Identity Defined Security Alliance

Putting Identity at the Center of Security

Category Topics

Customer Advisory Board Q&A

This is your chance to engage with the practitioners who are working behind the scenes, on behalf of the community, to help shape the IDSA. They are experienced identity and security leaders from a cross-section of industries - Adobe, Brighthouse Financial, Optum and Wells Fargo - and have volunteered their time and expertise to help other practitioners succeed in reducing the risk of a breach through an identity-centric approach to security. Ask them why they got involved, ask them what makes identity-centric security the right approach, ask them their thoughts on best practices, ask them anything - as long as it relates to identity-centric security and the IDSA!
0

Business Initiatives

We’ll be developing identity centric security frameworks for the most important business initiatives within organizations today. Let us know what’s important to you.
3

Identity Defined Security Controls

This category is to capture content, feedback and discussion on IDSA Security Controls. Security Controls are Identity-centric security patterns combining identity and security capabilities that help organizations leverage an identity context to improve security posture. Have you implemented an integration that maps to one of the security controls? What worked? What didn’t work? What are the tips and tricks to make it work?
11

Conferences and Events

This category is to capture content, feedback and discussion on IDSA conference participation. Suggestions on conferences we should sponsor and information on conferences we are sponsoring.
7
4

Site Feedback

Discussion about this site, its organization, how it works, and how we can improve it.
0

Best Practices

Use this category to provide feedback on the Best Practices that have been developed. Share best practices or stories (good and bad) of implementing IAM programs. What worked? What didn’t work? What are your best practices?
0

Identity Defined Security Framework

Use this category to provide feedback on the IDS Framework that have been developed. Share your thoughts, feedback or stories (good and bad) of implementing the framework or similar identity and security solutions. What worked? What didn’t work? What are your best practices?
0

Use Cases

This category is to capture content, feedback and discussion on IDSA Use Cases. Use Cases are blueprints that combine IDSA Security Controls to implement identity-centric security for complex business initiatives and scenarios.
0