The Identity Series
A series of six lunchtime talks on identity as it relates to both Cloud and Zero Trust, over six consecutive Tuesday's.
Commencing on Tuesday 12th September 2023 at 12.30pm
In the IT world we confuse a user identity, user identifiers, and users in general; this session aims to clarify what identity actually is and why it’s critical that we use the correct set of terms (particularly with the business and other IT professionals) if we are to avoid falling into the same old traps.
2. Understanding Identity - Part 2 - Context & Trust
Identification of a user (or entity) drives context and trust, but how do we better use our new found understanding of Identity to turbocharge the ability to derive context and thus risk?
Note: This is a follow in to Part One (above) - if you missed it live, please watch part one prior to this webinar.
3. Identity Challenges
Identity and being able to leverage sources of identity attributes, particularly those that we do not own / manage, provides a set of unique challenges.
Paul Simmonds finishes up this introduction to what Identity actually is with a webinar on what we have so many problems when it comes to identity and IT.
4. Extending Identity into the Cloud
A look at the methods we use to extend identification and authorisation into a cloud environment to provide a more frictionless experience.
This includes the typical methods of extending / leveraging existing identity ecosystems into those cloud environments and the advantages / pitfalls of various solutions.
Sean Turner looks at the design patterns, together with their pro's and con's, that we can use when leveraging identity in a cloud environment.
5. Leveraging identity for Zero Trust
Zero Trust promises to deliver a context aware security solution, but where does identity play into this and how can we leverage identity to provide a known level of confidence in the entities interacting with our systems and data.
6. Future challenges and pitfalls with Identity
A panel session featuring the presenters from the first five talks.
What are the key blockers you are seeing to move from binary authentication to rich risk-based authentication?
How many organisations have you worked in that are able to consume trusted authoritative attributes from identities that they don’t own or manage?
What aspects of Zero Trust, particularly around authorisation, need to change or improve to deliver the security nirvana that Zero Trust promises?
Do you think Zero Trust can be packaged, or purchased, as a product?
What is the one thing you would like to do, or fix, that you can’t do today, to enable a more secure future?