The Cloud Identity Summit 2013 may be completed, but the work on what's next for identity is only that much closer to its anticipated zenith.
How close? That's debatable, and it's why there will be a Cloud Identity Summit (CIS) 2014.
This year's CIS opened with Ping CEO Andre Durand saying, "[The identity community] believes it is building the future. It is about what is next."
Other keynoter speakers noted identity's growing influence, including security expert Gunnar Peterson, managing principal at Arctec Group ("Identity is the new currency"), and Colin Kincaid, vice president of networking software at Cisco ("...rich identity enables cloud").
"How do I extend to the cloud? Literally, it is through identity," said Bob Johnson, director of IT at Accuvant, during his session and description of his enterprise architecture, which uses IDaaS, Ping-based identity bridges and Active Directory.
Workshops, discussions and hallway conversations eventually veered into the weeds, and, indeed, a lot is next.
In his keynote, Durand said "Vint Cerf [father of the internet] knew identity was critical, but 30 years later we are still dealing with not having embedded identity in the network." Durand called for an identity protocol stack, a theme that was later described in detail by Ping CTO Patrick Harding.
What's next is appearing on the horizon. Mobile security, APIs and the future of authentication were prevailing themes. NSTIC, SSO, IDaaS, relying parties and Big Data were topics of discussion.
The industry is building toward a world where identity is the required starting point for digital interaction and privacy. The starting point for a world where end-users and their attributes are the pivots of control.
What's next is mobile security for those independent devices (not issued by IT). Mobile security appears to be getting out of its acronym morass (MDM, MAM, MIM) by cutting down to a single approach called Enterprise Mobility Management (EMM).
At CIS, there was also talk of Privileged Identity, XACML, identity in context, and multi-factor authentication as next up for ID evolution.
Indeed, a lot is next.
To realize how far the industry has already traveled, in 2010 Information Cards were all over the agenda at the Burton Group/Gartner Catalyst Conference. When that same conference opens on July 29 this year, Info Cards are mere bleached bones in technology's casket.