Dave Kearns: Passwords: Identity's last mile So in that context it was very interesting to hear what Ping Chief Technology Officer Patrick Harding had to say in his keynote to this year's Summit. He told his audience that what is needed is "a modernized identity protocol stack that is baked into every application that scales to Internet proportions, and hides its complexity from developers and end-users."
Craig Burton: Fusion Engines Fusion Engines.... Just nod your head and look like it is normal. The reality is, there probably is no one that knows exactly what all of this technology surrounding Identity and Access Management is. Further, people who do know are actually happy to tell you and wouldn't think that anyone is stupid.
Identity Woman: Meta-Governance This spring I attended the Executive Education program Leadership and Public Policy in the 21st century at the Harvard Kennedy School of Government with fellow Young Global Leaders (part of the World Economic Forum). A line of future inquiry that came to me by the end of that two weeks - How do we design, create, get functioning and evolve governance systems?
Tim Christian, Courion: It's Not About the Money One of the things I like most about working for a specialized identity management firm like Courion is the direct line communication and relationships we establish with our customers. I recently spoke with the CISO of a large healthcare organization that just signed on with Courion last month. When I asked him "How did you sell this to your CEO and CFO?" what he told me was very interesting.
Ian Yip: Identity foundation You wouldn't believe how often I still have to explain Identity & Access Management (IAM) basics to people. So I created this to help explain it.
User-Centric ID Live Speaker proposals now being accepted. Deadline July 31. Opportunities for relying parties inNSTIC and the new identity ecosystem October 15-16, 2013 - Washington Convention Center, Washington, D.C.
With Montana's Lead, States May Demand Warrants for Cellphone Data The law rarely keeps up with technological advances - except in Montana. Legislators in that state recently passed a bill that requires the police to obtain a search warrant, based on probable cause, before they can use a cellphone carrier's records to establish a suspect's location.
Dave Kearns: Do you need an Identity Officer? I recently saw a query from a major international consumer goods company headquartered in Europe asking "...we have a Privacy Officer, but we are also looking into the possibility for an Identity Officer, someone who is knowledgeable about SSO, identity and so forth. Unfortunately we are fairly new to the entire identity sphere."
Matt Flynn: Identity Officer This morning, Dave Kearns of KuppingerCole revived an old conversation started by my friend Matt Pollicove of CTI back in 2006 about the potential need for an Identity Officer.
Eran Hammer: Realtime Conference, the Imagination Platform Last year, if you recall, I was a bit upset about some specification I participated in... I wrote a blog post, followed by another post, then went silent. I felt very strongly that everything I had to say was right there in the posts and that an ongoing online feud will only weaken the points I was trying to make.
Rebecca Solnit: Who will stop Google? Finally, journalists have started criticizing in earnest the leviathans of Silicon Valley, notably Google, now the world's third-largest company in market value. Simultaneously another set of journalists, apparently unaware that the weather has changed, is still sneering at San Francisco, my hometown, for not lying down and loving Silicon Valley's looming presence.
Identity Woman: Interesting events in 2013 This is a calendar of events that I know in 2013 (and beyond). I think they're interesting, I'm currently planning on attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach.
IDESG: July 2013 Plenary Meeting What: 5th IDESG Plenary Meeting When: July 24-26, 2013 Where: Massachusetts Institute of Technology (MIT) Media Labs - 75 Amherst St Cambridge, MA 02139
Trusted Computing Conference Sep 9-12, 2013 Orlando, FL, USA The Trusted Computing Conference brings together experts in the field of computer security to discuss, explore, promote and emphasize the critical need for standards-based computer security.
Call For Papers - Open Identity Summit 2013 September 10th - 11th 2013, Kloster Banz, Germany Deadline for electronic submissions: May 15th, 2013 The aim of Open Identity Summit 2013 is to link practical experiences and requirements with academic innovations.
User-Centric ID Live Opportunities for relying parties in NSTIC and the new identity ecosystem October 15-16, 2013 - Washington Convention Center, Washington, D.C.
eID & ePass 5th edition National eID & ePassport Conference - the Global Forum on the drivers behind the digitalization of citizen ID documents. BERLIN 2013, 28th & 29th of October @Intercontinental Berlin.
InCommon Advance CAMP: Identity Services Summit November 12-13, 2013 San Jose, California https://spaces.internet2.edu/display/ACAMP2013/Home. Explore the state of the art in identity services and discuss the leading edge work that's taking us there. Join us and get involved!