blogs

Information Management Strategic Directions: ICT Futures for the Government of BC

My notes from a presentation I attended on March 21, 2007.

Presenter:
Dave Nikolejsin, Government Chief Information Officer (GCIO), BC

Hosted by: ISACA Victoria

Global Information Security Priorities and Identity Management

On November 14 2006, Ernst&Young released their 2006 Global Information Security Survey: Achieving Success in a Globalized World. The following priorities and drivers were described this report.

Microsoft IDAM Strategy

The following is a summary of a Microsoft webcast:

Optimize Your Identity and Access Management Infrastructure
October 12, 2006
Sandy Sharma, Vice President of Technology and Strategy, INS

Microsoft is focused on five identity management solution areas:

1. directory services

  • Tech/Product: ActiveDirectory
  • support for multi-authentication tech; e.g. pki, multi-factor
  • SSO, particularly within office environment

Symantec to consider IDM solution for consumers

Symantec CEO says no Vista for me
By Joris Evers, CNET News.com,
February 19, 2007
zdnetindia.com

Excerpt:


You've said that managing user identities is one of the most pressing challenges that face enterprises today. You've said that identity management is in an area where Symantec might acquire a company. Where are you at when it comes to that?

Thompson: Identity management has to be parsed based upon whose identity you are trying to protect. At the corporate level, there is no shortage of solutions that corporations have tried to deploy for years to solve this identity management problem, so I just don't think that's an area where Symantec should expend its resources.

musing on Trust, Security, and Identity

I've recently seen a couple of discussions about IDAM in the larger context of trust. E.g. Martin Harrod's Vancouver ISSA presentation Designing TRUST into Identity and Access Management Solutions

It's got me thinking again about the relationship between trust, security, and identity.

I think the key challenge for non-IT/CompSci people looking at computational trust modeling is that, because we are interacting in virtualized environments, we need to explicitly construct the necessary abstractions to support our expectations about these interactions.

Syndicate content