SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Identity and Access Management
Governance handbook
12 years of expertise in IAM
35+ projects:
 Strong Authentication,
 Identity Management,
 Access Governance,
 Information Protection.
Proud member of a versatile team of 25+ expert
consultants ready for innovation To keep in touch
https://twitter.com/IdentityMonk
https://ca.linkedin.com/in/jflombardo
Proud employer of 500+
consultants
Located in
Montréal (HQ), Québec City,
Ottawa, Toronto, Boston, Paris
Facilité was created in 1992
Acts in different modes:
• Risk sharing
• Turn key services
• Advisory
6 practices of expertise
(Dev., Arch., Sec., Agile, Data, Log.)
Information on an entity used by digital systems to
represent an external agent.
That agent may be a person, organization, application,
or device
Identity
Information on an entity used by digital systems to
represent an external agent.
That agent may be a person, organization, application,
or device
Identification
AuthenticationAuthorization
Identity
Information on an entity used by computer systems to
represent an external agent. That agent may be a
person, organisation, application, or device
Process of determining if a
user has the right to access a
service or perform an action.
An extra security step that
allows or denies access
privileges to company
resources
Process of validating that
external agent are who they
say they are.
Information on an entity used by digital systems to
represent an external agent.
That agent may be a person, organization, application,
or device
Identification
AuthenticationAuthorization
IdentityProcess of determining if a
user has the right to access a
service or perform an action.
An extra security step that
allows or denies access
privileges to company
resources
Process of validating that
external agent are who they
say they are.
Information on an entity used by computer systems to
represent an external agent. That agent may be a
person, organisation, application, or device
Provide capabilities such as
segregation of duties, access
certification, role engineering, role
management, logging, analytics,
and reporting.
End of Identity
/Deactivation
Identity
Onboarding
/Reactivation
Identity
Attribute
change
Role
Model
Policies
Role
assignation
Role
revocation
Account creation
/activation
Account
update
Account deletion
/deactivation
Account
update
Inbound
Policy
evaluation
Outbound
policy
evaluation
Identity
& Credential
Management
Role
Model
Role
assignation
Role
revocation
Account creation
/activation
Account
update
Account deletion
/deactivation
Account
update
Application
Access
Management
External agent
Want to use
Get authenticated
Get entitled
Check if authorized
B2E B2B B2C B2TBusiness
A complexity of contexts…
B2E B2B B2C B2TBusiness
Privileged
Devices
Applications
…and dimensions
Corporate
Services &
Applications
with siloed
Access,
Credential
and Identity
Management
SSO is not
possible
More than one
place to know who
accesses what
Application
on-boarding is
specific and costly
How
were we
used to
do it?
Employee Identity
& Credential
Management
Employee Access
Management
Corporate
Services &
Applications
How did
we
solve
this?
Enabling SSO
Enabling unique
identification
Employee Identity
& Credential
Management
Corporate
Services &
Applications
Partner Identity
& Credential
Management
Employee and Partner
Access Management
How did
we
solve
this?
Extending SSO
Extending unique
identification
Employee Identity
& Credential
Management
Employee and Partner
Access Management
Corporate
Services &
Applications
Partner Identity
& Credential
Management
Customer
Services &
Applications
Siloed Customer
Access Management
Siloed Identity
& Credential
Management
How we
then
solved
this
More than one set
of credentials
SSO is difficult
SSO is not
possible
More than one
place to know who
accesses what
Application
on-boarding is
specific and costly
Integration costs
are repeated
Still not
a good solution
No difference
between
applications and
services
Identity chaining
Only one
recipe for
integration
Use standards
and APIs
One Access
Manager acts as
Access Broker
Only one place
to know who
accesses what
One role model
to control access
to applications
and permissions
Each population
has one set of
credentials
Specific
integration is
on the last
mile
Use standards
according to
context
Identity Chaining (Meshed)
My individual
customers through
Social Login
My strategic
customer
through delegation
My strategic
partner
through delegation
Partners of my
strategic partner
integration
Bi-directional
relationship
Synchronized
identities
Centralized
identites
Federated
authentications
Silos of
identities
Silos of
authentication
Dynamic
authentications
Social
identities
Federated
identities
Centralized
authentications
Silos of
Role based
authorization
Centralized
Role based
authorizations
Dynamic
Role based
authorizations
Social
Authentication
Centralized
fine grained
authorization
Dynamic
fine grained
authorizations
Silos of
fine grained
authorization
Federated
role based
authorizations
Silos of
fine grained
authorization
80%
16%
4%
<1%
Centralized
high privileged
authorizations
Maturity matrix
NIST-800-63-3 (A,B,C)
ISO, NIST, COBIT, ITIL, BS7799
ISO 27001, Jericho
SSAE16/70, SOC x type y, CSA CCM
Safe Harbor, Privacy Shield
PCI-DSS
NERC
HIPAA
PIPEDA, CASTLE
SOX
Data specific Governance
General Risk Governance
Security Governance
IAM specific Governance
Cloud Security Governance
Cloud Privacy Governance
Governance landscape
 Regulation lays down rules relating to the protection of natural
persons with regard to the processing of personal data and
rules relating to the free movement of personal data.
 Goes in effect May 25th 2018
 Companies can be fined if not compliant (20M€ or 4% turnout,
depending which one is larger)
 Protection of EU resident (different that EU citizen) personal data
 Companies doing business with EU data subject (offering goods
or services irrespective of whether connected to a payment)
 Companies processing EU data subject, even if companies are
located outside the EU borders
EU citizen
Non EU resident
EU citizen
EU resident
2+ citizen (incl. EU)
EU resident
?
!
!
2+ citizen (incl. EU)
Non EU resident?
Non EU citizen
EU resident
!
Non EU citizen
Non EU resident

