who are we? · get involved • sign up (email list) • become a member of the customer advisory...

8

Upload: others

Post on 17-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice
Page 2: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

WHO ARE WE?

Customer Advisory Board:

Page 3: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

GUIDING ASSUMPTIONS – DO YOU AGREE?

• Identity is core to security– Identity has transitioned from operational, user experience driven

• Majority of organizations are not leading with this premise• Organizations are across the spectrum of IAM maturity• Due to increase in identity-related breaches, organizations

are hungry for guidance on how to bring identity and security closer together

• Those who are identity security aware (20%) can help educate those that are just becoming aware (80%)

Page 4: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

WHAT ARE WE TRYING TO DO?

Become the independent source of education and information on identity centric security strategies

Help the 20% (of organizations who lead the charge) to successfully educate and assist the 80% (of organizations who are maturing)

Create a community of practitioners and vendors which harnesses collective expertise, enables vendor collaboration, encourages ongoing discussion and develops bests practices, resources and tools

Page 5: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

IMPROVING SECURITY THROUGH IDENTITY

Page 6: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

HOW DO WE GET THERE?

• IDSA Assessment (where am I?)• Best Practices (how do I move toward good, given my level?)• Reference Architectures (what does good look like?)• Use Cases (how do the technologies interact to meet a scenario?)• Third Party Certified Integrations and Documentation (do the vendor to

vendor integrations meet the use cases?)• Capability Requirements (what capabilities do I need to meet use cases?)• Others?

Page 7: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

GET INVOLVED

• Sign up (email list)

• Become a member of the customer advisory board

• Get involved in our on-line community (coming soon)

– Provide the voice of the customer

– Share strategies, experiences, best practices, use cases with the community

– Provide feedback on assessments, use cases, capability matrices, integrations

– Participate in surveys

• Help us crowdsource and create deliverables, including bringing project reality to identity centric strategies (o365, Cloud migration, Digital Transformation)

• Become a resource to our technical committee

• WHY?? Become a hero in your organization! Become a rock star in your industry!

Page 8: WHO ARE WE? · GET INVOLVED • Sign up (email list) • Become a member of the customer advisory board • Get involved in our on-line community (coming soon) – Provide the voice

JOIN US!Sign up for the mailing list at: www.idsalliance.org/contact-us