Is your organization considering including cloud offerings in your identity and access management strategy (IAM) strategy? Maybe you’ve already extended your IAM program to include one or more cloud services. Maybe you’re just starting to consider options. No matter where you are today, it’s likely that your IAM program will include “the cloud” soon, and in fact you may be “in the cloud” now without fully realizing it.
Members of Internet2’s Community Architecture Committee for Trust and Identity (CACTI) discussed some of the important, but sometimes less obvious considerations to address when adding or moving to cloud-based IAM services. They looked at different approaches for utilizing the cloud in your IAM program, considered what capabilities they can offer, and what you’ll need to preserve locally, and discussed some of the community-supported resources that may help.
Speakers: Margaret Cullen, president & CEO, Painless Security, and Kevin Hickey, director of information security, University of Detroit Mercy
Moderator: Rob Carter, Consultant, Duke University