SlideShare a Scribd company logo
1 of 13
Download to read offline
BIOMETRIC CONSORTIUM CONFERENCE
AFCEA IDENTITY MANAGEMENT FOCUS SESSIONS
Where We Are Today – The Current Landscape of Identity Management
Duane Blackburn, MITRE Corporation
18 September 2012
Approved for Public Release: 12-3821. Distribution Unlimited
©2012-The MITRE Corporation. All rights reserved.
►Nov 2008 – May 2009
►AT&T, Bank of America,
Boeing, Microsoft,
Raytheon, etc.
►January – July 2008
►DoD, DHS, DOJ, HHS,
Treasury, DOS, NIST,
GSA, VA, IRS, FTC,
NASA, NSF
COMMONTHEMES-IMPORTANCE
 Identity Management is a critical, though often
underappreciated, component of successful applications in a
variety of sectors
 IdM can help remove barriers to collaboration and innovation
by ensuring trust
 People/things have only one “true” identity, but several
aliases with varying degrees of confidence in the linkages to
the “true” identity.
 How to enable and manage these identities properly in a single
application is difficult, but is even more difficult across interconnected
systems
 IdM activities in one application impacts and relies upon
others, though these impacts aren’t normally understood or
accounted for
COMMONTHEMES–R&D
Technology available now is good, but
improvements are needed to improve capabilities,
resiliency, privacy protection, convenience and
security
Research is needed on how to best combine
different technologies
Researcher access to useful data is an inhibitor
Side to side comparisons of technology options is
difficult/confusing and isn’t keeping pace with new
products
COMMONTHEMES-STANDARDS
Interoperability is difficult if the systems do not
share definitions and data structures
Increases the chance of errors, which would be
propagated throughout the interconnected
systems
Market-based and consensus-supported standards
most likely to be universally accepted
The existence and use of universal standards (or lack
thereof) is often viewed as an indicator of a
market/technology’s maturity
COMMONTHEMES-PRIVACY
Improving IdM can actually enhance privacy protection over
the status quo – if done properly
Outreach is an important aspect of privacy policy
Even if the privacy policy is correct, negative public
perception will scuttle a program quickly
Privacy isn’t just for lawyers
Building protections directly into the technology will
provide greater assurance that the protections are
implemented thoroughly and consistently.
A single IdM privacy breach creates enduring problems in
multiple systems
Privacy and security aren’t mutually exclusive
CO
MM
ON
THE
ME
S–
NEE
D
FOR
GO
VER
NA
NCE
Identity-based systems are inherently connected to one
another. Overall governance is required to manage this
properly rather than ad-hoc or not at all
All levels of government have the responsibility to ensure the
safety and wellbeing of its citizenry – and IdM has clear
impacts on national security, the economy, cyberspace, and
individual healthcare
Government must provide leadership and work with all
stakeholders to create favorable conditions for the
development of IdM that benefits users
SOFARHASLEADTO…NOTMUCH
 Foundation for CIO Councils’ identity work and for NSTIC
 NSTAC Report: “Despite laudable progress being made in many different
areas across a broad organizational front, Government does not yet have
a cohesive strategy to fulfill the potential of its considerable investment
in all aspects of IdM, nor to meet the emergent need.”
BIOMETRIC CONSORTIUM CONFERENCE
AFCEA IDENTITY MANAGEMENT FOCUS SESSIONS
Where We Are Today – The Current Landscape of Identity Management
Duane Blackburn, MITRE Corporation
18 September 2012
Approved for Public Release: 12-3821. Distribution Unlimited
©2012-The MITRE Corporation. All rights reserved.
IDMCONCEPTUALLY
From NSTC Document:
 (T)he underlying function of identification has been a part of
the human experience since the growth of social complexity
introduced differentiated roles, rights, privileges, and
resources into communities. Some of these “unique
abilities” came with the membership of a class or group,
while others represented individual characteristics.
Sometimes there was an identifying badge, mark, object, or
other way to visually distinguish the individual with a specific
role; sometimes this could only be known from personal
interaction.”
HOLLYWOODDEPICTIONS
IDENTITYCONCENTRICITY
Root
Core
One individual (core)
Multiple identities/identifiers
Duane Blackburn
434-964-5023
dblackburn@mitre.org
Disclaimer
The author's affiliation with The MITRE Corporation is provided for identification purposes only, and is not intended to convey or imply
MITRE's concurrence with, or support for, the positions,opinions or viewpoints expressed by the author

More Related Content

Viewers also liked

2009 Directors Report
2009 Directors Report2009 Directors Report
2009 Directors Report
andy biggin
 
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומןמצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
elio2b
 
Trade with China. AsstrA Presentation 2009
Trade with China. AsstrA Presentation 2009Trade with China. AsstrA Presentation 2009
Trade with China. AsstrA Presentation 2009
Pavel Red'ko
 
الدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوط
الدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوطالدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوط
الدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوط
Essam Obaid
 
Logika Informatika
Logika InformatikaLogika Informatika
Logika Informatika
andrewaja
 
Summary Of Dissertation Presentation
Summary Of Dissertation PresentationSummary Of Dissertation Presentation
Summary Of Dissertation Presentation
cmhusted
 

Viewers also liked (20)

Pursutpp
PursutppPursutpp
Pursutpp
 
2009 Directors Report
2009 Directors Report2009 Directors Report
2009 Directors Report
 
#Curation Restart Education Project . Top 10 #edtech20 tools who will change ...
#Curation Restart Education Project . Top 10 #edtech20 tools who will change ...#Curation Restart Education Project . Top 10 #edtech20 tools who will change ...
#Curation Restart Education Project . Top 10 #edtech20 tools who will change ...
 
Environmental Group Of Support Sulkowice
Environmental Group Of Support  SulkowiceEnvironmental Group Of Support  Sulkowice
Environmental Group Of Support Sulkowice
 
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומןמצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
 
Teaching with social media in classroom settings: Top ten practices from teac...
Teaching with social media in classroom settings: Top ten practices from teac...Teaching with social media in classroom settings: Top ten practices from teac...
Teaching with social media in classroom settings: Top ten practices from teac...
 
Aaa! Newsletter
Aaa! NewsletterAaa! Newsletter
Aaa! Newsletter
 
Urcus Spre Manastire
Urcus Spre ManastireUrcus Spre Manastire
Urcus Spre Manastire
 
Vakfotografie Sonny Lips
Vakfotografie Sonny LipsVakfotografie Sonny Lips
Vakfotografie Sonny Lips
 
Collateral Advantage
Collateral AdvantageCollateral Advantage
Collateral Advantage
 
PowerPoint Template - Put graphics center stage
PowerPoint Template - Put graphics center stagePowerPoint Template - Put graphics center stage
PowerPoint Template - Put graphics center stage
 
Bc Dc Oh
Bc Dc OhBc Dc Oh
Bc Dc Oh
 
Trade with China. AsstrA Presentation 2009
Trade with China. AsstrA Presentation 2009Trade with China. AsstrA Presentation 2009
Trade with China. AsstrA Presentation 2009
 
Week 4 - Trigonometry
Week 4 - TrigonometryWeek 4 - Trigonometry
Week 4 - Trigonometry
 
الدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوط
الدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوطالدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوط
الدوريات الأجنبية فى مكتبات الكليات العلمية فى جامعة أسيوط
 
Logika Informatika
Logika InformatikaLogika Informatika
Logika Informatika
 
Baie Des Cochons
Baie Des CochonsBaie Des Cochons
Baie Des Cochons
 
Summary Of Dissertation Presentation
Summary Of Dissertation PresentationSummary Of Dissertation Presentation
Summary Of Dissertation Presentation
 
Virginia Empowerment Zone
Virginia Empowerment ZoneVirginia Empowerment Zone
Virginia Empowerment Zone
 
Jing and Voicethread in K12 Education
Jing and Voicethread in K12 EducationJing and Voicethread in K12 Education
Jing and Voicethread in K12 Education
 

Similar to Where We Are Today – The Current Landscape of Identity Management

Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
LyndonPelletier761
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
herminaprocter
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
Dominic Karunesudas
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
rrepko
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
Duane Blackburn
 

Similar to Where We Are Today – The Current Landscape of Identity Management (20)

BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaper
 
The meaning of security in the 21st century
The meaning of security in the 21st centuryThe meaning of security in the 21st century
The meaning of security in the 21st century
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
 
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx130C h a p t e r10 Managing IT-Based Risk11 This c.docx
130C h a p t e r10 Managing IT-Based Risk11 This c.docx
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering Identity
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social media
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
Citizen Engagement Roundtable
Citizen Engagement RoundtableCitizen Engagement Roundtable
Citizen Engagement Roundtable
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 

More from Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
Duane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
Duane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
Duane Blackburn
 

More from Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2008 - NSTC
BCC 2008 - NSTCBCC 2008 - NSTC
BCC 2008 - NSTC
 
BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
 
BCC 2006 - NSTC
BCC 2006 - NSTCBCC 2006 - NSTC
BCC 2006 - NSTC
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Where We Are Today – The Current Landscape of Identity Management

  • 1. BIOMETRIC CONSORTIUM CONFERENCE AFCEA IDENTITY MANAGEMENT FOCUS SESSIONS Where We Are Today – The Current Landscape of Identity Management Duane Blackburn, MITRE Corporation 18 September 2012 Approved for Public Release: 12-3821. Distribution Unlimited ©2012-The MITRE Corporation. All rights reserved.
  • 2. ►Nov 2008 – May 2009 ►AT&T, Bank of America, Boeing, Microsoft, Raytheon, etc. ►January – July 2008 ►DoD, DHS, DOJ, HHS, Treasury, DOS, NIST, GSA, VA, IRS, FTC, NASA, NSF
  • 3. COMMONTHEMES-IMPORTANCE  Identity Management is a critical, though often underappreciated, component of successful applications in a variety of sectors  IdM can help remove barriers to collaboration and innovation by ensuring trust  People/things have only one “true” identity, but several aliases with varying degrees of confidence in the linkages to the “true” identity.  How to enable and manage these identities properly in a single application is difficult, but is even more difficult across interconnected systems  IdM activities in one application impacts and relies upon others, though these impacts aren’t normally understood or accounted for
  • 4. COMMONTHEMES–R&D Technology available now is good, but improvements are needed to improve capabilities, resiliency, privacy protection, convenience and security Research is needed on how to best combine different technologies Researcher access to useful data is an inhibitor Side to side comparisons of technology options is difficult/confusing and isn’t keeping pace with new products
  • 5. COMMONTHEMES-STANDARDS Interoperability is difficult if the systems do not share definitions and data structures Increases the chance of errors, which would be propagated throughout the interconnected systems Market-based and consensus-supported standards most likely to be universally accepted The existence and use of universal standards (or lack thereof) is often viewed as an indicator of a market/technology’s maturity
  • 6. COMMONTHEMES-PRIVACY Improving IdM can actually enhance privacy protection over the status quo – if done properly Outreach is an important aspect of privacy policy Even if the privacy policy is correct, negative public perception will scuttle a program quickly Privacy isn’t just for lawyers Building protections directly into the technology will provide greater assurance that the protections are implemented thoroughly and consistently. A single IdM privacy breach creates enduring problems in multiple systems Privacy and security aren’t mutually exclusive
  • 7. CO MM ON THE ME S– NEE D FOR GO VER NA NCE Identity-based systems are inherently connected to one another. Overall governance is required to manage this properly rather than ad-hoc or not at all All levels of government have the responsibility to ensure the safety and wellbeing of its citizenry – and IdM has clear impacts on national security, the economy, cyberspace, and individual healthcare Government must provide leadership and work with all stakeholders to create favorable conditions for the development of IdM that benefits users
  • 8. SOFARHASLEADTO…NOTMUCH  Foundation for CIO Councils’ identity work and for NSTIC  NSTAC Report: “Despite laudable progress being made in many different areas across a broad organizational front, Government does not yet have a cohesive strategy to fulfill the potential of its considerable investment in all aspects of IdM, nor to meet the emergent need.”
  • 9. BIOMETRIC CONSORTIUM CONFERENCE AFCEA IDENTITY MANAGEMENT FOCUS SESSIONS Where We Are Today – The Current Landscape of Identity Management Duane Blackburn, MITRE Corporation 18 September 2012 Approved for Public Release: 12-3821. Distribution Unlimited ©2012-The MITRE Corporation. All rights reserved.
  • 10. IDMCONCEPTUALLY From NSTC Document:  (T)he underlying function of identification has been a part of the human experience since the growth of social complexity introduced differentiated roles, rights, privileges, and resources into communities. Some of these “unique abilities” came with the membership of a class or group, while others represented individual characteristics. Sometimes there was an identifying badge, mark, object, or other way to visually distinguish the individual with a specific role; sometimes this could only be known from personal interaction.”
  • 13. Duane Blackburn 434-964-5023 dblackburn@mitre.org Disclaimer The author's affiliation with The MITRE Corporation is provided for identification purposes only, and is not intended to convey or imply MITRE's concurrence with, or support for, the positions,opinions or viewpoints expressed by the author