EVE MALER, VP OF INNOVATION & EMERGING TECHNOLOGY, FORGEROCK
Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and people have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. In this session, learn about the User-Managed-Access (UMA) standard, ForgeRock’s OpenUMA project and how ForgeRock is developing solutions to ensure privacy and trust in the digital world.
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
Eve Maler, VP Innovation & Emerging Technology, ForgeRock:
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and people
have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are
recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. The
User-Managed Access (UMA) standard and ForgeRock’s OpenUMA project are stepping into the
breach to give individuals a convenient central hub for proactively authorizing who and what can get
access to their personal data and content.
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
OLIVER STAMPFLI, SECURITY ARCHITECT IDENTITY & ACCESS MANAGEMENT, SWISSCOM
JENS SONNENTRÜCKER, HEAD OF IDENTITY ACCESS MANAGEMENT & GOVERNANCE, SWISSCOM
The goal for Swisscom was to be able to offer one ID Broker for all services, so that subscribers essentially would be able to “Bring Your Own Identity” (BYOI). If not done this way, each application or service offered by Swisscom would have required a connection with each IDP. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for the customer base, while also increasing sharing options across service offerings.
2015 Identity Summit - Tale of Two Views: B2C vs. B2EForgeRock
With Floris Van Den Dool, Managing Director Information Security Services Europe, Africa and Latin America, Accenture.
Find out what the major dynamics and differences between these two identity use cases are, what’s really important to each, what’s really not! We’ll also cover what are the implications of design decisions (i.e. social authN, identity analytics) and if a customer can really use a single IAM platform to enable both use cases. Throughout the discussion, we’ll highlight what are the noteworthy benefits for ForgeRock Partners, ForgeRock Customers and ForgeRock Customers’ Customers
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’ForgeRock
Today, CIOs, CDOs and CISOs are collaborating on new revenue generating projects that would have seemed impossible a few years ago. Technology is changing how we do business; as IT professionals, we must rethink how we select and use technology to serve our customers. In this talk, Mike will discuss the digital transformation and how identity management in particular plays a critical role in providing more secure and personalized services to our customers.
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
DANIEL RASKIN, VP STRATEGY & MARKETING, FORGEROCK
Every digital initiative requires identity. Whether it be IoT, Cloud, Mobile, or Enterprise initiatives, identity is required. Identity is also more than security. It is a core differentiator that uses identity attributes and context to transform how people engage your business. A foundational element of digital services, identity management can help you to improve customer engagement, drive a seamless omnichannel experience and reach new market segments. Building on Mike’s opening session, Daniel will outline how to re-think your company’s “Return on Identity” strategy to be customer-focused and capable of satisfying the emerging requirements of the digital transformation age.
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...ForgeRock
Today, CIOs, CDOs and CISOs are collaborating on new revenue-generating projects that would have seemed impossible a few years ago. Technology is changing how we do business; as IT professionals, we must rethink how we select and use technology to serve our customers. In this talk, Mike will discuss the digital transformation and how identity management in particular plays a critical role in providing more secure and personalized services to our customers.
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)ForgeRock
Mike Ellis, CEO ForgeRock's keynote at the Identity Summit 2015: Using Identity to Empower CIOs.
Today, CIOs, CDOs and CISOs are collaborating on new revenue-generating projects that would have seemed impossible a few years ago. Technology is changing how we do business; as IT professionals, we must rethink how we select and use technology to serve our customers. In this talk, Mike will discuss the digital transformation and how identity management in particular plays a critical role in providing more secure and personalized services to our customers.
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
With Markus Weber, Sr. Manager, Product Marketing, ForgeRock.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and people have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. In this session, learn about the User-Managed-Access (UMA) standard, ForgeRock’s OpenUMA project and how ForgeRock is developing solutions to ensure privacy and trust in the digital world.
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
Eve Maler, VP Innovation & Emerging Technology, ForgeRock:
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and people
have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are
recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. The
User-Managed Access (UMA) standard and ForgeRock’s OpenUMA project are stepping into the
breach to give individuals a convenient central hub for proactively authorizing who and what can get
access to their personal data and content.
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
OLIVER STAMPFLI, SECURITY ARCHITECT IDENTITY & ACCESS MANAGEMENT, SWISSCOM
JENS SONNENTRÜCKER, HEAD OF IDENTITY ACCESS MANAGEMENT & GOVERNANCE, SWISSCOM
The goal for Swisscom was to be able to offer one ID Broker for all services, so that subscribers essentially would be able to “Bring Your Own Identity” (BYOI). If not done this way, each application or service offered by Swisscom would have required a connection with each IDP. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for the customer base, while also increasing sharing options across service offerings.
2015 Identity Summit - Tale of Two Views: B2C vs. B2EForgeRock
With Floris Van Den Dool, Managing Director Information Security Services Europe, Africa and Latin America, Accenture.
Find out what the major dynamics and differences between these two identity use cases are, what’s really important to each, what’s really not! We’ll also cover what are the implications of design decisions (i.e. social authN, identity analytics) and if a customer can really use a single IAM platform to enable both use cases. Throughout the discussion, we’ll highlight what are the noteworthy benefits for ForgeRock Partners, ForgeRock Customers and ForgeRock Customers’ Customers
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’ForgeRock
Today, CIOs, CDOs and CISOs are collaborating on new revenue generating projects that would have seemed impossible a few years ago. Technology is changing how we do business; as IT professionals, we must rethink how we select and use technology to serve our customers. In this talk, Mike will discuss the digital transformation and how identity management in particular plays a critical role in providing more secure and personalized services to our customers.
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
DANIEL RASKIN, VP STRATEGY & MARKETING, FORGEROCK
Every digital initiative requires identity. Whether it be IoT, Cloud, Mobile, or Enterprise initiatives, identity is required. Identity is also more than security. It is a core differentiator that uses identity attributes and context to transform how people engage your business. A foundational element of digital services, identity management can help you to improve customer engagement, drive a seamless omnichannel experience and reach new market segments. Building on Mike’s opening session, Daniel will outline how to re-think your company’s “Return on Identity” strategy to be customer-focused and capable of satisfying the emerging requirements of the digital transformation age.
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...ForgeRock
Today, CIOs, CDOs and CISOs are collaborating on new revenue-generating projects that would have seemed impossible a few years ago. Technology is changing how we do business; as IT professionals, we must rethink how we select and use technology to serve our customers. In this talk, Mike will discuss the digital transformation and how identity management in particular plays a critical role in providing more secure and personalized services to our customers.
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)ForgeRock
Mike Ellis, CEO ForgeRock's keynote at the Identity Summit 2015: Using Identity to Empower CIOs.
Today, CIOs, CDOs and CISOs are collaborating on new revenue-generating projects that would have seemed impossible a few years ago. Technology is changing how we do business; as IT professionals, we must rethink how we select and use technology to serve our customers. In this talk, Mike will discuss the digital transformation and how identity management in particular plays a critical role in providing more secure and personalized services to our customers.
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
With Markus Weber, Sr. Manager, Product Marketing, ForgeRock.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and people have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. In this session, learn about the User-Managed-Access (UMA) standard, ForgeRock’s OpenUMA project and how ForgeRock is developing solutions to ensure privacy and trust in the digital world.
Lasse Andresen, CTO and Founder, ForgeRock
A technology preview from our CTO office. Presentation looks at the Innovation coming out of ForgeRock Labs including the IoT SmartCity demonstration.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Identity Summit 2015: Connect.gov and Identity Management SystemsForgeRock
This session will concentrate on the Connect.gov cloud service, a federated identity effort being led by the United States Postal Service (USPS) and the benefits of this program to the federal agencies and to Identity Providers. We will discuss the technology behind Connect.gov service, and how the NSTIC guidelines and requirements were met by it.
In addition, we will cover how demands for pre-integration with popular identity and access management (IAM) platforms were met, addressing the U.S. Federal Identity, Credential and Access Management program (FICAM) requirements. In particular, the use case where ForgeRock IAM platform was integrated with Connect.Gov for managing user access to online government services will be described.
2015 Identity Summit - OpenAM: Friends with benefitsForgeRock
Daniel del Hoyo, Software Engineer, Zalando
Mihai Dumitrescu, Software Engineer, Zalando
Rob Ojevaar, IAM Architect, Zalando
Zalando is a publicly traded e-commerce company with more than 16 million active
customers in 15 European markets. These customers speak many different languages, have
different tastes in products and styles, prefer different payment and shipping methods—and
require non-stop innovation. Until very recently, our focus on identity and access management has been somewhat unclear—leading to inconsistencies that our explosive growth couldn’t sustain indefinitely. With the adoption of a tech management strategy called Radical Agility, which emphasizes autonomy and trust, we’ve not only rethought the way we build our systems, but also changed our perception of IAM. Following the motto “You build it, you run it,” our newly formed, autonomous teams are now responsible end-to-end for their own applications – which means they are also entrusted with securing them.
In this talk, Zalando software engineers Daniel del Hoyo, Mihai-Aurelian Dumitrescu and
Everett architect Rob Ojevaar will talk about how Zalando is transitioning to a cloud-based
infrastructure that allows growing flexibility and abstraction. They’ll discuss how their team is
supporting IAM to maximize stability and versatility. They will demonstrate how Narwhal,
Zalando’s API framework for OpenAM, can help to solve challenges such as providing a
stable interface during updates to the ForgeRock stack. Finally, they will demonstrate how Unicorn, a Zalando’s user-oriented interface, has helped the engineering team to use and
explain OpenAM and identity management to recruiters, customer care agents and other non-technical users - making the myth reality.
2015 Identity Summit - The Identity Broker as Driver for GrowthForgeRock
With Jens Sonnentrücker, Head of Identity Access Management & Governance, Swisscom
and
Benjamin Matei, Security Consultant for IAM, Swisscom
One of the most famous brands and by far the biggest telco provider in Switzerland, Swisscom takes a very pro-active approach to security and creating a trusting environment for its customers. Because Swisscom provides such a broad range of services – landline and mobile phone, mobile payments, cloud data hosting, health records storage and so much more – it required powerful Identity and Access Management (IAM) capabilities. The company’s security vision and overall goal was all about data protection, privacy and sharing, yet also to give subscribers the power to determine what to share, with whom and through the channel of their choice. To implement this vision, the company built out its own Swisscom Cloud architecture with an Identity Broker (IDB) component powered by ForgeRock technologies. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for its customer base, while also increasing sharing options across service offerings.
Identity Summit 2015: 2Keys Canadian Digital Identity ForgeRock
2Keys provides IAM services to Canadian governments and financial institutions. This talk will cover recent progress in the use of identity attributes to provide secure access for external users to entitlements and on line services using ForgeRock technologies, as well as recent developments at the Digital ID and Authentication of Council of Canada (DIACC).
Digital Consent: Taking UMA from Concept to RealityForgeRock
Digital consent and privacy is a hot topic among governments and enterprises globally. As digital technology is used more and more to engage customers and citizens, proactively providing digital sharing controls has become essential. For the past few years there has been a strong focus on building a common standard, User-Managed Access (UMA), to manage privacy and consent. Now that the standard is complete, the next phase will be around implementation and adoption. In this session, Eve will preview how ForgeRock is implementing UMA.
With:
Eve Maler, VP Innovation & Emerging Technology, ForgeRock
McKesson Case Study: Pharmacy Systems & AutomationForgeRock
Patrick Stromberg, Architect, Pharmacy Systems and Automation, McKesson
Alexey Shmelkin, CISSP, Senior Security Architect, Information Security
Architecture and Services, McKesson
Following a brief update on the usage of ForgeRock products within McKesson, this session will
provide an overview of the integration between EnterpriseRx, a pharmacy management system, and
ForgeRock products. We will cover the challenges specific to the business domain along with a look
at how we got here and where we’re going. The challenges are interesting in that they deal with a
large number of customers, a native (non-browser) client and limited information about end-users.
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
At HIMSS 2015 Kantara Initiative will focus on the User Managed Access (UMA) initiative with a networking breakfast held on April 15th sponsored by ForgeRock and MedAllies. More information about HIMSS15 and registration.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.ForgeRock
As security threats become more sophisticated and the network security perimeter falls to an identity based solution, it becomes critical to centralize the identity services function in order to apply expert knowledge to combat these attacks. At the same time, corporations are constantly acquiring new companies that have their own, often insecure, identity solutions that need to be addressed in a timely manner. Trying to assimilate all these acquisitions into a single corporate identity namespace is not tenable from a time-frame perspective. One solution is to support multi-tenancy within the enterprise to allow these acquisitions, or even disparate groups within the enterprise, to have their “own” identity solution that is centrally managed and protected. This talk will explore the rationale and projected path for multi-tenancy within AOL.
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...ForgeRock
EnerNOC is a leading provider of cloud-based energy intelligence software (EIS) and services to thousands of enterprise customers and utilities globally. The company is experiencing rapid growth worldwide which has generated new IAM requirements including: federation (external customers, internal acquisitions), strong authentication, delegated administration, user growth (up to millions of users), financial data access, fine grained access, efficient user provisioning and web services security. This presentation will cover the IAM roadmap, the hybrid authentication and authorization solution necessary during the transformation, the use of ForgeRock supported federation and single sign-on capabilities, the approach to EnerNOC’s complex authorization model, enabling automated system deployment and testing and AWS deployment considerations.
Winning with GDPR: How to Win Customer Loyalty and TrustForgeRock
New research by ForgeRock and MyCustomer has revealed that customer trust, and their willingness to share data, is being harmed by the poor quality of digital experiences. So how can your organisation break this cycle? Customer Insights Expert, Paul Laughlin and Doug Norton-Bilsby, Global VP of Retail and Consumer Products at ForgeRock discuss.
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Today it's all about the customer. And right after customer focused initiatives, business and technology leaders are prioritising the ability to improve innovation. They know that the disruptions they face in the age of the customer will not be addressed with business as usual. Innovation has been elevated to an initiative, which means that executives are focused on it.
Identity and IoT are the first steps to be taken to ensure that the initiatives are pivotal in their success. Being able to verify identity - both of people and of things - is critical for the IoT: Are they real? Are they who they say they are? Where are they? What are they able to do? While machines do not care about privacy, they - and their owners and operators - do care about who is able to program, operate, or control them.
In this presentation, Tim Sheedy will discuss how organisations are tackling the challenges of the IoT and customer first initiatives and how identity is playing an ever-increasing role in their success.
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
In this webinar, learn how the ForgeRock Identity Platform and its new User-Managed Access capabilities make it easier for organizations to establish trusted digital relationships with customers, embrace IoT initiatives, and address rapidly changing data privacy regulations.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Lasse Andresen, CTO and Founder, ForgeRock
A technology preview from our CTO office. Presentation looks at the Innovation coming out of ForgeRock Labs including the IoT SmartCity demonstration.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Identity Summit 2015: Connect.gov and Identity Management SystemsForgeRock
This session will concentrate on the Connect.gov cloud service, a federated identity effort being led by the United States Postal Service (USPS) and the benefits of this program to the federal agencies and to Identity Providers. We will discuss the technology behind Connect.gov service, and how the NSTIC guidelines and requirements were met by it.
In addition, we will cover how demands for pre-integration with popular identity and access management (IAM) platforms were met, addressing the U.S. Federal Identity, Credential and Access Management program (FICAM) requirements. In particular, the use case where ForgeRock IAM platform was integrated with Connect.Gov for managing user access to online government services will be described.
2015 Identity Summit - OpenAM: Friends with benefitsForgeRock
Daniel del Hoyo, Software Engineer, Zalando
Mihai Dumitrescu, Software Engineer, Zalando
Rob Ojevaar, IAM Architect, Zalando
Zalando is a publicly traded e-commerce company with more than 16 million active
customers in 15 European markets. These customers speak many different languages, have
different tastes in products and styles, prefer different payment and shipping methods—and
require non-stop innovation. Until very recently, our focus on identity and access management has been somewhat unclear—leading to inconsistencies that our explosive growth couldn’t sustain indefinitely. With the adoption of a tech management strategy called Radical Agility, which emphasizes autonomy and trust, we’ve not only rethought the way we build our systems, but also changed our perception of IAM. Following the motto “You build it, you run it,” our newly formed, autonomous teams are now responsible end-to-end for their own applications – which means they are also entrusted with securing them.
In this talk, Zalando software engineers Daniel del Hoyo, Mihai-Aurelian Dumitrescu and
Everett architect Rob Ojevaar will talk about how Zalando is transitioning to a cloud-based
infrastructure that allows growing flexibility and abstraction. They’ll discuss how their team is
supporting IAM to maximize stability and versatility. They will demonstrate how Narwhal,
Zalando’s API framework for OpenAM, can help to solve challenges such as providing a
stable interface during updates to the ForgeRock stack. Finally, they will demonstrate how Unicorn, a Zalando’s user-oriented interface, has helped the engineering team to use and
explain OpenAM and identity management to recruiters, customer care agents and other non-technical users - making the myth reality.
2015 Identity Summit - The Identity Broker as Driver for GrowthForgeRock
With Jens Sonnentrücker, Head of Identity Access Management & Governance, Swisscom
and
Benjamin Matei, Security Consultant for IAM, Swisscom
One of the most famous brands and by far the biggest telco provider in Switzerland, Swisscom takes a very pro-active approach to security and creating a trusting environment for its customers. Because Swisscom provides such a broad range of services – landline and mobile phone, mobile payments, cloud data hosting, health records storage and so much more – it required powerful Identity and Access Management (IAM) capabilities. The company’s security vision and overall goal was all about data protection, privacy and sharing, yet also to give subscribers the power to determine what to share, with whom and through the channel of their choice. To implement this vision, the company built out its own Swisscom Cloud architecture with an Identity Broker (IDB) component powered by ForgeRock technologies. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for its customer base, while also increasing sharing options across service offerings.
Identity Summit 2015: 2Keys Canadian Digital Identity ForgeRock
2Keys provides IAM services to Canadian governments and financial institutions. This talk will cover recent progress in the use of identity attributes to provide secure access for external users to entitlements and on line services using ForgeRock technologies, as well as recent developments at the Digital ID and Authentication of Council of Canada (DIACC).
Digital Consent: Taking UMA from Concept to RealityForgeRock
Digital consent and privacy is a hot topic among governments and enterprises globally. As digital technology is used more and more to engage customers and citizens, proactively providing digital sharing controls has become essential. For the past few years there has been a strong focus on building a common standard, User-Managed Access (UMA), to manage privacy and consent. Now that the standard is complete, the next phase will be around implementation and adoption. In this session, Eve will preview how ForgeRock is implementing UMA.
With:
Eve Maler, VP Innovation & Emerging Technology, ForgeRock
McKesson Case Study: Pharmacy Systems & AutomationForgeRock
Patrick Stromberg, Architect, Pharmacy Systems and Automation, McKesson
Alexey Shmelkin, CISSP, Senior Security Architect, Information Security
Architecture and Services, McKesson
Following a brief update on the usage of ForgeRock products within McKesson, this session will
provide an overview of the integration between EnterpriseRx, a pharmacy management system, and
ForgeRock products. We will cover the challenges specific to the business domain along with a look
at how we got here and where we’re going. The challenges are interesting in that they deal with a
large number of customers, a native (non-browser) client and limited information about end-users.
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
At HIMSS 2015 Kantara Initiative will focus on the User Managed Access (UMA) initiative with a networking breakfast held on April 15th sponsored by ForgeRock and MedAllies. More information about HIMSS15 and registration.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.ForgeRock
As security threats become more sophisticated and the network security perimeter falls to an identity based solution, it becomes critical to centralize the identity services function in order to apply expert knowledge to combat these attacks. At the same time, corporations are constantly acquiring new companies that have their own, often insecure, identity solutions that need to be addressed in a timely manner. Trying to assimilate all these acquisitions into a single corporate identity namespace is not tenable from a time-frame perspective. One solution is to support multi-tenancy within the enterprise to allow these acquisitions, or even disparate groups within the enterprise, to have their “own” identity solution that is centrally managed and protected. This talk will explore the rationale and projected path for multi-tenancy within AOL.
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...ForgeRock
EnerNOC is a leading provider of cloud-based energy intelligence software (EIS) and services to thousands of enterprise customers and utilities globally. The company is experiencing rapid growth worldwide which has generated new IAM requirements including: federation (external customers, internal acquisitions), strong authentication, delegated administration, user growth (up to millions of users), financial data access, fine grained access, efficient user provisioning and web services security. This presentation will cover the IAM roadmap, the hybrid authentication and authorization solution necessary during the transformation, the use of ForgeRock supported federation and single sign-on capabilities, the approach to EnerNOC’s complex authorization model, enabling automated system deployment and testing and AWS deployment considerations.
Winning with GDPR: How to Win Customer Loyalty and TrustForgeRock
New research by ForgeRock and MyCustomer has revealed that customer trust, and their willingness to share data, is being harmed by the poor quality of digital experiences. So how can your organisation break this cycle? Customer Insights Expert, Paul Laughlin and Doug Norton-Bilsby, Global VP of Retail and Consumer Products at ForgeRock discuss.
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Today it's all about the customer. And right after customer focused initiatives, business and technology leaders are prioritising the ability to improve innovation. They know that the disruptions they face in the age of the customer will not be addressed with business as usual. Innovation has been elevated to an initiative, which means that executives are focused on it.
Identity and IoT are the first steps to be taken to ensure that the initiatives are pivotal in their success. Being able to verify identity - both of people and of things - is critical for the IoT: Are they real? Are they who they say they are? Where are they? What are they able to do? While machines do not care about privacy, they - and their owners and operators - do care about who is able to program, operate, or control them.
In this presentation, Tim Sheedy will discuss how organisations are tackling the challenges of the IoT and customer first initiatives and how identity is playing an ever-increasing role in their success.
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
In this webinar, learn how the ForgeRock Identity Platform and its new User-Managed Access capabilities make it easier for organizations to establish trusted digital relationships with customers, embrace IoT initiatives, and address rapidly changing data privacy regulations.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...Data Con LA
Security is ubiquitous and integral throughout the entire lifecycle of an application right from the design and implementation to deployment and operations. Whether you build software for enterprises, mobile, or internal microservices, security is important. To that end, Identity and access management is the key to the security and the software infrastructure.Establishing user's identities before they can access resources is a key security requirement when building software applications and the capability of enabling single-sign-on would be a desirable feature. For Identity and Access Management Standards like SAML, OIDC, and SPIFFE help us solve identity and authentication which answers the most important question of "who you are". Security is best delegated as no one wants to re-invent the wheel, so for Identity Management Keycloak which is an open source product helps us achieve our Identity management solutions. Keycloak is an identity provider that creates, maintains, and manages identity information for principals while providing authentication services to relying applications within a federation or distributed network. This talk will walk through how we are using Keycloak to achieve solve the IAM security in Vantage which is our Data Analytics Platform and how we are achieving single-sign-on which is one of the most desirable side effects of Identity Management which will help users gain access control for multiple related and independent software systems in a seamless manner.
The Road to Intelligent Authentication JourneysForgeRock
The pressure is on. You need to build a great customer login experience that is secure but doesn’t burden your customers with complicated password requirements. But wait, there’s more – you also need to personalize the login experience and provide metrics back to the business. Legacy authentication has you boxed in. What are you to do? Solutions like multi-factor authentication (MFA) are replacing traditional login methods but its limitations are often static and offer up inconsistent customer experiences, leading to abandonment. Organizations need an intelligent authentication approach that strikes a balance between usability, security, and customer choice. In this webcast you will learn what Intelligent Authentication is and how it enables you to: Easily configure, measure, and adjust login journeys using digital signals including device, contextual, behavioral, user choice, and risk-based factors Leverage user login analytics to increase user adoption rates, and improve the customer experience Automatically redirect suspicious users for further monitoring Quickly consume out-of-the-box authenticators, utilize existing authenticators, and integrate with cyber security solutions — all in one place
Cyber 101: An introduction to privileged access managementseadeloitte
Gartner has named privileged access management the #1 cyber security priority for organisations. But what exactly does privileged access management entail?
2015 Identity Summit: How to Maximize Return on Identity in a Brave New WorldForgeRock
With Daniel Raskin, VP Strategy and Marketing, ForgeRock.
Every digital initiative requires identity. Whether it be an IoT, cloud, mobile, or enterprise initiative, identity is required. Identity is also more than security. It is a core differentiator that uses identity attributes and context to transform how people engage your business. A foundational element of digital services, identity management can help you to improve customer engagement, drive a seamless omnichannel experience and reach new market segments. Building on Mike’s opening session, Daniel will outline how to re-think your company's "Return on Identity" strategy to be customer-focused and capable of satisfying the emerging requirements of the digital transformation age.
Are you struggling to keep up with the evolving digital marketing landscape?
That’s where marketing technology – or MarTech – comes in. The right MarTech tools can help you automate tasks and streamline your workflow for better performance.
But how do you upgrade your MarTech stack to ensure you’re maximizing campaign effectiveness?
In this webinar, we’ll walk you through some of the leading tools and solutions you should consider including in your MarTech stack for 2023 and beyond.
Join iQuanti’s Vishal Maru, VP of Digital Solutions and Shaubhik Ray, Senior Director of Digital Analytics, as well as Tealium’s Josh Wolf, Director of Partner Solutions Consulting, as they discuss the implications, pros, and cons of the leading MarTech platforms.
Key Takeaways:
- How the MarTech landscape has evolved.
- Key considerations while selecting tools for your MarTech stack.
- Framework to assess your MarTech maturity.
The market is changing faster than ever, so make sure you don’t get left behind.
Not only is Artificial Intelligence and Machine Learning (AI/ML) becoming more mainstream in marketing, but new media such as over-the-top (OTT) and short-form video are also gaining traction – not to mention new privacy regulations, third-party cookie departure, Apple’s App Tracking Transparency (ATT) feature, and the launch of Google Analytics 4 (GA4).
Watch now and get the latest insights to inform your marketing strategy.
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
Identity on the Internet is changing. Social networking has kicked off a massive change in how we integrate identity across applications. This is much more than a simple redesign of security tokens and protocols; instead it is a radical redistribution of power and control over entitlements, shifting it away from the centralized control of a cabal of directory engineers and out to the users themselves.
There are compelling reasons for this shift: it enables scaling of identity administration, and it promotes rapid and agile integration of applications. These are goals shared by the enterprise, but this change has significant implications on infrastructure, people and process. Join us to learn how you can bring modern identity management into the enterprise.
E-Lock AdaptAuth is an AI-powered, Adaptive, Multi-factor Authentication solution that provides an advanced layer of protection in the form of Adaptive MFA. Adaptive authentication utilizes information such as IP addresses, geo-locations, device signatures and user behavior patterns to assess the risk and accordingly adapts the authentication flow.This is achieved by building a risk profile for every user by analyzing past authentication attempts and behavioral patterns. The extent of deviation from such patterns invokes additional MFA factors until desired levels of identity assurance are achieved.
Capabilities provided by AdaptAuth:
Basic Authentication
Two-factor authentication- App based OTP, Email/SMS OTP, Digital Certificate, Fingerprint, FIDO2 authentication
Multi-factor Authentication
Adaptive Authentication
Single-Sign on
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
Please join us as we discuss the need for advanced authentication for Mainframe, as well as any concerns and expectations surrounding its use.
For more information, please visit http://cainc.to/Nv2VOe
As the confluence of several mature and emerging technologies, the Internet of Things (IoT) is rapidly developing into a vibrant new marketplace. What are important considerations for technology, media, and telecom (TMT) companies as they compete for opportunities? This presentation covers:
• Questions TMT executives should be asking about impacts of IoT technologies, performance improvement opportunities, and where value can be generated.
• Building an IoT ecosystem where all players benefit – defining different players' roles and relationships, and already-successful tactics.
• Security and privacy challenges, including how data protection responsibility is assigned and monitored, and defining appropriate security and privacy standards.
Explore this quickly developing new opportunity for TMT companies.
Get more IoT insights: http://www.deloitte.com/us/iot_ecosystem
Don’t fear Shadow IT, it offers great value to the organization. IT needs to work to minimize the any possible negative impact from security risks and spend control challenges. Learn how to provide users a “carrot” without the “stick” through an approved marketplace for purchasing public cloud. At the same time, you give IT the visibility and traceability to manage security and costs.
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
Containerized IAM on AWS and Beyond
The do’s and don’ts of running containerized Identity systems in the cloud and what it’s like to run and operate this type of solution
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
Containerized IAM on Amazon Web Services - Deep Dive
A deep technical look at the architecture behind running containerized IAM on AWS and what your team needs for a successful deployment
You’ll experience an in depth review of:
Assets and processes needed to containerize ForgeRock
Architecture and processes guiding containerized IAM on AWS
How containers are deployed into Kubernetes
Monitoring and management strategies
Continuous integration configuration
Applying Innovative Tools for GDPR SuccessForgeRock
The GDPR's enforcement date is finally around the corner: May 25th. Have you successfully conceived of this groundbreaking EU regulation as a business opportunity? Have you addressed the challenges of both compliance and customer trust in a more comprehensive fashion? In this webcast, ForgeRock experts Nick Caley, VP of Financial and Regulatory, and Eve Maler, VP of Innovation and Emerging Technology, and Carlos Scott, Digital Risk Consultant will:
Discuss the GDPR in the context of regulatory compliance, digital innovation, and "ripped from the headlines" tensions in consumer trust and the personal data economy
Describe important privacy, consent, and trust innovations made in recent times, including in the standards world (OAuth, UMA, and more)
Demonstrate capabilities of the ForgeRock Identity Platform that address GDPR requirements, including a Profile and Privacy Management dashboard
Identity Live in Austin 2018 keynote presentation
Presenters:
Hermann Wimmer, Chief Revenue Officer & Global Field Operations, ForgeRock
Steve Ferris, SVP, Global Customer Success and Co-Founder, ForgeRock
Peter Barker, EVP & Chief Product Officer, ForgeRock
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
Presented by Stein Myrseth, Senior Technology Solutions Director of ForgeRock and Gerhard Zehethofer, VP or Industries (IOT & Manufacturing) present at Identity Live in Austin in 2018
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Abstract: Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and the EU Data Protection regulatory regime is shifting in response. Providing genuine and free choice in consented personal data sharing will no longer be optional – but fortunately, enabling consumer-controlled data sharing from cloud, mobile, and IoT sources is also good for your digitally transformed business. In this session, learn about how ForgeRock’s new solution based on the User-Managed Access (UMA) standard builds trust and strengthens privacy in the digital world.
Great, your organization is ready for digital transformation so you can achieve breakthrough growth or other key metrics.
Even if you manufacture outdoor clothing, it’s not a world solely of atoms anymore. Bits matter.
Your customers want to know how you can enable smart tracking of fitness and location through your products.
Your supply chain partners increasingly connect through APIs.
Your IT processes shifted off paper long ago.
So: Are you ready for all of the implications of digital transformation on your handling of personal data and how this affects both your customer relationships and your mitigation of risk?
----
Image source: https://www.flickr.com/photos/48746111@N04/4466093934 | CC BY-SA 2.0
With thanks to Jon Neiditz:
The Safe Harbor provision just died, demonstrating that…
Surveillance – which we can no longer deny exists – overrides traditional permitted bases for data transfer, leaving us to conclude that…
Individual consent, in the sense signaled by the forthcoming EU GDPR, will become the only bulletproof basis for international data transfer
Image sources:
http://www.abigailsconcierge.com/visitors-to-gig-harbor
http://odditymall.com/scary-peeper-a-peeping-tom-figurine-to-scare-people
http://www.zfi-inc.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/0/0/0000763_executive-bulletproof-vest-protection-level-iii-a-made-by-marom-dolphin.jpeg
It’s not just about websites and web and mobile apps scraping personal information. Especially when it comes to the Internet of things, It’s also about the sheer number of data sources, the inability to limit collection, and the inability to manage consenting to collection one by one. You can’t keep clicking “I agree” every time your smart socks want to record a heel strike. People will have to get ahead of the curve – and they might actually want to share that data, but only with personal trainers, doctors, and third-party marathon training apps. But then we have the problem of interoperability. The smarthomedb.com site currently lists reviews of OVER A HUNDRED different companies serving the consumer IoT market already, in 36 product categories.
It’s emerging technology that mitigates risk of consent and data protection regulation like nothing else can
If you’re trying to deliver online financial services, to support small businesses or tax reporting, these scenarios are filled with requirements and opportunities for delegating access to others. An employee wants to give her accountant access to her last year’s earnings statement, or a sole proprietor wants to give his contract bookkeeper selective access to some accounts.
Recently we saw a story in the news about Audi enabling package delivery to parked unattended cars. Any car with an API could have that, if car owners could selectively enable access by others.
Citizens traveling across borders and those trying to access government services often have reason to authorize access by others to attributes about them, such as their financial status, to enable access to government services. This shouldn’t just be a matter of passive consent; it could be a matter of a long-running relationship.
Why is the AirBnB logo here? Imagine that you have a house chock-full of smart light bulbs and kitchen appliances made by different manufacturers. You’ve set them all up to work the way you want. Now you leave for a week, and you rent your place out through AirBnB. You want to give partial access to a partially trusted stranger, but only for a week! And then you want all the entitlements to expire. You’d better be able to do this conveniently from a single console.
Patient-centric, RESTful health data sharing is the focus of the demonstration we’ll show next.
Show recorded video (can be downloaded from here: https://drive.google.com/open?id=0B5Q4evmm_OOCN050RWtGSFhnV3c&authuser=0 )
The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
ForgeRock leads the industry in identity research, development, and solutions that put the customer at the center of your business. We have been moving aggressively to build innovative consumer-focused access management and privacy solutions based on the newly completed User-Managed Access (UMA) Version 1.0 standard, an effort led by our own Eve Maler, VP of Innovation and Emerging Technology in the ForgeRock office of the CTO. UMA was designed to give an individual a unified control point for authorizing who and what can get access to his or her personal data (such as contact information), content (such as health records), and services (such as access to a fitness API), no matter where the data lives online.