blogs
Information Management Strategic Directions: ICT Futures for the Government of BC
Submitted by gmahoney on Thu, 2007-03-22 14:47.My notes from a presentation I attended on March 21, 2007.
Presenter:
Dave Nikolejsin, Government Chief Information Officer (GCIO), BC
Hosted by: ISACA Victoria
Global Information Security Priorities and Identity Management
Submitted by gmahoney on Tue, 2007-02-20 21:36.On November 14 2006, Ernst&Young released their 2006 Global Information Security Survey: Achieving Success in a Globalized World. The following priorities and drivers were described this report.
Microsoft IDAM Strategy
Submitted by gmahoney on Tue, 2007-02-20 21:22.The following is a summary of a Microsoft webcast:
Optimize Your Identity and Access Management Infrastructure
October 12, 2006
Sandy Sharma, Vice President of Technology and Strategy, INS
Microsoft is focused on five identity management solution areas:
1. directory services
- Tech/Product: ActiveDirectory
- support for multi-authentication tech; e.g. pki, multi-factor
- SSO, particularly within office environment
Symantec to consider IDM solution for consumers
Submitted by gmahoney on Tue, 2007-02-20 00:32.Symantec CEO says no Vista for me
By Joris Evers, CNET News.com,
February 19, 2007
zdnetindia.com
Excerpt:
You've said that managing user identities is one of the most pressing challenges that face enterprises today. You've said that identity management is in an area where Symantec might acquire a company. Where are you at when it comes to that?
Thompson: Identity management has to be parsed based upon whose identity you are trying to protect. At the corporate level, there is no shortage of solutions that corporations have tried to deploy for years to solve this identity management problem, so I just don't think that's an area where Symantec should expend its resources.
musing on Trust, Security, and Identity
Submitted by gmahoney on Fri, 2007-01-26 03:31.I've recently seen a couple of discussions about IDAM in the larger context of trust. E.g. Martin Harrod's Vancouver ISSA presentation Designing TRUST into Identity and Access Management Solutions
It's got me thinking again about the relationship between trust, security, and identity.
I think the key challenge for non-IT/CompSci people looking at computational trust modeling is that, because we are interacting in virtualized environments, we need to explicitly construct the necessary abstractions to support our expectations about these interactions.