Friday, January 07, 2005

Boundaryless Information Flow TM: Architecting Identity Management

This year, the Cyberspace Law Committee is working with the Open Group to encourage our members to learn about and perhaps attend the other group's meetings. The Open Group's meeting is in nearby San Francisco and partially overlaps with our meeting. Our Friday morning sessions will include a presentation by members of the Open Group.

More information about the Open Group meeting follows:

January 24-28, 2005
Hyatt at Fisherman's Wharf
San Francisco, CA

• Keynote Speaker: Jamie Lewis, CEO and Research Chair, Burton Group
Dr. Gene Schultz, Principal Engineer, Lawrence Berkeley National Laboratory
Justin Taylor, Chief Strategist, Digital Identity, Office of the CTO, Novell Inc.
Steve Neville, Senior Manager Identity Management, Entrust

Identity management is a convergence of technology and business processes. There is no single approach to identity management as the strategy must reflect specific requirements within the business and technology context of each organization. Therefore, it is critical that enterprises take an IT enterprise architecture approach to addressing their need for identity management.

The Open Group is the leading consortium for architecture development methodology and is developing an extensive standards information base, technical reference model and resource base for IT enterprise architects to use as reference material. The information being developed is not only of benefit to IT enterprise architects but also to managers responsible for directing vendors engaged in identity management projects, to ensure an open-systems based solution which will avoid lock-in and unnecessary complexity.

The Open Group conference will spotlight the progress being made on enabling interoperable identity management solutions. The conference will provide valuable information on the current thinking in identity management (business value, security & technical perspectives) and will look at the roadmap for resolving issues:

• Architecting an identity management framework.
• The business requirement for identity, authentication and assurance.
• Progressing standards for identity management.
• Controlling the risk and securing your intellectual property.

For more details, please visit their conference website at

No comments: