SlideShare una empresa de Scribd logo
1 de 23
Montreal Executive Forum 2018
Future-proof
your Customer
Identity
strategy
Montreal Executive Forum 2018
Future-proof
your Customer
Identity
strategy
To keep in touch
https://twitter.com/IdentityMonk
https://ca.linkedin.com/in/jflombardo
https://x-iam.com
13 years of expertise in IAM
35+ projects:
 Strong Authentication,
 Identity Management,
 Access Governance,
 Information Protection.
Proud member of a versatile team of 25+ expert
consultants ready for innovation
Did you ever meet a crazy guy
with a future-proof strategy?
Value
Chain
Services
Digital
Identity
Strategy
Digital
strategy
Cost
Governance
Growth
A strong focus on digitalization
A ton of customer expectations
Better User
Experience
Efficiency
 One set of credentials
 Single Sign-on first
 Local backup/step-up
mechanisms if necessary
 Self-service oriented
 Context-based ruling and
decisions
 Cross device consistent
Privacy
 Consent to use data
 Protection of data
 Control and traceability
of data usage
Trust
for now and the future
Customer
Partner
Strategic
to its Brand
What is a customer exactly?
Employee
Ambassador
of my
Brand
Favored
for using
my Brand
Here are the ripples
GDPR was just a first step…
Russian Data Privacy Laws are operational
Australian Data Privacy Laws are
operational
<Insert your country> Data Laws
are coming up
Chinese Data Privacy Laws are drafted
(some) Canadian Data Laws are enforceable
November 2018
User control
Low
High
LowHigh Portability
Based on Christopher Allen, stages of online identity
http://www.lifewithalacrity.com
User Centric
Self Sovereign
Centralized
Federated
Strong push for Decentralization
to give full control to the owner of
the data
You
should
be here
Want to know more on SSI?
But TRUST is a foundation of any
business relationship, how will
we maintain it in this model?
To boldly go where nothing is centralized
A Decentralization is necessary
B Trust management is fundamental
Always in movement, the future is...
…but we can establish that:
Being Future-Proof
1 Not a will to handle all future use cases
2 But a will to act as a foundation for
the future
3 While easing evolution towards modern
postures
Great, we already know how to establish trust!
My
company
Trusted
bridge
Trusted
bridge
Trusted
bridge
Trusted
bridge
And each one of us knows how to manage Employees’ Identity
This is far more difficult for external people
My
company
Trusted
bridge
Trusted
bridge
Trusted
bridge
Trusted
bridge
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
We are all individual
customers
I’m not
We are often biased when we look at our customers…
We are all individual
customers
I’m not
… because many of them are someone else’s employee
Then, it makes sense to leverage our Trust capabilities
to decentralize what we control the least
My
company
Trusted
bridge
Trusted
bridge
Trusted
bridge
Trusted
bridge
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
trust
trust
My
company
Trusted
bridge
Trusted
bridge
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
trust
Benefits from decentralization
I can enable Bring-Your-Own-
Identity/Token and leverage the burden of
user support
Thanks to my trusted partner, I can
benefit from a strong and efficient
process to manage types of identities
that were difficult for me
I can benefit from Just-in-Time
provisioning on first use if coming from a
trusted partner
I still have the final word regarding the
access controls to my resources and
services
How to handle the
privacy in such a
model?
My team will
get back to
you
Not like that,
for sure!
My
company
Trusted
bridge
Trusted
bridge
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
trust
How to handle the privacy in such a model?
1) Establish consent when joining the
corporation, including for the sharing
with a 3rd party
Consent to
• Collect A
• Collect B
For Internal
use and
sharing with
my company
Valid until
01/01/2019
4) Regularly check for
expiration of consent,
flush is not renewed
3) Ease the first
access of the user to
my company
2) Use asynchronous
provisioning/synchronization of
account information and related
consent metadata
Consent to
• Use A
• Use B
For Business
Analytics at
my company
Valid until
01/06/2018
My
company
Trusted
bridge
Trusted
bridge
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
trust
How to handle the privacy in such a model?
1) Initially, consent may not include
sharing with a 3rd party
Consent to
• Collect A
• Collect B
For Internal
use
Valid until
01/01/2019
4) Regularly check for
expiration of consent,
flush is not renewed
2) Establish specific
consent during checking
for the new usage on 1rst
use
3) Propagate back to his/her
authority the new consent given by
the user
Consent to
• Use A
• Use B
For Business
Analytics at
my company
Valid until
01/06/2018
Sharing with my
company
Valid until
01/06/2018
+
My
company
Trusted
bridge
Trusted
bridge
Trusted
bridge
Trusted
bridge
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
Lifecycle
Authentication
Authorization
Governance
trust
trust
SSI will just be another partner in the dance
trust trust
trust
trust
Frédéric Parthenais
VP Consulting and Sales
fparthenais@facilite.com
+1 514-262-2328
Jean-François Lombardo
Digital Identity, Trust and Privacy consultant
jflombardo@facilite.com
+1 514-778-5565
Montreal Executive Forum 2018

Más contenido relacionado

Similar a IdentityNorth Montreal - Furture Proof your Digital Identity strategy

Similar a IdentityNorth Montreal - Furture Proof your Digital Identity strategy (20)

Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Why KYC Verification Is the Cornerstone of Trust.docx
Why KYC Verification Is the Cornerstone of Trust.docxWhy KYC Verification Is the Cornerstone of Trust.docx
Why KYC Verification Is the Cornerstone of Trust.docx
 
Top 10 SEO Companies.pdf
Top 10 SEO Companies.pdfTop 10 SEO Companies.pdf
Top 10 SEO Companies.pdf
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Customer vs. IAM: Understanding CIAM's Role in Accelerating Business Growth.pptx
Customer vs. IAM: Understanding CIAM's Role in Accelerating Business Growth.pptxCustomer vs. IAM: Understanding CIAM's Role in Accelerating Business Growth.pptx
Customer vs. IAM: Understanding CIAM's Role in Accelerating Business Growth.pptx
 
Online Identity Document Verification.pdf
Online Identity Document Verification.pdfOnline Identity Document Verification.pdf
Online Identity Document Verification.pdf
 
Customer Story: Aire
Customer Story: Aire Customer Story: Aire
Customer Story: Aire
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Welcome to the World of the BPS Security Practice
Welcome to the World of the BPS Security PracticeWelcome to the World of the BPS Security Practice
Welcome to the World of the BPS Security Practice
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docx
 
cco solutions.pptx
cco solutions.pptxcco solutions.pptx
cco solutions.pptx
 
Social CRM - presented to the INCORPORATED GUILD FOR INTELLIGENCE-BASED COMMERCE
Social CRM - presented to the INCORPORATED GUILD FOR INTELLIGENCE-BASED COMMERCESocial CRM - presented to the INCORPORATED GUILD FOR INTELLIGENCE-BASED COMMERCE
Social CRM - presented to the INCORPORATED GUILD FOR INTELLIGENCE-BASED COMMERCE
 
Cloud security
Cloud securityCloud security
Cloud security
 

Más de Jean-François LOMBARDO

Más de Jean-François LOMBARDO (9)

SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdf
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022
 
Yul identity in depth identity enforcement with jwap - 20200609
Yul identity   in depth identity enforcement with jwap - 20200609Yul identity   in depth identity enforcement with jwap - 20200609
Yul identity in depth identity enforcement with jwap - 20200609
 
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
 
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
 
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
 
Synposium gia quebec setting the new course for digital identity- en rev 20...
Synposium gia quebec   setting the new course for digital identity- en rev 20...Synposium gia quebec   setting the new course for digital identity- en rev 20...
Synposium gia quebec setting the new course for digital identity- en rev 20...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

IdentityNorth Montreal - Furture Proof your Digital Identity strategy