Subject
Personal
Data
Data shall be exportable
in portable format
(Art. 20)
Data Collection shall
enforce subject’s consent
(Art. 6/7)
Controller shall comply
with Breach Notification rules (Art. 33)
Controller shall comply with
right to be forgotten
(Art. 17)
Controller shall implement
organizational/procedural/technical
means to protect Data
Risk assessment and Governance
of Data shall be implemented
(Art. 35/42)
Digital Privacy Officer shall
be elected in large company
(Art. 37)
Controller shall comply with
cross border processing rules
(Art. 3)
• Name (first, last, second);
• Identification number (permanent
or transient);
• Location data (physical but also
transient like GPS);
• Genetic (characteristics which give
unique information about the
physiology/health with or without
analysis)
• Biometric (issues for technical
processing of physical,
physiological or behavioral
characteristics);
• Mental, cultural, economic;
• Social Identity and activity;
• Online activity (IP address, cookie,
etc.)
(re) definition of Subject Personal Data
 ‘controller ’ who determines the purposes and means of the
processing of personal data;
 ‘ processor’ who processes personal data on behalf of the
controller;
 ‘recipient’ who to which the personal data are disclosed
 ‘third party’ who, under the direct authority of the controller or
processor, are authorized to process personal data.
Key points to handle
Global implications of GDPR
https://gdpr-info.eu/
http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf
• ISO 27K1-like means:
• Ongoing confidentiality/integrity/
availability/resilience of systems
• Ability to restore the availability and
access to data in a timely manner
• Regularly testing/assessing/evaluating
effectiveness of technical/organizational
measures
• Additional means:
 Pseudonymisation and encryption;
 Code of conduct (Art. 40);
 Approved certification mechanism (Art. 42)
Proposed solutions (Art. 32)
Governing
the Data
What types
are owned
Where it
is stored
Who has access
to what
How it is
managed
Be ready for ripples
GDPR is just a first step…
Russia Data Privacy Laws are operational
Australia Data Privacy Laws are operational
<Insert your country> Data Laws
are coming
China Data Privacy Laws are drafted
Centralized
Federated
Christopher Allen, stages of online identity
http://www.lifewithalacrity.com
User Centric
Self Sovereign
User control
Low
High
LowHigh Portability
Centralized
Federated
User Centric
Self Sovereign
User control
Low
High
LowHigh Portability
Based on Christopher Allen, stages of online identity
http://www.lifewithalacrity.com
What you
considered too obsolete
and did not capitalize on
What you hoped to see and
what Blockchain hopes to solve
User control
Low
High
LowHigh Portability
User Centric
Self Sovereign
Centralized
Federated
Based on Christopher Allen, stages of online identity
http://www.lifewithalacrity.com
Need Decentralization
What you
considered too obsolete
and did not capitalize on
What you hoped to see and
what Blockchain hopes to solve
Need Trust
David Birch, Director of Consult Hyperion:
• Blockchain is not for storing digital ID
• Still an issue for managing the private key
• Should be managed by trusted party (e.g. Banks)
http://dutchblockchainconference.com/2016/06/20/david-birch-hyperion/
Steve Wilson, VP Constellation Research
• There is no ID in the blockchain
• An intermediary is still needed
• See project MDAV for CCICADA
https://www.youtube.com/watch?v=dzetCrresXM
User control
Low
High
LowHigh Portability
User Centric
Self Sovereign
Centralized
Federated
Based on Christopher Allen, stages of online identity
http://www.lifewithalacrity.com
Need Decentralization
What you
considered too obsolete
and did not capitalize on
What you hoped to see and
what Blockchain hopes to solve
Need Trust
Meshed
Controlled via:
Linking of accounts
Consent to share
Portable through the
Trust framework
…

Weitere ähnliche Inhalte

Was ist angesagt?

BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment Priyanka Aash
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID Inc
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetDimitri Sirota
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Inc
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsHp kushal
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Inc
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetDimitri Sirota
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesVISTA InfoSec
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...AtoZ Compliance
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure ComplianceAIIM International
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingDimitri Sirota
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role HackerOne
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetDimitri Sirota
 

Was ist angesagt? (20)

BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
 

Ähnlich wie CPA - Introduction to Digital Identity - rev20171102

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer PlatformShanmugavel Sankaran
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessLaura Perry
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkPECB
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 

Ähnlich wie CPA - Introduction to Digital Identity - rev20171102 (20)

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 

Mehr von Jean-François LOMBARDO

SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfJean-François LOMBARDO
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJean-François LOMBARDO
 
Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Jean-François LOMBARDO
 
Yul identity in depth identity enforcement with jwap - 20200609
Yul identity   in depth identity enforcement with jwap - 20200609Yul identity   in depth identity enforcement with jwap - 20200609
Yul identity in depth identity enforcement with jwap - 20200609Jean-François LOMBARDO
 
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Jean-François LOMBARDO
 
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624Jean-François LOMBARDO
 
IdentityNorth Montreal - Furture Proof your Digital Identity strategy
IdentityNorth Montreal - Furture Proof your Digital Identity strategyIdentityNorth Montreal - Furture Proof your Digital Identity strategy
IdentityNorth Montreal - Furture Proof your Digital Identity strategyJean-François LOMBARDO
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...Jean-François LOMBARDO
 
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Jean-François LOMBARDO
 
Synposium gia quebec setting the new course for digital identity- en rev 20...
Synposium gia quebec   setting the new course for digital identity- en rev 20...Synposium gia quebec   setting the new course for digital identity- en rev 20...
Synposium gia quebec setting the new course for digital identity- en rev 20...Jean-François LOMBARDO
 

Mehr von Jean-François LOMBARDO (10)

SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdf
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022 Amazon EKS - security best practices - 2022
Amazon EKS - security best practices - 2022
 
Yul identity in depth identity enforcement with jwap - 20200609
Yul identity   in depth identity enforcement with jwap - 20200609Yul identity   in depth identity enforcement with jwap - 20200609
Yul identity in depth identity enforcement with jwap - 20200609
 
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
 
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
 
IdentityNorth Montreal - Furture Proof your Digital Identity strategy
IdentityNorth Montreal - Furture Proof your Digital Identity strategyIdentityNorth Montreal - Furture Proof your Digital Identity strategy
IdentityNorth Montreal - Furture Proof your Digital Identity strategy
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
 
Synposium gia quebec setting the new course for digital identity- en rev 20...
Synposium gia quebec   setting the new course for digital identity- en rev 20...Synposium gia quebec   setting the new course for digital identity- en rev 20...
Synposium gia quebec setting the new course for digital identity- en rev 20...
 

Kürzlich hochgeladen

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

CPA - Introduction to Digital Identity - rev20171102

  • 1. Identity and Access Management Governance handbook
  • 2. 12 years of expertise in IAM 35+ projects:  Strong Authentication,  Identity Management,  Access Governance,  Information Protection. Proud member of a versatile team of 25+ expert consultants ready for innovation To keep in touch https://twitter.com/IdentityMonk https://ca.linkedin.com/in/jflombardo Proud employer of 500+ consultants Located in Montréal (HQ), Québec City, Ottawa, Toronto, Boston, Paris Facilité was created in 1992 Acts in different modes: • Risk sharing • Turn key services • Advisory 6 practices of expertise (Dev., Arch., Sec., Agile, Data, Log.)
  • 3. Information on an entity used by digital systems to represent an external agent. That agent may be a person, organization, application, or device Identity
  • 4. Information on an entity used by digital systems to represent an external agent. That agent may be a person, organization, application, or device Identification AuthenticationAuthorization Identity Information on an entity used by computer systems to represent an external agent. That agent may be a person, organisation, application, or device Process of determining if a user has the right to access a service or perform an action. An extra security step that allows or denies access privileges to company resources Process of validating that external agent are who they say they are.
  • 5. Information on an entity used by digital systems to represent an external agent. That agent may be a person, organization, application, or device Identification AuthenticationAuthorization IdentityProcess of determining if a user has the right to access a service or perform an action. An extra security step that allows or denies access privileges to company resources Process of validating that external agent are who they say they are. Information on an entity used by computer systems to represent an external agent. That agent may be a person, organisation, application, or device Provide capabilities such as segregation of duties, access certification, role engineering, role management, logging, analytics, and reporting.
  • 6. End of Identity /Deactivation Identity Onboarding /Reactivation Identity Attribute change Role Model Policies Role assignation Role revocation Account creation /activation Account update Account deletion /deactivation Account update Inbound Policy evaluation Outbound policy evaluation
  • 7. Identity & Credential Management Role Model Role assignation Role revocation Account creation /activation Account update Account deletion /deactivation Account update Application Access Management External agent Want to use Get authenticated Get entitled Check if authorized
  • 8. B2E B2B B2C B2TBusiness A complexity of contexts…
  • 9. B2E B2B B2C B2TBusiness Privileged Devices Applications …and dimensions
  • 10. Corporate Services & Applications with siloed Access, Credential and Identity Management SSO is not possible More than one place to know who accesses what Application on-boarding is specific and costly How were we used to do it?
  • 11. Employee Identity & Credential Management Employee Access Management Corporate Services & Applications How did we solve this? Enabling SSO Enabling unique identification
  • 12. Employee Identity & Credential Management Corporate Services & Applications Partner Identity & Credential Management Employee and Partner Access Management How did we solve this? Extending SSO Extending unique identification
  • 13. Employee Identity & Credential Management Employee and Partner Access Management Corporate Services & Applications Partner Identity & Credential Management Customer Services & Applications Siloed Customer Access Management Siloed Identity & Credential Management
  • 15. More than one set of credentials SSO is difficult SSO is not possible More than one place to know who accesses what Application on-boarding is specific and costly Integration costs are repeated Still not a good solution
  • 16. No difference between applications and services Identity chaining Only one recipe for integration Use standards and APIs One Access Manager acts as Access Broker Only one place to know who accesses what One role model to control access to applications and permissions Each population has one set of credentials Specific integration is on the last mile Use standards according to context
  • 17. Identity Chaining (Meshed) My individual customers through Social Login My strategic customer through delegation My strategic partner through delegation Partners of my strategic partner integration Bi-directional relationship
  • 18. Synchronized identities Centralized identites Federated authentications Silos of identities Silos of authentication Dynamic authentications Social identities Federated identities Centralized authentications Silos of Role based authorization Centralized Role based authorizations Dynamic Role based authorizations Social Authentication Centralized fine grained authorization Dynamic fine grained authorizations Silos of fine grained authorization Federated role based authorizations Silos of fine grained authorization 80% 16% 4% <1% Centralized high privileged authorizations Maturity matrix
  • 19. NIST-800-63-3 (A,B,C) ISO, NIST, COBIT, ITIL, BS7799 ISO 27001, Jericho SSAE16/70, SOC x type y, CSA CCM Safe Harbor, Privacy Shield PCI-DSS NERC HIPAA PIPEDA, CASTLE SOX Data specific Governance General Risk Governance Security Governance IAM specific Governance Cloud Security Governance Cloud Privacy Governance Governance landscape
  • 20.  Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.  Goes in effect May 25th 2018  Companies can be fined if not compliant (20M€ or 4% turnout, depending which one is larger)  Protection of EU resident (different that EU citizen) personal data  Companies doing business with EU data subject (offering goods or services irrespective of whether connected to a payment)  Companies processing EU data subject, even if companies are located outside the EU borders EU citizen Non EU resident EU citizen EU resident 2+ citizen (incl. EU) EU resident ? ! ! 2+ citizen (incl. EU) Non EU resident? Non EU citizen EU resident ! Non EU citizen Non EU resident  Subject Personal Data Data shall be exportable in portable format (Art. 20) Data Collection shall enforce subject’s consent (Art. 6/7) Controller shall comply with Breach Notification rules (Art. 33) Controller shall comply with right to be forgotten (Art. 17) Controller shall implement organizational/procedural/technical means to protect Data Risk assessment and Governance of Data shall be implemented (Art. 35/42) Digital Privacy Officer shall be elected in large company (Art. 37) Controller shall comply with cross border processing rules (Art. 3) • Name (first, last, second); • Identification number (permanent or transient); • Location data (physical but also transient like GPS); • Genetic (characteristics which give unique information about the physiology/health with or without analysis) • Biometric (issues for technical processing of physical, physiological or behavioral characteristics); • Mental, cultural, economic; • Social Identity and activity; • Online activity (IP address, cookie, etc.) (re) definition of Subject Personal Data  ‘controller ’ who determines the purposes and means of the processing of personal data;  ‘ processor’ who processes personal data on behalf of the controller;  ‘recipient’ who to which the personal data are disclosed  ‘third party’ who, under the direct authority of the controller or processor, are authorized to process personal data. Key points to handle Global implications of GDPR https://gdpr-info.eu/ http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf • ISO 27K1-like means: • Ongoing confidentiality/integrity/ availability/resilience of systems • Ability to restore the availability and access to data in a timely manner • Regularly testing/assessing/evaluating effectiveness of technical/organizational measures • Additional means:  Pseudonymisation and encryption;  Code of conduct (Art. 40);  Approved certification mechanism (Art. 42) Proposed solutions (Art. 32) Governing the Data What types are owned Where it is stored Who has access to what How it is managed
  • 21. Be ready for ripples GDPR is just a first step… Russia Data Privacy Laws are operational Australia Data Privacy Laws are operational <Insert your country> Data Laws are coming China Data Privacy Laws are drafted
  • 22. Centralized Federated Christopher Allen, stages of online identity http://www.lifewithalacrity.com User Centric Self Sovereign User control Low High LowHigh Portability
  • 23. Centralized Federated User Centric Self Sovereign User control Low High LowHigh Portability Based on Christopher Allen, stages of online identity http://www.lifewithalacrity.com What you considered too obsolete and did not capitalize on What you hoped to see and what Blockchain hopes to solve
  • 24. User control Low High LowHigh Portability User Centric Self Sovereign Centralized Federated Based on Christopher Allen, stages of online identity http://www.lifewithalacrity.com Need Decentralization What you considered too obsolete and did not capitalize on What you hoped to see and what Blockchain hopes to solve Need Trust
  • 25. David Birch, Director of Consult Hyperion: • Blockchain is not for storing digital ID • Still an issue for managing the private key • Should be managed by trusted party (e.g. Banks) http://dutchblockchainconference.com/2016/06/20/david-birch-hyperion/ Steve Wilson, VP Constellation Research • There is no ID in the blockchain • An intermediary is still needed • See project MDAV for CCICADA https://www.youtube.com/watch?v=dzetCrresXM
  • 26. User control Low High LowHigh Portability User Centric Self Sovereign Centralized Federated Based on Christopher Allen, stages of online identity http://www.lifewithalacrity.com Need Decentralization What you considered too obsolete and did not capitalize on What you hoped to see and what Blockchain hopes to solve Need Trust Meshed Controlled via: Linking of accounts Consent to share Portable through the Trust framework …

Hinweis der Redaktion

  1. So the solution is Identity Chaining 3 points definition 1 recipe solution Let’s explain what it is
  2. So in order to be an archipelago of Trust, we must be meshed We are in a company (blue), we have partners (green), we have customer – Organizations and infividuals (purple) We have Circle of Authority for each one of them We can establishTrust link