SlideShare a Scribd company logo
1 of 27
Global & National Identity
Projects Failures and Successes
Huntington Ventures Ltd.
The Business of Identity Management
May 2016
This Deck…
• Reviews common causes for why so many large
identity projects fail, go over budget and timelines
and under-deliver
• Describes, based on my experience, ways to
structure a large identity program with several
related identity projects such that they will be
successful
• So who am I?
Guy Huntington
Guy Huntington is a very
experienced identity
architect, program and
project manager who has led,
as well as rescued, many
large Fortune 500 identity
projects including Boeing and
Capital One. He recently
completed being the identity
architect for the Government
of Alberta’s Digital Citizen
Identity and Authentication
program.
My Own Experiences…
• I have been brought in several times to rescue
very large identity projects with many of them
global in scope
• Often, prior to my appearance, senior managers
have been fired and the executive team is now
very skeptical about the supposed business
benefits of the identity project
• Here’s what they were “blaming” for the demise
of their project….
The Blame Game…
• Often the identity software vendor is blamed, saying their
products don’t work”
– This often leads them to begin evaluating a new vendor whom
they tell me “will work”
• The implementation team is blamed claiming they “took
too long” to implement and then “raised problems too
late”
• A specific department is blamed claiming they essentially
sunk the project
• Normally the people who are funding the project (e.g.
Finance) is furious because the project is so far over
budget
– This usually results in senior executives in charge of the
program/projects to be fired
And Here’s What I Found…
• The program and project requirements were not
thoroughly done in the beginning. Why?
• There is an old consulting type triangle depicting IT
projects as follows:
• The enterprise mistakenly believed all the vendors
and consultants who were talking about the
“technology” i.e. identity management product,
cards, etc. as the “Solution”
• They under-estimated the people and processes…
People, Processes and Politics…
• An identity program/project cuts across ALL
government and enterprises ministries and
departments
• It allows for new ways of doing things which are
usually faster, cheaper and more convenient for
the end user
• HOWEVER, the existing people who’s existing
revenue, political control, leverage and jobs are
often threatened
• So the smart ones use what I call the “4 D’s”
Guy’s 4 D’s of a Bureaucracy …
• DELAY, DEFLECT, DELEGATE AND DENY
• These are the tools of the trade of all bureaucracies to function
and maintain themselves
• So a smart department leader or minister uses these tactics to
essentially “outwait” the new program/project until such time
as they can regain control
• The people usually running the program/projects did not do
their homework in addressing these players before and during
the project
– For example, I was in a country in Asia and was talking about
implementing a citizen identity system where they could pay for
fines from their phones. A wise person told me that the police
would be a major problem since most tickets were paid on the spot
to the officer as a revenue source for the officer
– Governments and global enterprises have lots of such potential
project sinkholes they can fall into
The Devil Is In the Details…
• An identity program/project involves tens of thousands of
details
• These cover everything from the business processes and
technology to security, governance, laws, regulations,
application/service integrations, etc.
• It’s been my own experience that the executives at the
top, as well as their managers, don’t totally understand
the complexity and inter-relationships required
• Thus the program/project rests in the hands of their
managers who are also somewhat blind to all the
implications
• That’s when the project begins to come off the track
Then There’s Infrastructure & Security
• In today’s world, organized crime and foreign intelligence
agencies want to penetrate a national identity and
authentication system to effectively bring a country down
• The system always must be up 24x7x365
• Most senior executives don’t understand the requirements
• At one global company, their global system went down for
6 hours. The CEO was on the phone every 30 minutes
asking for updates and when it would be up. I was
brought back in to implement the high availability
recommendations I had previously made
• In today’s world of “ransom ware”, the stakes are even
higher
One Throat To Choke…
• Many large enterprises want one global consulting vendor to oversee
the entire identity program or project
• Their rational is “there is only one throat to choke”
• On the surface, this makes sense. HOWEVER, in practice it doesn’t
always work
• It totally depends on the people the major consulting vendors bring in
the door
• I have frequently been called in when the major consulting vendor has
done what is called a “bait and switch”
– They bring in their top sales and technical team to clinch the deal
– After some time, they remove the experienced people to other projects
and leave the existing project with not so experienced people
– Things normally bubble along for up to a year or more when all of a sudden
things don’t work, deliverables are missed, costs go up and the blame
game begins
• The old saying “caveat emptor” or “buyer beware” is appropriate
It’s Complicated…
• A nation who is deploying a national identity and
authentication infrastructure, will create thousands of services
relying upon this system
• It’s complicated
• An analogy I use is you are creating the electronic equivalent to
roadways, electricity and water plumbing used in your nations
• It too is complicated and requires the integrated planning and
support of many different types of people
• Most of this infrastructure is underground and in effect
“invisible”
• The identity infrastructure you are going to create will also
mostly be invisible and taken for granted by citizens
• You are building a new, complex, electronic spider web
touching all people
So What Are Successful Components?
• If you’ve been viewing the other National ICT
presentations here,
http://www.slideshare.net/ghuntington/overview-
of-my-various-national-ict-strategy-presentations,
you’ll be realizing the depth and breadth of what I
am proposing
• There is some good news… you are not the first
nation to go down this road
• They have successfully addressed these challenges
• So what are some of the key components?
Governance
• Governance is where it all starts
• Go here to view the governance deck describing the many key
components of good governance
– http://www.slideshare.net/ghuntington/developing-countries-
national-ict-identity-governance-strategy
• Your country’s leaders must understand the complexity about
which they are about to embark upon
• They need to not only view similar presentations to what I’ve
created BUT they also need to understand that this is a 3-5
year program to change their country
• They too must change as the identity program rolls out
– For example, in Estonia, the senior ministers use a paperless system
• Their political careers could be enhanced or, seriously
tarnished upon the results of the citizen identity program since
it’s very public
Requirements
• My advice is to not let the vendors lead you into requirements
• Their products, while usually fine, are only a small part of the
overall solution
• Your country needs to have extremely detailed identity
requirements gathering before any RFP is issued:
• This involves:
– Identity data analysis, business processes and technical capabilities
for each application where citizen identity data is entered
– Financial payment analysis for any payment made by the citizen to
the government regardless of ministry
– Network and security analysis to get ready to ransom ware type
attacks
– Laws and regulations gap analysis
• This involves a team of very skilled people
Avoid Issuing Quick RFP’s
• I have come into projects where the
management team wanted to get things going
and then issued and awarded one RFP usually for
an identity system, or cards, or whatever
• Then they ran into trouble when they found out
their true requirements, discovering their
existing solution doesn’t integrate well with what
they really want to do
• So, my advice is to take 3-6 months, bring in a
skilled team of requirements people and do your
homework before embarking on issuing RFP’s
Create A Strategy and Roadmap…
• A very detailed strategy and roadmap set of
documents should be produced
• These should outline the major goals, show
interdependencies, timelines, budgets, resource
requirements and the number and type of
different RFP’s required
• If this is done by skilled people, the government
leaders and senior managers can see what they
are getting themselves into before they leap
Run Several Projects In Parallel…
• The identity program usually has several main
“Tracks”:
– Governance
– Security
– Identity and access management
– Privacy
– Citizen Payments
– Healthcare
– Education
– Social Services, etc.
Integration Of Projects
• These “tracks” are all highly dependent upon the
underlying identity and authentication infrastructure
• Therefore, they need to be tightly integrated at the project
level
• When I run global programs and projects, I have daily
team standups for each project and then weekly global
standups for all teams
• It’s extremely important that everyone knows what the
other projects are doing that impact them and also
contribute their thoughts and concerns
• It’s so much better to catch political or design problems
early on before they become a major disaster to deal with
Who’s Going To Run All Of This?
• I have been involved in most different types of
operational management scenarios for enterprises
where they
– Out source their design, implementation and support
– Use combined teams of enterprise and out-sourced
specialists to design and implement and then the
enterprise supports
– Do it all mostly themselves
• I have worked with most of the main consulting
firms, identity vendors and out sourced consultants
from all over the world
• So what do I recommend?
A Blended Model…
• Most of your countries will lack the specialized
identity and access management expertise as
well as differing degrees of knowledge on things
such as security, laws, governance, etc.
• It makes sense to therefore bring in specialists
BUT MESH THEM IMMEDIATELY WITH LOCAL
PEOPLE
• Your people need to build up these skill sets
• They are the ones who your country will rely
upon to carry the national infrastructure
Think Through Ops Support…
• The identity and access management
infrastructure is the technical and economic hub
of the new digital wheel your countries are
creating
• If you decide to outsource this, then how much
control can you place on the operators of the
system to not do inadvertent or malicious
things?
• Read the security deck to gain insight into this
– http://www.slideshare.net/ghuntington/developing-
countries-national-ict-security-strategy
Politics…
• Beware the politics! It’s essential that you and
your country’s leaders carefully plot a strategy
through the maze of your own internal politics
• It involves what I call “pick and choose”.
– One needs to carefully pick out the major game
changer players within the government
– Then one must carefully choose the starting
components such there is a high degree of successful
implementation
Elections…
• As your government comes up on their next election
cycle, they will obviously want to let the citizens
know what a great job they are doing for them
• In the strategy outlined here
http://www.slideshare.net/ghuntington/developing-
countries-national-ict-identity-strategy, I outline a
way for the government to show the vast majority of
their citizens, who only have cell phones, how they
will be helped
– Pay for government services wherever they are, receive
improved healthcare, etc.
A Word Of Caution…
• Under promise and over deliver
• The danger with leaders taking on the identity program is
that they will oversell it politically too fast
• This could result in them creating a disaster instead of a
political success
• I always tell my clients to under promise and over deliver
• The first 2-3 years are the most critical assembling the
requisite legal, technical and support pieces
• I recommend you tell your leaders to soft pedal the
benefits for the first three years until everything is in place
• Then they can tell their citizens what a great thing they
have done
Success or Failure?
• Will you identity program be successful, or a
failure?
• The answer is up to you
• I have created a series of decks to help educate
you on the many different pieces required for an
identity program
• If you take some of the advice to heart, learn
from other’s past mistakes and break down the
project into discrete small steps, then you will
succeed
If You Thought This Is Thought Provoking
• Then please pass along a link to the presentation
to people in your country who might be
interested
• You can contact me at:
– guy@hvl.net
– 1-604-861-6804
– Via LinkedIn (https://ca.linkedin.com/in/ghuntington)
• Thanks for your time!

More Related Content

What's hot

National identity strategy presentation may 10, 2016
National identity strategy  presentation may 10, 2016National identity strategy  presentation may 10, 2016
National identity strategy presentation may 10, 2016Guy Huntington
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 Timothy Holborn
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts Timothy Holborn
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?Roohul Amin
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge bankingTimothy Holborn
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
 
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Naela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eedNaela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eed
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eedGideon Ale
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
 
E governance-backus report3
E governance-backus report3E governance-backus report3
E governance-backus report3Carlos Joa
 
e-Government introduction
e-Government introductione-Government introduction
e-Government introductionMuhammad Farooq
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protectionijtsrd
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 

What's hot (20)

National identity strategy presentation may 10, 2016
National identity strategy  presentation may 10, 2016National identity strategy  presentation may 10, 2016
National identity strategy presentation may 10, 2016
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?
 
Better use of data
Better use of dataBetter use of data
Better use of data
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge banking
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
 
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Naela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eedNaela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eed
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
 
E governance-backus report3
E governance-backus report3E governance-backus report3
E governance-backus report3
 
e-Government introduction
e-Government introductione-Government introduction
e-Government introduction
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 

Similar to Global & National Identity Projects Failures and Successes

Legal Knowledge Management for Municipal Attorneys
Legal Knowledge Management for Municipal AttorneysLegal Knowledge Management for Municipal Attorneys
Legal Knowledge Management for Municipal Attorneysajrothman
 
New Interview Template
New Interview TemplateNew Interview Template
New Interview Templatewmedford
 
Presentation on developments in hiring and fintech for HKU Executive certific...
Presentation on developments in hiring and fintech for HKU Executive certific...Presentation on developments in hiring and fintech for HKU Executive certific...
Presentation on developments in hiring and fintech for HKU Executive certific...Kok Tong (K.T.) Khoo
 
2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor managementmkeuning
 
Robotics & AI: Where Are You on Your Automation Journey?
Robotics & AI: Where Are You on Your Automation Journey?Robotics & AI: Where Are You on Your Automation Journey?
Robotics & AI: Where Are You on Your Automation Journey?ITESOFT
 
Nine keys to successful delegation in Project Management
Nine keys to successful delegation in Project ManagementNine keys to successful delegation in Project Management
Nine keys to successful delegation in Project Managementmrinalsingh385
 
Issuers Story - PCI Congress London 23Jan14
Issuers Story - PCI Congress London 23Jan14Issuers Story - PCI Congress London 23Jan14
Issuers Story - PCI Congress London 23Jan14Patrick Wheeler
 
Global Patent Congress September 2015 Park IP Translations Matthew Sekac
Global Patent Congress September 2015 Park IP Translations Matthew SekacGlobal Patent Congress September 2015 Park IP Translations Matthew Sekac
Global Patent Congress September 2015 Park IP Translations Matthew SekacPark IP Translations
 
Digital government in developing countries
Digital government in developing countriesDigital government in developing countries
Digital government in developing countriesJohn Leonardo
 
Are you Ready for Digital_Nuno Oliveira
Are you Ready for Digital_Nuno OliveiraAre you Ready for Digital_Nuno Oliveira
Are you Ready for Digital_Nuno OliveiraNuno Oliveira
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseRamez Al-Fayez
 
Lessons from the AIA Foreign Filing Aftershock
Lessons from the AIA Foreign Filing AftershockLessons from the AIA Foreign Filing Aftershock
Lessons from the AIA Foreign Filing AftershockPark IP Translations
 
Intranet Project: Roll-out Strategy & Pain Points to consider
Intranet Project: Roll-out Strategy & Pain Points to considerIntranet Project: Roll-out Strategy & Pain Points to consider
Intranet Project: Roll-out Strategy & Pain Points to considereXo Platform
 
The future NGO is agile, entrepreneurial and digital
The future NGO is agile, entrepreneurial and digitalThe future NGO is agile, entrepreneurial and digital
The future NGO is agile, entrepreneurial and digitalMzN International
 
Leading the Digital Era @ Banking - Agile Organization
Leading the Digital Era @ Banking - Agile OrganizationLeading the Digital Era @ Banking - Agile Organization
Leading the Digital Era @ Banking - Agile OrganizationTathagat Varma
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 

Similar to Global & National Identity Projects Failures and Successes (20)

Legal Knowledge Management for Municipal Attorneys
Legal Knowledge Management for Municipal AttorneysLegal Knowledge Management for Municipal Attorneys
Legal Knowledge Management for Municipal Attorneys
 
New Interview Template
New Interview TemplateNew Interview Template
New Interview Template
 
Presentation on developments in hiring and fintech for HKU Executive certific...
Presentation on developments in hiring and fintech for HKU Executive certific...Presentation on developments in hiring and fintech for HKU Executive certific...
Presentation on developments in hiring and fintech for HKU Executive certific...
 
Trippe "Project Management Trends in Publishing: Agile is the New Norm and Th...
Trippe "Project Management Trends in Publishing: Agile is the New Norm and Th...Trippe "Project Management Trends in Publishing: Agile is the New Norm and Th...
Trippe "Project Management Trends in Publishing: Agile is the New Norm and Th...
 
Managing Cyber and Five Other Technology Risks
Managing Cyber and Five Other Technology RisksManaging Cyber and Five Other Technology Risks
Managing Cyber and Five Other Technology Risks
 
Fwd50 djm updated oct 31
Fwd50 djm updated oct 31Fwd50 djm updated oct 31
Fwd50 djm updated oct 31
 
2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management
 
Robotics & AI: Where Are You on Your Automation Journey?
Robotics & AI: Where Are You on Your Automation Journey?Robotics & AI: Where Are You on Your Automation Journey?
Robotics & AI: Where Are You on Your Automation Journey?
 
Nine keys to successful delegation in Project Management
Nine keys to successful delegation in Project ManagementNine keys to successful delegation in Project Management
Nine keys to successful delegation in Project Management
 
Issuers Story - PCI Congress London 23Jan14
Issuers Story - PCI Congress London 23Jan14Issuers Story - PCI Congress London 23Jan14
Issuers Story - PCI Congress London 23Jan14
 
Global Patent Congress September 2015 Park IP Translations Matthew Sekac
Global Patent Congress September 2015 Park IP Translations Matthew SekacGlobal Patent Congress September 2015 Park IP Translations Matthew Sekac
Global Patent Congress September 2015 Park IP Translations Matthew Sekac
 
Digital government in developing countries
Digital government in developing countriesDigital government in developing countries
Digital government in developing countries
 
Are you Ready for Digital_Nuno Oliveira
Are you Ready for Digital_Nuno OliveiraAre you Ready for Digital_Nuno Oliveira
Are you Ready for Digital_Nuno Oliveira
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterprise
 
D.bott, wmg five steps to securing funding
D.bott, wmg   five steps to securing fundingD.bott, wmg   five steps to securing funding
D.bott, wmg five steps to securing funding
 
Lessons from the AIA Foreign Filing Aftershock
Lessons from the AIA Foreign Filing AftershockLessons from the AIA Foreign Filing Aftershock
Lessons from the AIA Foreign Filing Aftershock
 
Intranet Project: Roll-out Strategy & Pain Points to consider
Intranet Project: Roll-out Strategy & Pain Points to considerIntranet Project: Roll-out Strategy & Pain Points to consider
Intranet Project: Roll-out Strategy & Pain Points to consider
 
The future NGO is agile, entrepreneurial and digital
The future NGO is agile, entrepreneurial and digitalThe future NGO is agile, entrepreneurial and digital
The future NGO is agile, entrepreneurial and digital
 
Leading the Digital Era @ Banking - Agile Organization
Leading the Digital Era @ Banking - Agile OrganizationLeading the Digital Era @ Banking - Agile Organization
Leading the Digital Era @ Banking - Agile Organization
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 

More from Guy Huntington

One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017Guy Huntington
 
Requirements for Successful Enterprises in a Federated Economy - October 2017
Requirements for Successful Enterprises in a Federated Economy - October 2017Requirements for Successful Enterprises in a Federated Economy - October 2017
Requirements for Successful Enterprises in a Federated Economy - October 2017Guy Huntington
 
Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017Guy Huntington
 
Identity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthIdentity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthGuy Huntington
 
Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017Guy Huntington
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Guy Huntington
 
National citizen identity strategy
National citizen identity strategyNational citizen identity strategy
National citizen identity strategyGuy Huntington
 
Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Guy Huntington
 

More from Guy Huntington (8)

One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017
 
Requirements for Successful Enterprises in a Federated Economy - October 2017
Requirements for Successful Enterprises in a Federated Economy - October 2017Requirements for Successful Enterprises in a Federated Economy - October 2017
Requirements for Successful Enterprises in a Federated Economy - October 2017
 
Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017
 
Identity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthIdentity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic Growth
 
Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities
 
National citizen identity strategy
National citizen identity strategyNational citizen identity strategy
National citizen identity strategy
 
Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015
 

Recently uploaded

Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...Delhi Call Girls
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 

Recently uploaded (20)

Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 

Global & National Identity Projects Failures and Successes

  • 1. Global & National Identity Projects Failures and Successes Huntington Ventures Ltd. The Business of Identity Management May 2016
  • 2. This Deck… • Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver • Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful • So who am I?
  • 3. Guy Huntington Guy Huntington is a very experienced identity architect, program and project manager who has led, as well as rescued, many large Fortune 500 identity projects including Boeing and Capital One. He recently completed being the identity architect for the Government of Alberta’s Digital Citizen Identity and Authentication program.
  • 4. My Own Experiences… • I have been brought in several times to rescue very large identity projects with many of them global in scope • Often, prior to my appearance, senior managers have been fired and the executive team is now very skeptical about the supposed business benefits of the identity project • Here’s what they were “blaming” for the demise of their project….
  • 5. The Blame Game… • Often the identity software vendor is blamed, saying their products don’t work” – This often leads them to begin evaluating a new vendor whom they tell me “will work” • The implementation team is blamed claiming they “took too long” to implement and then “raised problems too late” • A specific department is blamed claiming they essentially sunk the project • Normally the people who are funding the project (e.g. Finance) is furious because the project is so far over budget – This usually results in senior executives in charge of the program/projects to be fired
  • 6. And Here’s What I Found… • The program and project requirements were not thoroughly done in the beginning. Why? • There is an old consulting type triangle depicting IT projects as follows: • The enterprise mistakenly believed all the vendors and consultants who were talking about the “technology” i.e. identity management product, cards, etc. as the “Solution” • They under-estimated the people and processes…
  • 7. People, Processes and Politics… • An identity program/project cuts across ALL government and enterprises ministries and departments • It allows for new ways of doing things which are usually faster, cheaper and more convenient for the end user • HOWEVER, the existing people who’s existing revenue, political control, leverage and jobs are often threatened • So the smart ones use what I call the “4 D’s”
  • 8. Guy’s 4 D’s of a Bureaucracy … • DELAY, DEFLECT, DELEGATE AND DENY • These are the tools of the trade of all bureaucracies to function and maintain themselves • So a smart department leader or minister uses these tactics to essentially “outwait” the new program/project until such time as they can regain control • The people usually running the program/projects did not do their homework in addressing these players before and during the project – For example, I was in a country in Asia and was talking about implementing a citizen identity system where they could pay for fines from their phones. A wise person told me that the police would be a major problem since most tickets were paid on the spot to the officer as a revenue source for the officer – Governments and global enterprises have lots of such potential project sinkholes they can fall into
  • 9. The Devil Is In the Details… • An identity program/project involves tens of thousands of details • These cover everything from the business processes and technology to security, governance, laws, regulations, application/service integrations, etc. • It’s been my own experience that the executives at the top, as well as their managers, don’t totally understand the complexity and inter-relationships required • Thus the program/project rests in the hands of their managers who are also somewhat blind to all the implications • That’s when the project begins to come off the track
  • 10. Then There’s Infrastructure & Security • In today’s world, organized crime and foreign intelligence agencies want to penetrate a national identity and authentication system to effectively bring a country down • The system always must be up 24x7x365 • Most senior executives don’t understand the requirements • At one global company, their global system went down for 6 hours. The CEO was on the phone every 30 minutes asking for updates and when it would be up. I was brought back in to implement the high availability recommendations I had previously made • In today’s world of “ransom ware”, the stakes are even higher
  • 11. One Throat To Choke… • Many large enterprises want one global consulting vendor to oversee the entire identity program or project • Their rational is “there is only one throat to choke” • On the surface, this makes sense. HOWEVER, in practice it doesn’t always work • It totally depends on the people the major consulting vendors bring in the door • I have frequently been called in when the major consulting vendor has done what is called a “bait and switch” – They bring in their top sales and technical team to clinch the deal – After some time, they remove the experienced people to other projects and leave the existing project with not so experienced people – Things normally bubble along for up to a year or more when all of a sudden things don’t work, deliverables are missed, costs go up and the blame game begins • The old saying “caveat emptor” or “buyer beware” is appropriate
  • 12. It’s Complicated… • A nation who is deploying a national identity and authentication infrastructure, will create thousands of services relying upon this system • It’s complicated • An analogy I use is you are creating the electronic equivalent to roadways, electricity and water plumbing used in your nations • It too is complicated and requires the integrated planning and support of many different types of people • Most of this infrastructure is underground and in effect “invisible” • The identity infrastructure you are going to create will also mostly be invisible and taken for granted by citizens • You are building a new, complex, electronic spider web touching all people
  • 13. So What Are Successful Components? • If you’ve been viewing the other National ICT presentations here, http://www.slideshare.net/ghuntington/overview- of-my-various-national-ict-strategy-presentations, you’ll be realizing the depth and breadth of what I am proposing • There is some good news… you are not the first nation to go down this road • They have successfully addressed these challenges • So what are some of the key components?
  • 14. Governance • Governance is where it all starts • Go here to view the governance deck describing the many key components of good governance – http://www.slideshare.net/ghuntington/developing-countries- national-ict-identity-governance-strategy • Your country’s leaders must understand the complexity about which they are about to embark upon • They need to not only view similar presentations to what I’ve created BUT they also need to understand that this is a 3-5 year program to change their country • They too must change as the identity program rolls out – For example, in Estonia, the senior ministers use a paperless system • Their political careers could be enhanced or, seriously tarnished upon the results of the citizen identity program since it’s very public
  • 15. Requirements • My advice is to not let the vendors lead you into requirements • Their products, while usually fine, are only a small part of the overall solution • Your country needs to have extremely detailed identity requirements gathering before any RFP is issued: • This involves: – Identity data analysis, business processes and technical capabilities for each application where citizen identity data is entered – Financial payment analysis for any payment made by the citizen to the government regardless of ministry – Network and security analysis to get ready to ransom ware type attacks – Laws and regulations gap analysis • This involves a team of very skilled people
  • 16. Avoid Issuing Quick RFP’s • I have come into projects where the management team wanted to get things going and then issued and awarded one RFP usually for an identity system, or cards, or whatever • Then they ran into trouble when they found out their true requirements, discovering their existing solution doesn’t integrate well with what they really want to do • So, my advice is to take 3-6 months, bring in a skilled team of requirements people and do your homework before embarking on issuing RFP’s
  • 17. Create A Strategy and Roadmap… • A very detailed strategy and roadmap set of documents should be produced • These should outline the major goals, show interdependencies, timelines, budgets, resource requirements and the number and type of different RFP’s required • If this is done by skilled people, the government leaders and senior managers can see what they are getting themselves into before they leap
  • 18. Run Several Projects In Parallel… • The identity program usually has several main “Tracks”: – Governance – Security – Identity and access management – Privacy – Citizen Payments – Healthcare – Education – Social Services, etc.
  • 19. Integration Of Projects • These “tracks” are all highly dependent upon the underlying identity and authentication infrastructure • Therefore, they need to be tightly integrated at the project level • When I run global programs and projects, I have daily team standups for each project and then weekly global standups for all teams • It’s extremely important that everyone knows what the other projects are doing that impact them and also contribute their thoughts and concerns • It’s so much better to catch political or design problems early on before they become a major disaster to deal with
  • 20. Who’s Going To Run All Of This? • I have been involved in most different types of operational management scenarios for enterprises where they – Out source their design, implementation and support – Use combined teams of enterprise and out-sourced specialists to design and implement and then the enterprise supports – Do it all mostly themselves • I have worked with most of the main consulting firms, identity vendors and out sourced consultants from all over the world • So what do I recommend?
  • 21. A Blended Model… • Most of your countries will lack the specialized identity and access management expertise as well as differing degrees of knowledge on things such as security, laws, governance, etc. • It makes sense to therefore bring in specialists BUT MESH THEM IMMEDIATELY WITH LOCAL PEOPLE • Your people need to build up these skill sets • They are the ones who your country will rely upon to carry the national infrastructure
  • 22. Think Through Ops Support… • The identity and access management infrastructure is the technical and economic hub of the new digital wheel your countries are creating • If you decide to outsource this, then how much control can you place on the operators of the system to not do inadvertent or malicious things? • Read the security deck to gain insight into this – http://www.slideshare.net/ghuntington/developing- countries-national-ict-security-strategy
  • 23. Politics… • Beware the politics! It’s essential that you and your country’s leaders carefully plot a strategy through the maze of your own internal politics • It involves what I call “pick and choose”. – One needs to carefully pick out the major game changer players within the government – Then one must carefully choose the starting components such there is a high degree of successful implementation
  • 24. Elections… • As your government comes up on their next election cycle, they will obviously want to let the citizens know what a great job they are doing for them • In the strategy outlined here http://www.slideshare.net/ghuntington/developing- countries-national-ict-identity-strategy, I outline a way for the government to show the vast majority of their citizens, who only have cell phones, how they will be helped – Pay for government services wherever they are, receive improved healthcare, etc.
  • 25. A Word Of Caution… • Under promise and over deliver • The danger with leaders taking on the identity program is that they will oversell it politically too fast • This could result in them creating a disaster instead of a political success • I always tell my clients to under promise and over deliver • The first 2-3 years are the most critical assembling the requisite legal, technical and support pieces • I recommend you tell your leaders to soft pedal the benefits for the first three years until everything is in place • Then they can tell their citizens what a great thing they have done
  • 26. Success or Failure? • Will you identity program be successful, or a failure? • The answer is up to you • I have created a series of decks to help educate you on the many different pieces required for an identity program • If you take some of the advice to heart, learn from other’s past mistakes and break down the project into discrete small steps, then you will succeed
  • 27. If You Thought This Is Thought Provoking • Then please pass along a link to the presentation to people in your country who might be interested • You can contact me at: – guy@hvl.net – 1-604-861-6804 – Via LinkedIn (https://ca.linkedin.com/in/ghuntington) • Thanks for your time!