SlideShare a Scribd company logo
GDPR & CUSTOMER IAM:
THE REAL WINNERS
WON’T STOP AT
COMPLIANCE
Matt Klassen & Remy Lyle
Ping Identity
1 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
AGENDA
▪ GDPR Overview
▪ Key Requirements of GDPR
▪ How Customer IAM Helps Solve GDPR
▪ Design Patterns for Consent Management
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.2
GDPR OVERVIEW
GDPR & Customer IAM: The Real Winners Won’t Stop at
Compliance
3 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
GDPR BASICS
▪ General Data Protection Regulation
– Adopted in 2016
– Full effect on 25 May, 2018
– Replaces former data protection directive
– Privacy protection for EU citizen personal data
– Steep fines for non-compliance
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.4
IMPORTANT ASPECTS OF GDPR
Global Impact Broad Scope Heavy Fines
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.5
KEY REQUIREMENTS OF GDPR
GDPR & Customer IAM: The Real Winners Won’t Stop at
Compliance
6 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CLASSIFYING THE REQUIREMENTS
7
Process &
Organization
• Data Protection
Officer (DPO)
• Data Protection
Impact Assessment
• Incident Reporting
• +MORE
Technical
• Consent
• Data Access
• Rectification
• Erasure
• Data Portability
• Data Security
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT
The controller needs to seek and record consent from the
data subject for collection, storage & use of personal data
▪ Must be an auditable record
▪ Must be presented
“unbundled”
▪ Can be withdrawn
▪ Consent is given for data and
use case
8
Articles: 7 8 13
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
DATA ACCESS & RECTIFICATION
The data subject can access the personal data that was
collected and make corrections and updates
▪ Access to all of the data
collected as well as purpose,
recipients, storage period
▪ Review and edit of data –
request changes
▪ Notification of changes and
rights
9
Articles: 15 16
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
ERASURE
The data subject has the right to ask the controller to
“forget” or erase all personal data
▪ Restrictions of this right may
be dictated by other
regulations
▪ “Erase” all data across data
stores and back-ups
▪ 3rd parties must be notified
10
Articles: 17
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
DATA PORTABILITY
The data subject has the right to receive any personal data
received by a controller
▪ Must be in structured
commonly used machine
readable format
▪ Can request data transferred
directly to 3rd party
11 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 20
DATA PROTECTION BY DESIGN &
SECURITY
The controller must design systems to protect and secure
personal data based on risk
.▪ Pseudonymisation and
encryption
▪ Access controls
▪ Backup/restore
▪ Minimization
12 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 25 32
HOW CUSTOMER IAM HELPS SOLVE
GDPR
GDPR & Customer IAM: The Real Winners Won’t Stop at
Compliance
13 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
WHAT IS YOUR BUSINESS GOAL?
14 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
End-to-end
Security
Govern Data
Access
Mobile Apps
SECURE & SEAMLESS CUSTOMER IAM
Web Apps & SaaS
IoT
Internal Apps
Partner Apps
Auth & SSO
• Single sign-on across digital properties
• MFA and transaction approvals
• Govern and control access to data
• Unify profiles and sync data platforms
• Manage preferences and privacy
• End-to-end security
• Extreme scale and performance
15
MDM CRM AD/LDAP
Unify Customer Profiles
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
End-to-end
Security
Govern Data
Access
Mobile Apps
SECURE & SEAMLESS CUSTOMER IAM
Web Apps & SaaS
IoT
Internal Apps
Partner Apps
Auth & SSO
• Single sign-on across digital properties
• MFA and transaction approvals
• Govern and control access to data
• Unify profiles and sync data platforms
• Manage preferences and privacy
• End-to-end security
• Extreme scale and performance
16
MDM CRM AD/LDAP
Unify Customer Profiles
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CAPTURE & MANAGE CONSENT
• Simplify the capture of customer
consent across channels
• Capture consent for specific attributes
• Enforce consent choices based on
centralized policies that can reflect:
o Geographic regulations like GDPR
o Industry Regulations like HIPAA
o Corporate Policies
o Customer Consent
Do You Want to Share
Your Personal Data
with “LoyaltyApp,
LLC”? (more)
Yes No
17 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 7 8 13
TRANSACTION CONSENT &
APPROVAL
18
Confirm 10,000
Transfer to Acct
#34343434
1. User Initiates
Money Transfer
2. Confirms
Transaction
3. Money Transfer
Approved
Transfer 10,000 to
Account #3434343?
OK
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 7 8 13
CUSTOMER SELF-MANAGED
PROFILE
19
Internal Apps
WebMobile Apps
IoT Devices
Loyalty Rewards
Programs
Customers self-manage
profile and preferences
Preferences are
consistently enforced
across channels
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 15 16
DATA ACCESS GOVERNANCE
20 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Partner
App
Internal
App
• Name
• Social Security #
• Credit Card #
• Preferences
• Date of Birth
• Name
• X
• X
• Preferences
• Date of Birth
• Name
• X
• X
• Preferences
• X
Only received authorized
data attributes
Customer Profile
Articles: 20 25 32
ENFORCE PROPER USAGE OF
CUSTOMER DATA
Enforce customer consent
choices and regulatory
constraints on everyone or
face consequences…
21 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 20 25 32
MANAGING A GLOBAL
NAMESPACE
22
Data GovernancePartial Data SyncData Residency
Mary Banks
214-555-8048
123 Main St. X
CC# X
Sarah
EU Citizen
Mary
US Citizen
U.S.A. DataEuropean
Sarah’s
Data
Mary’s
Data
U.S.A. DataEurope Data
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
Articles: 20 25 32
Secure
In Transit
PII data captured and
used in apps
Secure At Rest
Secure During
Replication
Tamper Proof Logs
✓ Best practice password policies
✓ Client connection policies
✓ Limited-access admin accounts
✓ Record-limited access
✓ Tamper-evident logging
✓ Criteria-based logging
✓ Data obfuscation
✓ Data layer encryption
✓ Encrypted backup files, log files, and
change histories
✓ Active and passive alerts
✓ Resource limit policies to mitigate DoS
✓ Simplified integration with 3rd party
security monitoring tools
Fragmented and Vulnerable
Identity Data
Mobile
App
App Data
Loyalty
Programs
Identity Data
Marketing
Programs
App Data
Identity Data
Web
E-Commerce
App Data
Identity Data
App Data
Centralized and Secure
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.23
SECURING CUSTOMER
IDENTITY DATA
Articles: 25 32
SYNC AND CONSOLIDATE IDENTITY
DATA
▪ Create unified customer profiles
▪ Consolidate identity data silos
▪ Map data schema and attribute types
▪ Bi-directionally sync identity data
▪ Support different connection methods
and protocols
LDAP
MDM
CRM
Order Mgmt.RDBMS
Active
Directory
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.24
Articles: 20
PING – A PRODUCT LEADER IN
CUSTOMER IAM
(KuppingerCole)
25 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
DESIGN PATTERNS FOR CONSENT
MANAGEMENT
GDPR & Customer IAM: The Real Winners Won’t Stop at
Compliance
26 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #1
CONSENT IS ITS OWN OBJECT TYPE
27
Creation /
Renewal of
Consent
Management
of Consent
Revocation /
Expiration of
Consent
Begin
Auditing /
Logging
End
If renew
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT OBJECT TYPE – EXAMPLE IMPL.
Consent Data Description Example
id Unique Identifier urn:X-pingidentity:Opt:Newsletters
description Description of use Consent to send newsletters
destinationType Consent manifestation (i.e. email,
application, terms of service)
Email
version Version # 0.1.1
required Is consent required TRUE/FALSEUser Data – Consent Attributes Description Example
consentId Unique Identifier urn:X-pingidentity:Opt:Newsletters
consentCollector Method of consent collection urn:X-pingidentity::App:my-account
consentTimestamp Timestamp 2017-05-12T16:22:19.043Z
consentExpiration Date of expiration 2018-05-18T16:22:19.043Z
consentPolarity Opt-In or Opt Out 0/1
28 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #2
CONSENT TRANSPARENCY
29 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #3
ENFORCING OPT-OUT
30
IF CLIENT_ID = “marketingengine”
AND OPT_IN = FALSE
EXCLUDE EMAIL
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #3
ENFORCING OPT-OUT
31
Same data call but different responses
based on user consent
Same data call but different responses
based on user consent
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #3
ENFORCING OPT-OUT
32 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #4
CONSENT AS A RESPONSE
33
DATA
GOVERNANCE
APPLICATIONS
USER CONSENT
JSON Object
Think: Polarity or
Metadata?
Service Provider Layer
Identity Provider Layer
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
CONSENT PATTERN #5
CONSENT COMPLEXITY
34
Opt-In/Opt-Out
Access Grants
OAuth Scopes
Fine
Grained
Terms of Service
Consent Forms
Coarse
Grained
EASE OF USER INTERFACE
BETTER PRIVACY CONTROLS
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
35
1. Consent as its own object type
➢ Separate consent metadata objects from user consent records
2. Consent transparency
➢ Create a simple, easy to understand UI for your users to manage consent
3. Enforcing opt-out / opt-in
➢ Provide a layer on top of your consent raw data to honor your user consents
4. Consent as a response
➢ Implement your consent data close to your user data
5. Consent complexity
➢ Remember that the more parties that are involved, the more complex consent management
gets
➢ The level of granularity in your consent dictates the ease of user management in contrast to
providing better privacy controls for your users
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
DESIGN PATTERNS TAKEAWAYS
KEY CUSTOMER IAM BENEFITS
36
Customer Experience
End-to-End Security
Scale & Performance
Privacy
Adaptability
Meet stringent end-to-end security requirements, from
authentication and secure access to data management.
Manage millions of identities and billions of attributes at extreme
scale and performance.
Manage and enforce geographic, industry, corporate and
personal consent customer privacy directives.
Support modern application architectures and support on premise,
cloud, or hybrid deployment options.
Deliver secure, seamless and personalized customer experiences
across all channels and devices.
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
LIVE Q&A
Please visit
www.pingidentity.com/GDPR
For More Information:
37 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
PINGIDENTITY.COM
THANK YOU!

More Related Content

What's hot

Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
Argyle Executive Forum
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
Ping Identity
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
ForgeRock
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
ForgeRock
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
ForgeRock
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
Patrick Harding
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
Okta-Inc
 
Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity Server
WSO2
 
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
ForgeRock
 
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
ForgeRock
 
Identity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonIdentity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley Stevenson
ForgeRock
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
ForgeRock
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
ForgeRock
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
Ping Identity
 
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley StevensonIdentity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
ForgeRock
 
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform OverviewNYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
ForgeRock
 

What's hot (20)

Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity Server
 
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
 
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
 
Identity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonIdentity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley Stevenson
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley StevensonIdentity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
 
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform OverviewNYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
 

Similar to GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance

Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
IDERA Software
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
DATUM LLC
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
ForgeRock
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Cloudera, Inc.
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
Cloudera, Inc.
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
Benjamin Canner
 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPR
Ching-Yu Wu
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
Trendigital Conference: Website & Marketing Strategies for 2019
Trendigital Conference: Website & Marketing Strategies for 2019Trendigital Conference: Website & Marketing Strategies for 2019
Trendigital Conference: Website & Marketing Strategies for 2019
Kate Kotzea
 
Utiliza el Identity Management para crear segmentos y audiencias para tus est...
Utiliza el Identity Management para crear segmentos y audiencias para tus est...Utiliza el Identity Management para crear segmentos y audiencias para tus est...
Utiliza el Identity Management para crear segmentos y audiencias para tus est...
Solvis Consulting, LLC
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
Address GDPR Mandates with SAP Hybris Commerce
Address GDPR Mandates with SAP Hybris CommerceAddress GDPR Mandates with SAP Hybris Commerce
Address GDPR Mandates with SAP Hybris Commerce
SAP Customer Experience
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
Extreme Networks
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
Carlos Roberto Paula Soares
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
TrustArc
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
ForgeRock
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
 

Similar to GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance (20)

Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPR
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 
Trendigital Conference: Website & Marketing Strategies for 2019
Trendigital Conference: Website & Marketing Strategies for 2019Trendigital Conference: Website & Marketing Strategies for 2019
Trendigital Conference: Website & Marketing Strategies for 2019
 
Utiliza el Identity Management para crear segmentos y audiencias para tus est...
Utiliza el Identity Management para crear segmentos y audiencias para tus est...Utiliza el Identity Management para crear segmentos y audiencias para tus est...
Utiliza el Identity Management para crear segmentos y audiencias para tus est...
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Address GDPR Mandates with SAP Hybris Commerce
Address GDPR Mandates with SAP Hybris CommerceAddress GDPR Mandates with SAP Hybris Commerce
Address GDPR Mandates with SAP Hybris Commerce
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 

More from Ping Identity

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
Ping Identity
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
Ping Identity
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
Ping Identity
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
Ping Identity
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
Ping Identity
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
Ping Identity
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
Ping Identity
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
Ping Identity
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
Ping Identity
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
Ping Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
Ping Identity
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Ping Identity
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
Ping Identity
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
Ping Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
Ping Identity
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
Ping Identity
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Ping Identity
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
Ping Identity
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Ping Identity
 

More from Ping Identity (19)

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance

  • 1. GDPR & CUSTOMER IAM: THE REAL WINNERS WON’T STOP AT COMPLIANCE Matt Klassen & Remy Lyle Ping Identity 1 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 2. AGENDA ▪ GDPR Overview ▪ Key Requirements of GDPR ▪ How Customer IAM Helps Solve GDPR ▪ Design Patterns for Consent Management Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.2
  • 3. GDPR OVERVIEW GDPR & Customer IAM: The Real Winners Won’t Stop at Compliance 3 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 4. GDPR BASICS ▪ General Data Protection Regulation – Adopted in 2016 – Full effect on 25 May, 2018 – Replaces former data protection directive – Privacy protection for EU citizen personal data – Steep fines for non-compliance Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.4
  • 5. IMPORTANT ASPECTS OF GDPR Global Impact Broad Scope Heavy Fines Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.5
  • 6. KEY REQUIREMENTS OF GDPR GDPR & Customer IAM: The Real Winners Won’t Stop at Compliance 6 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 7. CLASSIFYING THE REQUIREMENTS 7 Process & Organization • Data Protection Officer (DPO) • Data Protection Impact Assessment • Incident Reporting • +MORE Technical • Consent • Data Access • Rectification • Erasure • Data Portability • Data Security Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 8. CONSENT The controller needs to seek and record consent from the data subject for collection, storage & use of personal data ▪ Must be an auditable record ▪ Must be presented “unbundled” ▪ Can be withdrawn ▪ Consent is given for data and use case 8 Articles: 7 8 13 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 9. DATA ACCESS & RECTIFICATION The data subject can access the personal data that was collected and make corrections and updates ▪ Access to all of the data collected as well as purpose, recipients, storage period ▪ Review and edit of data – request changes ▪ Notification of changes and rights 9 Articles: 15 16 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 10. ERASURE The data subject has the right to ask the controller to “forget” or erase all personal data ▪ Restrictions of this right may be dictated by other regulations ▪ “Erase” all data across data stores and back-ups ▪ 3rd parties must be notified 10 Articles: 17 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 11. DATA PORTABILITY The data subject has the right to receive any personal data received by a controller ▪ Must be in structured commonly used machine readable format ▪ Can request data transferred directly to 3rd party 11 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 20
  • 12. DATA PROTECTION BY DESIGN & SECURITY The controller must design systems to protect and secure personal data based on risk .▪ Pseudonymisation and encryption ▪ Access controls ▪ Backup/restore ▪ Minimization 12 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 25 32
  • 13. HOW CUSTOMER IAM HELPS SOLVE GDPR GDPR & Customer IAM: The Real Winners Won’t Stop at Compliance 13 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 14. WHAT IS YOUR BUSINESS GOAL? 14 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 15. End-to-end Security Govern Data Access Mobile Apps SECURE & SEAMLESS CUSTOMER IAM Web Apps & SaaS IoT Internal Apps Partner Apps Auth & SSO • Single sign-on across digital properties • MFA and transaction approvals • Govern and control access to data • Unify profiles and sync data platforms • Manage preferences and privacy • End-to-end security • Extreme scale and performance 15 MDM CRM AD/LDAP Unify Customer Profiles Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 16. End-to-end Security Govern Data Access Mobile Apps SECURE & SEAMLESS CUSTOMER IAM Web Apps & SaaS IoT Internal Apps Partner Apps Auth & SSO • Single sign-on across digital properties • MFA and transaction approvals • Govern and control access to data • Unify profiles and sync data platforms • Manage preferences and privacy • End-to-end security • Extreme scale and performance 16 MDM CRM AD/LDAP Unify Customer Profiles Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 17. CAPTURE & MANAGE CONSENT • Simplify the capture of customer consent across channels • Capture consent for specific attributes • Enforce consent choices based on centralized policies that can reflect: o Geographic regulations like GDPR o Industry Regulations like HIPAA o Corporate Policies o Customer Consent Do You Want to Share Your Personal Data with “LoyaltyApp, LLC”? (more) Yes No 17 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 7 8 13
  • 18. TRANSACTION CONSENT & APPROVAL 18 Confirm 10,000 Transfer to Acct #34343434 1. User Initiates Money Transfer 2. Confirms Transaction 3. Money Transfer Approved Transfer 10,000 to Account #3434343? OK Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 7 8 13
  • 19. CUSTOMER SELF-MANAGED PROFILE 19 Internal Apps WebMobile Apps IoT Devices Loyalty Rewards Programs Customers self-manage profile and preferences Preferences are consistently enforced across channels Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 15 16
  • 20. DATA ACCESS GOVERNANCE 20 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Partner App Internal App • Name • Social Security # • Credit Card # • Preferences • Date of Birth • Name • X • X • Preferences • Date of Birth • Name • X • X • Preferences • X Only received authorized data attributes Customer Profile Articles: 20 25 32
  • 21. ENFORCE PROPER USAGE OF CUSTOMER DATA Enforce customer consent choices and regulatory constraints on everyone or face consequences… 21 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 20 25 32
  • 22. MANAGING A GLOBAL NAMESPACE 22 Data GovernancePartial Data SyncData Residency Mary Banks 214-555-8048 123 Main St. X CC# X Sarah EU Citizen Mary US Citizen U.S.A. DataEuropean Sarah’s Data Mary’s Data U.S.A. DataEurope Data Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. Articles: 20 25 32
  • 23. Secure In Transit PII data captured and used in apps Secure At Rest Secure During Replication Tamper Proof Logs ✓ Best practice password policies ✓ Client connection policies ✓ Limited-access admin accounts ✓ Record-limited access ✓ Tamper-evident logging ✓ Criteria-based logging ✓ Data obfuscation ✓ Data layer encryption ✓ Encrypted backup files, log files, and change histories ✓ Active and passive alerts ✓ Resource limit policies to mitigate DoS ✓ Simplified integration with 3rd party security monitoring tools Fragmented and Vulnerable Identity Data Mobile App App Data Loyalty Programs Identity Data Marketing Programs App Data Identity Data Web E-Commerce App Data Identity Data App Data Centralized and Secure Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.23 SECURING CUSTOMER IDENTITY DATA Articles: 25 32
  • 24. SYNC AND CONSOLIDATE IDENTITY DATA ▪ Create unified customer profiles ▪ Consolidate identity data silos ▪ Map data schema and attribute types ▪ Bi-directionally sync identity data ▪ Support different connection methods and protocols LDAP MDM CRM Order Mgmt.RDBMS Active Directory Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.24 Articles: 20
  • 25. PING – A PRODUCT LEADER IN CUSTOMER IAM (KuppingerCole) 25 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 26. DESIGN PATTERNS FOR CONSENT MANAGEMENT GDPR & Customer IAM: The Real Winners Won’t Stop at Compliance 26 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 27. CONSENT PATTERN #1 CONSENT IS ITS OWN OBJECT TYPE 27 Creation / Renewal of Consent Management of Consent Revocation / Expiration of Consent Begin Auditing / Logging End If renew Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 28. CONSENT OBJECT TYPE – EXAMPLE IMPL. Consent Data Description Example id Unique Identifier urn:X-pingidentity:Opt:Newsletters description Description of use Consent to send newsletters destinationType Consent manifestation (i.e. email, application, terms of service) Email version Version # 0.1.1 required Is consent required TRUE/FALSEUser Data – Consent Attributes Description Example consentId Unique Identifier urn:X-pingidentity:Opt:Newsletters consentCollector Method of consent collection urn:X-pingidentity::App:my-account consentTimestamp Timestamp 2017-05-12T16:22:19.043Z consentExpiration Date of expiration 2018-05-18T16:22:19.043Z consentPolarity Opt-In or Opt Out 0/1 28 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 29. CONSENT PATTERN #2 CONSENT TRANSPARENCY 29 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 30. CONSENT PATTERN #3 ENFORCING OPT-OUT 30 IF CLIENT_ID = “marketingengine” AND OPT_IN = FALSE EXCLUDE EMAIL Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 31. CONSENT PATTERN #3 ENFORCING OPT-OUT 31 Same data call but different responses based on user consent Same data call but different responses based on user consent Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 32. CONSENT PATTERN #3 ENFORCING OPT-OUT 32 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 33. CONSENT PATTERN #4 CONSENT AS A RESPONSE 33 DATA GOVERNANCE APPLICATIONS USER CONSENT JSON Object Think: Polarity or Metadata? Service Provider Layer Identity Provider Layer Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 34. CONSENT PATTERN #5 CONSENT COMPLEXITY 34 Opt-In/Opt-Out Access Grants OAuth Scopes Fine Grained Terms of Service Consent Forms Coarse Grained EASE OF USER INTERFACE BETTER PRIVACY CONTROLS Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 35. 35 1. Consent as its own object type ➢ Separate consent metadata objects from user consent records 2. Consent transparency ➢ Create a simple, easy to understand UI for your users to manage consent 3. Enforcing opt-out / opt-in ➢ Provide a layer on top of your consent raw data to honor your user consents 4. Consent as a response ➢ Implement your consent data close to your user data 5. Consent complexity ➢ Remember that the more parties that are involved, the more complex consent management gets ➢ The level of granularity in your consent dictates the ease of user management in contrast to providing better privacy controls for your users Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. DESIGN PATTERNS TAKEAWAYS
  • 36. KEY CUSTOMER IAM BENEFITS 36 Customer Experience End-to-End Security Scale & Performance Privacy Adaptability Meet stringent end-to-end security requirements, from authentication and secure access to data management. Manage millions of identities and billions of attributes at extreme scale and performance. Manage and enforce geographic, industry, corporate and personal consent customer privacy directives. Support modern application architectures and support on premise, cloud, or hybrid deployment options. Deliver secure, seamless and personalized customer experiences across all channels and devices. Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.
  • 37. LIVE Q&A Please visit www.pingidentity.com/GDPR For More Information: 37 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved.