trust and security in the identity ecosystem · trust and security in the identity ecosystem ....
TRANSCRIPT
Trust and Security in
the Identity Ecosystem
Katherine NoallSphere Identity
Alex SimsUniversity of Auckland
John MartinIBM
George HiotakisTrade Me
Digital Identity NZ
Our Vision
New Zealand is a country where everyone can fully participate in society by confidently expressing their digital identity
3
Our Mission
To foster the establishment of a digital identity ecosystem that enhances privacy, trust and improves access for all people in New Zealand
Leading a united approach to Digital Identity for the benefit of all people in New Zealand
MEMBERS
4
How do New Zealanders feel about digital identity and privacy?
What’s next for us?
10
CONFIDENTIAL – NOT FOR DISTRIBUTION
To enable people
to participate in
the economy and
society more
easily with
confidence and
choice
To empower
businesses to
innovate and
participate with
clarity around
identity
To improve
productivity and
reduce effort
when requesting,
attesting, and
validating digital
identity
To better adapt
to digital identity
challenges in an
ever changing
world
To put people in
control and
ownership of their
digital identity
Choice
Accessibility
Control
Privacy
Self-Sovereignty
Trust and Security in the Identity Ecosystem
• How do we build and maintain trust when our systems are becoming increasingly diverse and distributed?
• What must we do to ensure the security of our identity ecosystem?
• Ethical standards are inherent in trust; how do we bring these to life in our systems and policies?
IBM Security StrategyFearless in the face of uncertainty
John Martin
August 2019
Senior Security Architect and Security Practice Leader
IBM Security / © 2019 IBM Corporation
• Largest enterprise cybersecurity provider
• Leader in 12 security market segments
• 8,000+ security employees
• 20+ security acquisitions
• 70B+ security events monitored per day
Where we are now
IBM Security / © 2019 IBM Corporation 13
Help me…
Modernise security frameworks and controls
Respond to the global security skills shortage
Address increasing cyber attack vectors including IoT
Maintain data privacy and regulatory compliance
Secure the journey to cloud and digital transformation
From thousands of engagements across the world, we’ve heard some common security concerns.
What we’re hearing from customers
IBM Security / © 2019 IBM Corporation 14
Digital Trust
When you connect policy, analytics, and controls across your entire business
Data Protection and Privacy | Application Security | Identity Governance | Digital Identity Trust | Cloud and Mobile Security
What holds us back?
New privacy regulation deadlines
Govern and protect your business, data, users and assets
Not sure who has access to what
Customers demand better experiences
Legacy security doesn’t work for Cloud
Can’t keep up with business and IT projects
IBM Security / © 2019 IBM Corporation 15
Let the right people in
16
IBM partners with you to provide customised IAM expertise
1. DiagnoseStrategy, planning, IAM design thinking
2. TransformTechnical architecture, design and build, accelerated deployment
3. OperateAdvanced integration, process optimisation, manage and operate
IBM Identity Management Services
Simplify your users’ access across web, mobile and cloud
• Cloud-delivered single sign-on
• Multifactor risk-based authentication and identity federation
• Thousands of pre-built app connectors and templates
IBM Cloud Identity
1.
2.3.
Thank you!