DOCUMENT RESOURCES FOR EVERYONE
Technology CIS13: Identity Trends and Transients

1. Making Leaders Successful Every Day 2. Trends, Transients, Tropes, and Transparents Eve Maler, Principal Analyst, Security & Risk Cloud Identity Summit July 10, 2013…

Technology Extending the Power of Consent with User-Managed Access & OpenUMA

Extending the Power of Consent with User-Managed Access & OpenUMA FORGEROCK.COM Eve Maler VP Innovation & Emerging Technology [email protected] @xmlgrrl April…

Technology Digital Consent: Taking UMA from Concept to Reality

1. DIGITAL CONSENT TAKING UMA FROM CONCEPT TO REALITY Eve Maler (@xmlgrrl) 2. The personal data gathering dark ages Web 1.0 Web 2.0 Copyright © Identity Summit 2015, all…

Software Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

1. Copyright © 2015 ForgeRock, all rights reserved. CONSENT 2.0 APPLYING USER-MANAGED ACCESS TO THE PRIVACY CHALLENGE July 21, 2015 2. Copyright © 2015 ForgeRock, all rights…

Technology CIS 2015 Identity Relationship Management in the Internet of Things

1. IDENTITY RELATIONSHIP MANAGEMENT IN THE INTERNET OF THINGS TRIANGULATING PEOPLE, DEVICES, AND SERVICES Eve Maler | @xmlgrrl | [email protected] 10 June 2015 2. From…

Technology Identity access and privacy in the new hybrid enterprise slides

1. Identity, Access & Privacy in the New HybridEnterprise Scott Morrison Eve MalerCTO, Layer 7 Technologies Principal Analyst, Forrester Research, Inc.May 17, 2012…