SlideShare a Scribd company logo
1 of 34
Download to read offline
Kantara Initiative
The Next Evolution of Identity
and Access Management for the
Internet of Everything
Identity Relationship
Management
IRM Landscape
The IRM Story
Evolution of Identity
Employees
Consumers
Employees &
Partners
Things
Perimeter
Perimeter
Federation
Perimeter-less
Federation
Cloud / SaaS
Perimeter-less
Federation
Cloud
SaaS
Mobility
Attributes
Context
Stateless
Relationships
Identity Relationship
Management
l  Model for managing a company’s interactions
with current and future customers and
“things” using Identity and Access
Management (IAM).
l  IRM rapidly and cost effectively unleashes
new business opportunities that drive next
generation consumer-facing services and top
line revenue.
Pillars of Identity Relationship
Management …
CONSUMERS & THINGS over employees
ADAPTABLE over predictable
REVENUE over operating expense
VELOCITY over process and tools
INTERNET SCALE over enterprise scale
DYNAMIC over static intelligence
BORDERLESS over perimeter
MODULAR over monolithic
BUSINESS PILLARS TECHNICAL PILLARS
=
=
=
=
CONSUMERS & THINGS
over employees only
INTERNET SCALE
over enterprise scale
ADAPTABLE
over predictable
DYNAMIC INTELLIGENCE
over static intelligence
TOP LINE REVENUE
over operating expense
BORDERLESS
over perimeter
VELOCITY
over process and tools
MODULAR
over monolithic
The Next Generation of
Identity & Access
Management
What’s Next?
Tell us how you ‘do’ IRM!
Join the community
@
About Us
Kantara Initiative Overview
Who is Kantara
60+ Leading Organizations,
100’s of Participants, Industry
and Governments:
l  Trust
l  Privacy
l  Security
l  Community
Trustees At-Large:
•  Government of Canada
•  Trans-European Research
Education Networking Association
What We Do
The building blocks of
Trusted Identity…
So that you can
•  INFLUENCE
•  CONNECT
•  LEARN
•  PARTNER
•  SHARE
•  GROW
We provide
•  RULES
•  TOOLS
•  EXPERTS
Trusted Identity
l  Kantara Programs verify
l  IdPs and Assessors
l  Policy, Technology, Privacy
l  Reusable program applicable to
l  FICAM, FCCX, NSTIC, EU eIDAS,
IDAP, +
l  IdPs, RPs, FOs
l  Our part in the trust chain
Assurance Programs
For FICAM and FCCX
FICAM & FCCX
l  FICAM – Federal Identity Credential and
Access Management (Policy)
l  Connects citizens to public services leveraging
private sector Credential Service Providers
l  Kantara Operates Certification Program – Trust
Framework Provider
l  FCCX – Federal Cloud Credential eXchange
(Implementation)
l  The technical identity hub that operates FICAM
l  Kantara Operates Certification Program – Trust
Framework Provider
FCCX: A better way
Ci#zens	
  
FCCX	
  
Agencies	
  
Trust Framework Model
Registration
Verification
Assessment
Certification
Trust Status
Listing Service
Interested
Parties
Kantara Trust Registry
Accredited and Approved
IDPV Component Recognition
Registered Applicant
organizations in
pipeline
Kantara Accredited to LoA 1-4 Kantara Approved to LoA 1-3 non-crpyto
USAA
Component Services
Responding to industry
experts Kantara
members developed
the modular component
service approach.
Component Services:
•  Identity Proofing /
Verification
•  Credential Issuance
and Management
Identity
Proofing &
Verification
Organizational
Trust
Credential &
Token
Management
Credential
Service
Provider
MODULAR Assurance
CONTEXTUAL Assurance
ADAPTABLE Assurance
BORDERLESS Assurance
Thanks!
Questions?
• Kantara Executive Director: Joni Brennan joni@kantarainitiative.org
• General Inquiries: support@kantarainitiative.org
JOIN INNOVATE TRUST

More Related Content

What's hot

Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Mydex CIC
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Andrew Hughes
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
 
Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity ForgeRock
 
Iiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinalIiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinalMaryIIW
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...UK Government Digital Service
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CloudIDSummit
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity managementshivan82
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017Guy Huntington
 
Disruptive Insurance Product Innovation Using IoT in Healthcare
Disruptive Insurance Product Innovation Using IoT in HealthcareDisruptive Insurance Product Innovation Using IoT in Healthcare
Disruptive Insurance Product Innovation Using IoT in HealthcareAmazon Web Services
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...Priyanka Aash
 

What's hot (20)

Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity
 
Iiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinalIiw east openidentityforopengovfinal
Iiw east openidentityforopengovfinal
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017
 
Disruptive Insurance Product Innovation Using IoT in Healthcare
Disruptive Insurance Product Innovation Using IoT in HealthcareDisruptive Insurance Product Innovation Using IoT in Healthcare
Disruptive Insurance Product Innovation Using IoT in Healthcare
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
 

Viewers also liked

IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...ForgeRock
 
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...NordForsk
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
 
Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionForgeRock
 
РИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех лет
РИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех летРИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех лет
РИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех летТарасов Константин
 
Prezentare Devworld
Prezentare DevworldPrezentare Devworld
Prezentare Devworldalecs_stan
 
Introduction to Animal Rights - Gary Francione
Introduction to Animal Rights - Gary FrancioneIntroduction to Animal Rights - Gary Francione
Introduction to Animal Rights - Gary Francioneanimalrightsadvocates
 
Meeting the needs of students with SEBD: some challenges about current practi...
Meeting the needs of students with SEBD:some challenges about current practi...Meeting the needs of students with SEBD:some challenges about current practi...
Meeting the needs of students with SEBD: some challenges about current practi...The University of Northampton
 
РИФ 2016, По ту сторону баррикад. Интернет для b2b
РИФ 2016, По ту сторону баррикад. Интернет для b2bРИФ 2016, По ту сторону баррикад. Интернет для b2b
РИФ 2016, По ту сторону баррикад. Интернет для b2bТарасов Константин
 
РИФ 2016, ERGO: Развитие агентской сети в онлайне
РИФ 2016, ERGO: Развитие агентской сети в онлайнеРИФ 2016, ERGO: Развитие агентской сети в онлайне
РИФ 2016, ERGO: Развитие агентской сети в онлайнеТарасов Константин
 
Media Matters Bootcamp may 2012
Media Matters Bootcamp may 2012Media Matters Bootcamp may 2012
Media Matters Bootcamp may 2012Media Matters
 
Portfolio Selected Commissioned Work
Portfolio Selected Commissioned WorkPortfolio Selected Commissioned Work
Portfolio Selected Commissioned WorkWJW_Sculpture
 
РИФ 2016, Контент — плитки дороги к продаже
РИФ 2016, Контент — плитки дороги к продажеРИФ 2016, Контент — плитки дороги к продаже
РИФ 2016, Контент — плитки дороги к продажеТарасов Константин
 
Strangers in Night 6
Strangers in Night 6Strangers in Night 6
Strangers in Night 6Ben Rodier
 
РИФ 2016, Все об основных требованиях по информационной безопасности к бизнесу
РИФ 2016, Все об основных требованиях по информационной безопасности к бизнесуРИФ 2016, Все об основных требованиях по информационной безопасности к бизнесу
РИФ 2016, Все об основных требованиях по информационной безопасности к бизнесуТарасов Константин
 
Стратегия размещения на Яндекс Маркете с применением технологий
Стратегия размещения на Яндекс Маркете с применением технологийСтратегия размещения на Яндекс Маркете с применением технологий
Стратегия размещения на Яндекс Маркете с применением технологийТарасов Константин
 
РИФ 2016, Ведение международных рекламных кампаний в Европе и Азии
РИФ 2016, Ведение международных рекламных кампаний в Европе и АзииРИФ 2016, Ведение международных рекламных кампаний в Европе и Азии
РИФ 2016, Ведение международных рекламных кампаний в Европе и АзииТарасов Константин
 

Viewers also liked (20)

IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
 
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
Identity Relationship Management: The Community Revolution
Identity Relationship Management: The Community RevolutionIdentity Relationship Management: The Community Revolution
Identity Relationship Management: The Community Revolution
 
РИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех лет
РИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех летРИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех лет
РИФ 2016, Ульяновская «IT-движуха»: опыт, результаты четырех лет
 
Prezentare Devworld
Prezentare DevworldPrezentare Devworld
Prezentare Devworld
 
Introduction to Animal Rights - Gary Francione
Introduction to Animal Rights - Gary FrancioneIntroduction to Animal Rights - Gary Francione
Introduction to Animal Rights - Gary Francione
 
Meeting the needs of students with SEBD: some challenges about current practi...
Meeting the needs of students with SEBD:some challenges about current practi...Meeting the needs of students with SEBD:some challenges about current practi...
Meeting the needs of students with SEBD: some challenges about current practi...
 
РИФ 2016, По ту сторону баррикад. Интернет для b2b
РИФ 2016, По ту сторону баррикад. Интернет для b2bРИФ 2016, По ту сторону баррикад. Интернет для b2b
РИФ 2016, По ту сторону баррикад. Интернет для b2b
 
Coalition Reader
Coalition ReaderCoalition Reader
Coalition Reader
 
РИФ 2016, ERGO: Развитие агентской сети в онлайне
РИФ 2016, ERGO: Развитие агентской сети в онлайнеРИФ 2016, ERGO: Развитие агентской сети в онлайне
РИФ 2016, ERGO: Развитие агентской сети в онлайне
 
Media Matters Bootcamp may 2012
Media Matters Bootcamp may 2012Media Matters Bootcamp may 2012
Media Matters Bootcamp may 2012
 
Usability checklist
Usability checklistUsability checklist
Usability checklist
 
Portfolio Spring 2009
Portfolio Spring 2009Portfolio Spring 2009
Portfolio Spring 2009
 
Portfolio Selected Commissioned Work
Portfolio Selected Commissioned WorkPortfolio Selected Commissioned Work
Portfolio Selected Commissioned Work
 
РИФ 2016, Контент — плитки дороги к продаже
РИФ 2016, Контент — плитки дороги к продажеРИФ 2016, Контент — плитки дороги к продаже
РИФ 2016, Контент — плитки дороги к продаже
 
Strangers in Night 6
Strangers in Night 6Strangers in Night 6
Strangers in Night 6
 
РИФ 2016, Все об основных требованиях по информационной безопасности к бизнесу
РИФ 2016, Все об основных требованиях по информационной безопасности к бизнесуРИФ 2016, Все об основных требованиях по информационной безопасности к бизнесу
РИФ 2016, Все об основных требованиях по информационной безопасности к бизнесу
 
Стратегия размещения на Яндекс Маркете с применением технологий
Стратегия размещения на Яндекс Маркете с применением технологийСтратегия размещения на Яндекс Маркете с применением технологий
Стратегия размещения на Яндекс Маркете с применением технологий
 
РИФ 2016, Ведение международных рекламных кампаний в Европе и Азии
РИФ 2016, Ведение международных рекламных кампаний в Европе и АзииРИФ 2016, Ведение международных рекламных кампаний в Европе и Азии
РИФ 2016, Ведение международных рекламных кампаний в Европе и Азии
 

Similar to Kantara Initiative - Connecting a More Trustworthy Internet

LARION Computing - Software Outsourcing Services
LARION Computing - Software Outsourcing ServicesLARION Computing - Software Outsourcing Services
LARION Computing - Software Outsourcing ServicesEric Lai
 
Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Kellton Tech Solutions Ltd
 
ANTS - 360 view of your customer - bigdata innovation summit 2016
ANTS - 360 view of your customer - bigdata innovation summit 2016ANTS - 360 view of your customer - bigdata innovation summit 2016
ANTS - 360 view of your customer - bigdata innovation summit 2016Dinh Le Dat (Kevin D.)
 
INTERFACE, by apidays - From Monolith to Open Finance with APIs by Marcilio ...
INTERFACE, by apidays  - From Monolith to Open Finance with APIs by Marcilio ...INTERFACE, by apidays  - From Monolith to Open Finance with APIs by Marcilio ...
INTERFACE, by apidays - From Monolith to Open Finance with APIs by Marcilio ...apidays
 
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CloudIDSummit
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...apidays
 
Incedo - Corporate Overview
Incedo - Corporate OverviewIncedo - Corporate Overview
Incedo - Corporate Overviewtushar chhetri
 
Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.CCS Technologies (P) Ltd.
 
ValueLabs_Media & Entertainment.pdf
ValueLabs_Media & Entertainment.pdfValueLabs_Media & Entertainment.pdf
ValueLabs_Media & Entertainment.pdfAhmedSaeed267004
 
LoQutus & Renson: The road towards digital leadership
LoQutus & Renson: The road towards digital leadershipLoQutus & Renson: The road towards digital leadership
LoQutus & Renson: The road towards digital leadershipLoQutus
 
Automotive Solution Footprint
Automotive Solution FootprintAutomotive Solution Footprint
Automotive Solution FootprintMerino Services
 
How to Achieve World Class Customer Experience through Insightful IT
How to Achieve World Class Customer Experience through Insightful IT How to Achieve World Class Customer Experience through Insightful IT
How to Achieve World Class Customer Experience through Insightful IT Bobhallahan
 
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Dynatrace
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsHappiest Minds Technologies
 
IMTSedu Webinar: Focus on Customer Relationship Management
IMTSedu Webinar: Focus on Customer Relationship ManagementIMTSedu Webinar: Focus on Customer Relationship Management
IMTSedu Webinar: Focus on Customer Relationship ManagementAvideonCRM LLC
 

Similar to Kantara Initiative - Connecting a More Trustworthy Internet (20)

LARION Computing - Software Outsourcing Services
LARION Computing - Software Outsourcing ServicesLARION Computing - Software Outsourcing Services
LARION Computing - Software Outsourcing Services
 
Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?
 
Si corporate profile_v.5
Si corporate profile_v.5Si corporate profile_v.5
Si corporate profile_v.5
 
ANTS - 360 view of your customer - bigdata innovation summit 2016
ANTS - 360 view of your customer - bigdata innovation summit 2016ANTS - 360 view of your customer - bigdata innovation summit 2016
ANTS - 360 view of your customer - bigdata innovation summit 2016
 
INTERFACE, by apidays - From Monolith to Open Finance with APIs by Marcilio ...
INTERFACE, by apidays  - From Monolith to Open Finance with APIs by Marcilio ...INTERFACE, by apidays  - From Monolith to Open Finance with APIs by Marcilio ...
INTERFACE, by apidays - From Monolith to Open Finance with APIs by Marcilio ...
 
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
Saksoft Inc
Saksoft IncSaksoft Inc
Saksoft Inc
 
Incedo - Corporate Overview
Incedo - Corporate OverviewIncedo - Corporate Overview
Incedo - Corporate Overview
 
Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.
 
ValueLabs_Media & Entertainment.pdf
ValueLabs_Media & Entertainment.pdfValueLabs_Media & Entertainment.pdf
ValueLabs_Media & Entertainment.pdf
 
LoQutus & Renson: The road towards digital leadership
LoQutus & Renson: The road towards digital leadershipLoQutus & Renson: The road towards digital leadership
LoQutus & Renson: The road towards digital leadership
 
ATL Profile
ATL ProfileATL Profile
ATL Profile
 
Automotive Solution Footprint
Automotive Solution FootprintAutomotive Solution Footprint
Automotive Solution Footprint
 
How to build a digital insurance company
How to build a digital insurance companyHow to build a digital insurance company
How to build a digital insurance company
 
How to Achieve World Class Customer Experience through Insightful IT
How to Achieve World Class Customer Experience through Insightful IT How to Achieve World Class Customer Experience through Insightful IT
How to Achieve World Class Customer Experience through Insightful IT
 
SAP HANA IoT Platform
SAP HANA IoT PlatformSAP HANA IoT Platform
SAP HANA IoT Platform
 
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 
IMTSedu Webinar: Focus on Customer Relationship Management
IMTSedu Webinar: Focus on Customer Relationship ManagementIMTSedu Webinar: Focus on Customer Relationship Management
IMTSedu Webinar: Focus on Customer Relationship Management
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)kantarainitiative
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTkantarainitiative
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
The state of uma 2014 11-03
The state of uma 2014 11-03The state of uma 2014 11-03
The state of uma 2014 11-03
 
Laws of relationships v7
Laws of relationships v7Laws of relationships v7
Laws of relationships v7
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoT
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Kantara Initiative - Connecting a More Trustworthy Internet