consumers
Building connected Platforms
Identity as Connective Tissue
Overview of Data Access
Data Access = Foundational IT Capability
Identity
DataIntegrations
Too many disparate/disconnected
sources of identity
Currently too difficult, time
consuming and expensive to
get access to required data
Too many integrations, our only
option is to move data to new
location to facilitate access
Strategic Objective:
- Provide the right information
from source to consumer
- Support modern access
protocols and web services
- Reduce the number of
integrations - “stop copying
data!”
- Increase agility via
abstraction
Applications
Solutions
End Clients
Data Virtualization Platforms
(Future State)
Publishing Enterprise Data:
• Only copy data if
absolutely necessary
• Institute data
governance
PersonData Consumers
WorkdayAzure
Virtual Views of
Identity Data
Identity Data Lake
SSO
Authentication
ERP
UPN
Email
SIP
AD
Mastered
Person
Data
MDM
Data SourcesData Consumers Data Publishers
Finance
Supply Chain
HR
ServiceNow
Claims app
Virtual Views of Business
Data
Data Virtualization
(Product TBD)
Data consumers
End Client
Data
Warehouse
EDW
Mastered
Business Data
MDM
App Data
Applications
App Data
Applications
App Data
Applications
App Data
Applications
Platform
Big Data
Application
Integrations
Analytics
Identity Hub
Data Hub
Identity data consumers
AD
LDAP
Oracle
Questions?
Thank you!
Chris.Wallace@Encana.com

More Related Content

What's hot

CrossView Managed Services
CrossView Managed ServicesCrossView Managed Services
CrossView Managed Services
CrossView
 
Big Data and the Semantic Web
Big Data and the Semantic WebBig Data and the Semantic Web
Big Data and the Semantic Web
Axis Technology, LLC
 
Software AG Agile Apps Cloud
Software AG Agile Apps CloudSoftware AG Agile Apps Cloud
Software AG Agile Apps Cloud
Kellton Tech Solutions Ltd
 
Building a service knowledge dashboard
Building a service knowledge dashboardBuilding a service knowledge dashboard
Building a service knowledge dashboardDekkinga, Ewout
 
How MSPs and IT Organizations can Empower High Growth with ITSM
How MSPs and IT Organizations can Empower High Growth with ITSMHow MSPs and IT Organizations can Empower High Growth with ITSM
How MSPs and IT Organizations can Empower High Growth with ITSM
Marc Gourvenec
 
Business Intellenge (BI)
Business Intellenge (BI)Business Intellenge (BI)
Business Intellenge (BI)
Vivek Kumar
 
Techaisle Report SMB Cloud Success 2014
Techaisle Report SMB Cloud Success 2014Techaisle Report SMB Cloud Success 2014
Techaisle Report SMB Cloud Success 2014
Gandhi Legacy Tour
 
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar 2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar
Raffa Learning Community
 
Cloud big data - business landscape
Cloud   big data - business landscapeCloud   big data - business landscape
Cloud big data - business landscape
anuvip
 
2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference
Raffa Learning Community
 
Digital Reasoning Carahsoft Gov Big Data Presentation 2012
Digital Reasoning Carahsoft Gov Big Data Presentation 2012Digital Reasoning Carahsoft Gov Big Data Presentation 2012
Digital Reasoning Carahsoft Gov Big Data Presentation 2012
Jason Yee
 
Management of E-Assets
Management of E-AssetsManagement of E-Assets
Management of E-Assets
Zaheer Ahmed
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
Dell World
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud Detection
DataStax
 
Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...
Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...
Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...
Patrick Van Renterghem
 
Cloud at 30,000 foot view - on the lighter side!
Cloud at 30,000 foot view - on the lighter side!Cloud at 30,000 foot view - on the lighter side!
Cloud at 30,000 foot view - on the lighter side!
Vamsi Sistla
 
Dynamic datacenter aug09
Dynamic datacenter aug09Dynamic datacenter aug09
Dynamic datacenter aug09Rajat Thakur
 
Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)
itnewsafrica
 

What's hot (18)

CrossView Managed Services
CrossView Managed ServicesCrossView Managed Services
CrossView Managed Services
 
Big Data and the Semantic Web
Big Data and the Semantic WebBig Data and the Semantic Web
Big Data and the Semantic Web
 
Software AG Agile Apps Cloud
Software AG Agile Apps CloudSoftware AG Agile Apps Cloud
Software AG Agile Apps Cloud
 
Building a service knowledge dashboard
Building a service knowledge dashboardBuilding a service knowledge dashboard
Building a service knowledge dashboard
 
How MSPs and IT Organizations can Empower High Growth with ITSM
How MSPs and IT Organizations can Empower High Growth with ITSMHow MSPs and IT Organizations can Empower High Growth with ITSM
How MSPs and IT Organizations can Empower High Growth with ITSM
 
Business Intellenge (BI)
Business Intellenge (BI)Business Intellenge (BI)
Business Intellenge (BI)
 
Techaisle Report SMB Cloud Success 2014
Techaisle Report SMB Cloud Success 2014Techaisle Report SMB Cloud Success 2014
Techaisle Report SMB Cloud Success 2014
 
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar 2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar
 
Cloud big data - business landscape
Cloud   big data - business landscapeCloud   big data - business landscape
Cloud big data - business landscape
 
2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference
 
Digital Reasoning Carahsoft Gov Big Data Presentation 2012
Digital Reasoning Carahsoft Gov Big Data Presentation 2012Digital Reasoning Carahsoft Gov Big Data Presentation 2012
Digital Reasoning Carahsoft Gov Big Data Presentation 2012
 
Management of E-Assets
Management of E-AssetsManagement of E-Assets
Management of E-Assets
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud Detection
 
Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...
Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...
Presentation by Cédric Charlier (Elia) at the Data Vault Modelling and Data G...
 
Cloud at 30,000 foot view - on the lighter side!
Cloud at 30,000 foot view - on the lighter side!Cloud at 30,000 foot view - on the lighter side!
Cloud at 30,000 foot view - on the lighter side!
 
Dynamic datacenter aug09
Dynamic datacenter aug09Dynamic datacenter aug09
Dynamic datacenter aug09
 
Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)
 

Similar to Embracing disruption

Shift to Application & Infrastructure Hosting
Shift to Application & Infrastructure HostingShift to Application & Infrastructure Hosting
Shift to Application & Infrastructure Hosting
techzimslides
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
Amazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
Amazon Web Services
 
Data Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data EnvironmentData Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data Environment
Denodo
 
Accelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationAccelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data Virtualization
Denodo
 
Cloud Computing Introduction and Awareness
Cloud Computing Introduction and AwarenessCloud Computing Introduction and Awareness
Cloud Computing Introduction and Awarenesswlammert
 
Driving digital transformation
Driving digital transformationDriving digital transformation
Driving digital transformation
Fuji Xerox Australia
 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategy
Nagarro
 
Future of Making Things
Future of Making ThingsFuture of Making Things
Future of Making Things
JC Davis
 
Justifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIJustifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROI
Precisely
 
Unlocking the Full Potential of Your Telecom Data with Data Integrity
Unlocking the Full Potential of Your Telecom Data with Data IntegrityUnlocking the Full Potential of Your Telecom Data with Data Integrity
Unlocking the Full Potential of Your Telecom Data with Data Integrity
Precisely
 
IT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingIT 2.0 and Cloud Computing
IT 2.0 and Cloud Computing
Ed Byrne
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
Pieter De Leenheer
 
Transforming IT Services
Transforming IT ServicesTransforming IT Services
Transforming IT Services
Patrick Zimmer
 
Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012
punyagup
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
Precisely
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
Precisely
 
Smart Process Automation - Connected Brains 2018
Smart Process Automation - Connected Brains 2018Smart Process Automation - Connected Brains 2018
Smart Process Automation - Connected Brains 2018
LoQutus
 
Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...
Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...
Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...
Precisely
 
Trends in Enterprise Advanced Analytics
Trends in Enterprise Advanced AnalyticsTrends in Enterprise Advanced Analytics
Trends in Enterprise Advanced Analytics
DATAVERSITY
 

Similar to Embracing disruption (20)

Shift to Application & Infrastructure Hosting
Shift to Application & Infrastructure HostingShift to Application & Infrastructure Hosting
Shift to Application & Infrastructure Hosting
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Data Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data EnvironmentData Virtualization for Compliance – Creating a Controlled Data Environment
Data Virtualization for Compliance – Creating a Controlled Data Environment
 
Accelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationAccelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data Virtualization
 
Cloud Computing Introduction and Awareness
Cloud Computing Introduction and AwarenessCloud Computing Introduction and Awareness
Cloud Computing Introduction and Awareness
 
Driving digital transformation
Driving digital transformationDriving digital transformation
Driving digital transformation
 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategy
 
Future of Making Things
Future of Making ThingsFuture of Making Things
Future of Making Things
 
Justifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIJustifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROI
 
Unlocking the Full Potential of Your Telecom Data with Data Integrity
Unlocking the Full Potential of Your Telecom Data with Data IntegrityUnlocking the Full Potential of Your Telecom Data with Data Integrity
Unlocking the Full Potential of Your Telecom Data with Data Integrity
 
IT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingIT 2.0 and Cloud Computing
IT 2.0 and Cloud Computing
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
 
Transforming IT Services
Transforming IT ServicesTransforming IT Services
Transforming IT Services
 
Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Smart Process Automation - Connected Brains 2018
Smart Process Automation - Connected Brains 2018Smart Process Automation - Connected Brains 2018
Smart Process Automation - Connected Brains 2018
 
Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...
Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...
Looking to the Future: Embracing the Cloud for a More Modern Data Quality App...
 
Trends in Enterprise Advanced Analytics
Trends in Enterprise Advanced AnalyticsTrends in Enterprise Advanced Analytics
Trends in Enterprise Advanced Analytics
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Embracing disruption

  • 2. Or… “Better living through modern (Identity)”
  • 3. Business Drivers • Increasing commodity price volatility in the era of over supply of low cost energy • Stated business objective of significantly increasing cashflow while maintaining current staff levels • Adoption of a data-driven, technology focused approach to use data to drive business decisions and insights • Disruptive technologies impacting entire energy industry (i.e. SMAC, Edge compute, OT vs. IT, the era of “things”) • Reality of flat or reduced budgets
  • 4. IAM Problem Statements • Identity & Access Management had lost support people and purpose over time • Side efforts and point solutions had been put in place as stop gap measures, but have been retained and have added risk • Result over time is accidental architecture that has both duplication in capabilities and gaps in functionality and is challenged to support today’s needs • Gaps and inconsistencies increase support costs and create information security risk
  • 5. Why Identity data has changed Identity in the past Identity in the era of digital
  • 6. Identity as Innovation Technology foundation to increase competitive advantage
  • 7. IAM Program Goals • Improve responsiveness to business requirements • Simplify gaining and maintaining access • Abstract identity sources from consuming apps and systems • Simplify environment / right sizing • Increase automation and support drive to enable “self service” • Support improved security posture
  • 8. Evolve and modernize legacy IAM • Rebrand legacy “Directory Services” • Intentional adoption of extensible, standards-based technologies • Seek out and partner with business facing champions, advocates • Embrace and reward “Shadow IT”: choice, self admin • Orient solutions in light of hybrid Identity reality: on prem/cloud • Consolidated view of identity; “Identity Data Lake” for consumers
  • 10. Overview of Data Access Data Access = Foundational IT Capability Identity DataIntegrations Too many disparate/disconnected sources of identity Currently too difficult, time consuming and expensive to get access to required data Too many integrations, our only option is to move data to new location to facilitate access Strategic Objective: - Provide the right information from source to consumer - Support modern access protocols and web services - Reduce the number of integrations - “stop copying data!” - Increase agility via abstraction Applications Solutions End Clients
  • 11. Data Virtualization Platforms (Future State) Publishing Enterprise Data: • Only copy data if absolutely necessary • Institute data governance PersonData Consumers WorkdayAzure Virtual Views of Identity Data Identity Data Lake SSO Authentication ERP UPN Email SIP AD Mastered Person Data MDM Data SourcesData Consumers Data Publishers Finance Supply Chain HR ServiceNow Claims app Virtual Views of Business Data Data Virtualization (Product TBD) Data consumers End Client Data Warehouse EDW Mastered Business Data MDM App Data Applications App Data Applications App Data Applications App Data Applications Platform Big Data Application Integrations Analytics Identity Hub Data Hub Identity data consumers AD LDAP Oracle