SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Introduction
United States Department of Commerce
National Institute of Standards and Technology
Paul Grassi, CISSP
Senior Standards and Technology
Advisor, NSTIC
Information Technology Laboratory
1401 Constitution Ave. NW, Rm. 2069
Washington, DC 20230
W: 202.482.8349
M: 703.786.8275
Email: paul.grassi@nist.gov
Background	
  
Role	
  @	
  
NIST	
  
Approach	
  
Standards and Technology Landscape
Well-­‐rounded	
  pilots	
  hi<ng	
  diverse	
  user	
  set	
  
Government	
  adop@on	
  
Market	
  Discovery	
  
ADribute	
  Providers	
  
Internet	
  of	
  Things	
  
Consumer-­‐Centric	
  
Deployment	
  Costs	
  
Standards	
  Gaps	
  
Embedded	
  Privacy	
  
Iden@fica@on	
  of	
  policy	
  and	
  technical	
  overlays	
  
NSTIC	
  
Launch	
  
IDE	
  
Sustaining	
  
2012	
   2013	
   2014	
   2015	
  
Envision	
  It!?	
  
True	
  Interoperability	
  
NIST Coverage in Key Identity Services
Key	
  
No	
  coverage	
  
Par@al	
  coverage,	
  to	
  
include	
  other	
  D/A	
  
documenta@on	
  
Full	
  coverage	
  
Needs	
  refreshing	
  
Where We Will Focus in FY14/15
ü  Codify	
  privacy	
  
enhancing	
  profiles	
  
ü  Enhance/Establish	
  
‘standard’	
  to	
  
establish	
  confidence,	
  
trustworthiness,	
  and	
  
privacy	
  preserva@on	
  
(zero	
  knowledge,	
  
derived,	
  minimal	
  
disclosure)	
  
ü  Address	
  portability	
  of	
  
preferred	
  creden@als	
  
and	
  relying	
  party	
  
accounts	
  
ü  Revisit	
  and	
  retool	
  
exis@ng	
  standards	
  to	
  
address	
  current	
  
market	
  state	
  and	
  flex	
  
to	
  innova@on	
  
ü  Develop	
  new	
  
standards	
  that	
  
increase	
  IE	
  
par@cipa@on	
  
ü  Increase	
  par@cipa@on	
  
in	
  commercial	
  open	
  
standards	
  
ü  Mobility,	
  Cloud,	
  
Shared	
  Services	
  
ü  Simplify,	
  accelerate,	
  
and	
  reduce	
  the	
  cost	
  
of	
  ICAM	
  
implementa@ons	
  
ü  Focus	
  beyond	
  the	
  
PIV	
  
ü  Establish	
  RP	
  toolkits	
  
ü  Iden@fy	
  and	
  foster	
  
innova@on	
  from	
  
untapped	
  sources	
  
ü  Elevate	
  non-­‐person	
  
en@@es	
  into	
  the	
  
forefront	
  of	
  the	
  IDE/
ICAM	
  discussion	
  
ü  Non-­‐intrusive	
  
security	
  model	
  
ü  Con@nuous	
  
monitoring	
  and	
  
assessment	
  
Identity Assurance – What would you think if?
De-­‐coupled	
  proofing	
  strength	
  from	
  
authen@ca@on	
  strength?	
  
NIST	
  just	
  measured	
  authen@ca@on	
  
performance/strength/usability?	
  
Got	
  rid	
  of	
  LOA?	
  
What	
  else	
  could	
  we	
  do	
  to	
  turn	
  these	
  
docs	
  on	
  their	
  head	
  to	
  enhance	
  the	
  IE?	
  
Developed	
  private	
  sector	
  companion	
  
to	
  800-­‐63?	
  
Attributes – What Needs to Happen?
Iden@fy	
  and	
  establish	
  market-­‐enhancing	
  aDribute	
  best	
  prac@ces,	
  guidelines,	
  and	
  standards	
  to	
  
communicate	
  the	
  veracity	
  and	
  trustworthiness	
  of	
  aDributes	
  to	
  relying	
  par@es	
  or	
  iden@ty	
  and	
  
access	
  management	
  service	
  or	
  func@on.	
  
Meta-­‐
ADribute	
  
Confidence/
Assurance	
  
Liability	
  
Security	
  and	
  
Privacy	
  
Governance	
  
Exchange	
  
Informs	
  
Dependent	
  
Standards	
  
Performance	
  
Metrics	
  
Risk	
  Tolerance	
  
Market	
  
ADribute	
  
Registries	
  
Focal	
  
The Need for a Privacy Profile
BrokerAuthen@ca@on	
  Request	
  
Authen@ca@on	
  Request	
  
Response	
  +	
  
Encrypted	
  ADributes	
  
Double	
  Blind	
  
Architecture	
  
Relying	
  
Party	
  
CSP	
  
User	
  Consent	
  
ADribute	
  
Provider	
  
Response	
  +	
  
Encrypted	
  ADributes	
  
1	
   CSP/AP	
  can’t	
  know	
  the	
  RP	
  
2	
  
Broker	
  can’t	
  see	
  
the	
  a?ributes	
  
3	
   Standard	
  and	
  Protocol	
  AgnosBc	
  
4	
   RP	
  can’t	
  know	
  CSP	
  
5	
   Minimal	
  Changes	
  to	
  Infrastructure	
  
(but	
  we	
  may	
  soJen	
  this	
  requirement)	
  
Contact Information
United States Department of Commerce
National Institute of Standards and Technology
Paul Grassi, CISSP
Senior Standards and Technology
Advisor, NSTIC
Information Technology Laboratory
1401 Constitution Ave. NW, Rm. 2069
Washington, DC 20230
W: 202.482.8349
M: 703.786.8275
Email: paul.grassi@nist.gov

Más contenido relacionado

La actualidad más candente

7.Trust Management
7.Trust Management7.Trust Management
7.Trust Managementphanleson
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...NetworkCollaborators
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keystrueidentity
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 
Digital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityDigital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityForgeRock
 
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Copaco Nederland
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
 
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter networkCisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter networkNetworkCollaborators
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
 
PCMG IT Supply Chain Security
PCMG IT Supply Chain SecurityPCMG IT Supply Chain Security
PCMG IT Supply Chain SecurityJustin Bennett
 
A Perfect Enterprise Blockchain Development Partner
A Perfect Enterprise Blockchain Development PartnerA Perfect Enterprise Blockchain Development Partner
A Perfect Enterprise Blockchain Development PartnerSaratechnology
 
Mobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived CredentialsMobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived CredentialsMichael Queralt
 

La actualidad más candente (16)

7.Trust Management
7.Trust Management7.Trust Management
7.Trust Management
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Digital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityDigital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to Reality
 
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter networkCisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
PCMG IT Supply Chain Security
PCMG IT Supply Chain SecurityPCMG IT Supply Chain Security
PCMG IT Supply Chain Security
 
A Perfect Enterprise Blockchain Development Partner
A Perfect Enterprise Blockchain Development PartnerA Perfect Enterprise Blockchain Development Partner
A Perfect Enterprise Blockchain Development Partner
 
Mobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived CredentialsMobile Authentication Interoperability using FIDO for Derived Credentials
Mobile Authentication Interoperability using FIDO for Derived Credentials
 

Destacado

CIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCloudIDSummit
 
NIST Privacy Engineering Working Group - Risk Model
NIST Privacy Engineering Working Group  - Risk ModelNIST Privacy Engineering Working Group  - Risk Model
NIST Privacy Engineering Working Group - Risk ModelDavid Sweigert
 
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy WorldCIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy WorldCloudIDSummit
 
8pasos power asiento srirr lila
8pasos power  asiento srirr lila8pasos power  asiento srirr lila
8pasos power asiento srirr lilaimeldaroro
 
Mi biografi ana maria gomez giraldo
Mi biografi ana maria gomez giraldoMi biografi ana maria gomez giraldo
Mi biografi ana maria gomez giraldoIE Simona Duque
 
Bioseguridad - El rol de la alta dirección
Bioseguridad - El rol de la alta direcciónBioseguridad - El rol de la alta dirección
Bioseguridad - El rol de la alta direcciónssucbba
 
RRSS en la industria farmacéutica. Modelo de ESTEVE
RRSS en la industria farmacéutica. Modelo de ESTEVERRSS en la industria farmacéutica. Modelo de ESTEVE
RRSS en la industria farmacéutica. Modelo de ESTEVEMa Àngels Valls
 
como montar un stand
como montar un standcomo montar un stand
como montar un standRayling789
 
Licenciamiento urbanístico, reconocimiento y legalización de construccion
Licenciamiento urbanístico, reconocimiento y legalización de construccionLicenciamiento urbanístico, reconocimiento y legalización de construccion
Licenciamiento urbanístico, reconocimiento y legalización de construccionsinerkia arquitectura
 
Private Jet Market: USA vs Europe
Private Jet Market: USA vs EuropePrivate Jet Market: USA vs Europe
Private Jet Market: USA vs EuropePrivateFly
 
A MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIO
A MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIOA MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIO
A MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIOZuniga Agustin
 
BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...
BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...
BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...BrightEdge Technologies
 

Destacado (20)

CIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIs
 
NIST Privacy Engineering Working Group - Risk Model
NIST Privacy Engineering Working Group  - Risk ModelNIST Privacy Engineering Working Group  - Risk Model
NIST Privacy Engineering Working Group - Risk Model
 
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy WorldCIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
 
8pasos power asiento srirr lila
8pasos power  asiento srirr lila8pasos power  asiento srirr lila
8pasos power asiento srirr lila
 
Inefray mendoza
Inefray mendozaInefray mendoza
Inefray mendoza
 
Nuevo año
Nuevo añoNuevo año
Nuevo año
 
Ketchum Pleon Credenciales
Ketchum Pleon CredencialesKetchum Pleon Credenciales
Ketchum Pleon Credenciales
 
Mi biografi ana maria gomez giraldo
Mi biografi ana maria gomez giraldoMi biografi ana maria gomez giraldo
Mi biografi ana maria gomez giraldo
 
Bioseguridad - El rol de la alta dirección
Bioseguridad - El rol de la alta direcciónBioseguridad - El rol de la alta dirección
Bioseguridad - El rol de la alta dirección
 
RRSS en la industria farmacéutica. Modelo de ESTEVE
RRSS en la industria farmacéutica. Modelo de ESTEVERRSS en la industria farmacéutica. Modelo de ESTEVE
RRSS en la industria farmacéutica. Modelo de ESTEVE
 
como montar un stand
como montar un standcomo montar un stand
como montar un stand
 
Cadiz
CadizCadiz
Cadiz
 
Licenciamiento urbanístico, reconocimiento y legalización de construccion
Licenciamiento urbanístico, reconocimiento y legalización de construccionLicenciamiento urbanístico, reconocimiento y legalización de construccion
Licenciamiento urbanístico, reconocimiento y legalización de construccion
 
Zen Zuu PPT
Zen Zuu PPTZen Zuu PPT
Zen Zuu PPT
 
Private Jet Market: USA vs Europe
Private Jet Market: USA vs EuropePrivate Jet Market: USA vs Europe
Private Jet Market: USA vs Europe
 
Viaje A Grecia
Viaje A GreciaViaje A Grecia
Viaje A Grecia
 
Bayreuth_magazin 2011
Bayreuth_magazin 2011Bayreuth_magazin 2011
Bayreuth_magazin 2011
 
A MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIO
A MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIOA MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIO
A MI PERU REGOCIJO Y SALUDO POR SUS 193 ANIVERSARIO
 
El Impresionismo
El ImpresionismoEl Impresionismo
El Impresionismo
 
BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...
BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...
BrightEdge Share15 - DM103: Channel Marketing – Digital Marketing Mix - Ujjwa...
 

Similar a NIST Identity Standards and Technologies

ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
Self-Service Analytics Framework - Connected Brains 2018
Self-Service Analytics Framework - Connected Brains 2018Self-Service Analytics Framework - Connected Brains 2018
Self-Service Analytics Framework - Connected Brains 2018LoQutus
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationDenodo
 
Sensitel infrastructure optimization services
Sensitel infrastructure optimization servicesSensitel infrastructure optimization services
Sensitel infrastructure optimization servicesmsikka
 
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...CloudIDSummit
 
Big data certification summary aqonta
Big data certification summary   aqontaBig data certification summary   aqonta
Big data certification summary aqontaAqonta
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...ValueMomentum
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityHaluk Demirkan
 
Prithvi Corporate Presentation
Prithvi Corporate PresentationPrithvi Corporate Presentation
Prithvi Corporate Presentationguest92fc7f
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...EC-Council
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard Minor
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 

Similar a NIST Identity Standards and Technologies (20)

ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Self-Service Analytics Framework - Connected Brains 2018
Self-Service Analytics Framework - Connected Brains 2018Self-Service Analytics Framework - Connected Brains 2018
Self-Service Analytics Framework - Connected Brains 2018
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data Virtualization
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
Sensitel infrastructure optimization services
Sensitel infrastructure optimization servicesSensitel infrastructure optimization services
Sensitel infrastructure optimization services
 
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
 
Big data certification summary aqonta
Big data certification summary   aqontaBig data certification summary   aqonta
Big data certification summary aqonta
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
 
Greenplum User Case
Greenplum User Case Greenplum User Case
Greenplum User Case
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
Prithvi Corporate Presentation
Prithvi Corporate PresentationPrithvi Corporate Presentation
Prithvi Corporate Presentation
 
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

NIST Identity Standards and Technologies

  • 1. Introduction United States Department of Commerce National Institute of Standards and Technology Paul Grassi, CISSP Senior Standards and Technology Advisor, NSTIC Information Technology Laboratory 1401 Constitution Ave. NW, Rm. 2069 Washington, DC 20230 W: 202.482.8349 M: 703.786.8275 Email: paul.grassi@nist.gov Background   Role  @   NIST   Approach  
  • 2. Standards and Technology Landscape Well-­‐rounded  pilots  hi<ng  diverse  user  set   Government  adop@on   Market  Discovery   ADribute  Providers   Internet  of  Things   Consumer-­‐Centric   Deployment  Costs   Standards  Gaps   Embedded  Privacy   Iden@fica@on  of  policy  and  technical  overlays   NSTIC   Launch   IDE   Sustaining   2012   2013   2014   2015   Envision  It!?   True  Interoperability  
  • 3. NIST Coverage in Key Identity Services Key   No  coverage   Par@al  coverage,  to   include  other  D/A   documenta@on   Full  coverage   Needs  refreshing  
  • 4. Where We Will Focus in FY14/15 ü  Codify  privacy   enhancing  profiles   ü  Enhance/Establish   ‘standard’  to   establish  confidence,   trustworthiness,  and   privacy  preserva@on   (zero  knowledge,   derived,  minimal   disclosure)   ü  Address  portability  of   preferred  creden@als   and  relying  party   accounts   ü  Revisit  and  retool   exis@ng  standards  to   address  current   market  state  and  flex   to  innova@on   ü  Develop  new   standards  that   increase  IE   par@cipa@on   ü  Increase  par@cipa@on   in  commercial  open   standards   ü  Mobility,  Cloud,   Shared  Services   ü  Simplify,  accelerate,   and  reduce  the  cost   of  ICAM   implementa@ons   ü  Focus  beyond  the   PIV   ü  Establish  RP  toolkits   ü  Iden@fy  and  foster   innova@on  from   untapped  sources   ü  Elevate  non-­‐person   en@@es  into  the   forefront  of  the  IDE/ ICAM  discussion   ü  Non-­‐intrusive   security  model   ü  Con@nuous   monitoring  and   assessment  
  • 5. Identity Assurance – What would you think if? De-­‐coupled  proofing  strength  from   authen@ca@on  strength?   NIST  just  measured  authen@ca@on   performance/strength/usability?   Got  rid  of  LOA?   What  else  could  we  do  to  turn  these   docs  on  their  head  to  enhance  the  IE?   Developed  private  sector  companion   to  800-­‐63?  
  • 6. Attributes – What Needs to Happen? Iden@fy  and  establish  market-­‐enhancing  aDribute  best  prac@ces,  guidelines,  and  standards  to   communicate  the  veracity  and  trustworthiness  of  aDributes  to  relying  par@es  or  iden@ty  and   access  management  service  or  func@on.   Meta-­‐ ADribute   Confidence/ Assurance   Liability   Security  and   Privacy   Governance   Exchange   Informs   Dependent   Standards   Performance   Metrics   Risk  Tolerance   Market   ADribute   Registries   Focal  
  • 7. The Need for a Privacy Profile BrokerAuthen@ca@on  Request   Authen@ca@on  Request   Response  +   Encrypted  ADributes   Double  Blind   Architecture   Relying   Party   CSP   User  Consent   ADribute   Provider   Response  +   Encrypted  ADributes   1   CSP/AP  can’t  know  the  RP   2   Broker  can’t  see   the  a?ributes   3   Standard  and  Protocol  AgnosBc   4   RP  can’t  know  CSP   5   Minimal  Changes  to  Infrastructure   (but  we  may  soJen  this  requirement)  
  • 8. Contact Information United States Department of Commerce National Institute of Standards and Technology Paul Grassi, CISSP Senior Standards and Technology Advisor, NSTIC Information Technology Laboratory 1401 Constitution Ave. NW, Rm. 2069 Washington, DC 20230 W: 202.482.8349 M: 703.786.8275 Email: paul.grassi@nist.gov