SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Broadridge Financial Services
adrianchernoff
Vice President of Digital Strategy
ENABLES A NEW DIGITAL RELATIONSHIP
Copyright 2014
I D E N T I T Y
July 20, 2014
IDENTITY USE CASE
WHO WE ARE
THE CONSUMER
INDUSTRY CHALLENGE
THE OPPORTUNITY
1
2
3
4
THE POWER OF IDENTITY5
Identity enables a New Digital Relationship
Identity Enables a New Digital Relationship 2 Copyright 2014
IDENTITY IS CORETO OUR
DIGITAL PRODUCT OFFERING
Identity Enables a New Digital Relationship
IDENTITY USE CASE
SECURITY PRIVACY ACCESS
3 Copyright 2014
I D E N T I T Y
WHO WE ARE NYSE: BR1
• Responsible for sending out proxies and tallying shareholder votes
for tens of millions of stock owners around the world
• Processes 85% of all outstanding shares voted in the U.S. and 72% of
shares voted outside of the U.S.
Excerpts from the November 18, 2013 issue of Forbes
http://www.forbes.com/sites/steveschaefer/2013/10/30/the-broad-reach-of-broadridge-the-most-important-financial-firm-youve-never-heard-of/
“Broadridge is the most important firm on
Wall Street that you’ve never heard of”
Former NewYork Stock Exchange chairman and CEO Dick Grasso
Identity Enables a New Digital Relationship 4 Copyright 2014
WHO WE ARE
A Financial Industry Communications Hub
950+
Banks & Brokers
12,000
Corporate issuers
550+
Mutual funds
Institutional
investors
Retirement Plans,
VA’s/TPA’s
140,000,000 +
Individual Accounts
3 billion distributions annually
across North America, proprietary technology
drives 60% + suppression rates
NYSE: BR1
Identity Enables a New Digital Relationship 5 Copyright 2014
~55 ~450
Rela)onships Annual	
  Communica)ons
Financial'
12'
Insurance'
6'
U1li1es'
6'
Government'
8'
Other/'
Small'Biz'
23'
Financial'
175'
Insurance'
64'
U3li3es'
56'
Government'
96'
Other/'
Small'Biz'
66'
WHO WE ARE
Out of the~55 providers that consumers receive printed
communications from - financial is a significant portion
1
Research*	
  shows	
  that	
  for	
  consumers	
  to	
  adopt	
  “DIGITAL	
  COMMUNICATIONS”	
  they	
  need	
  to	
  be	
  
able	
  to	
  access	
  at	
  least	
  60%	
  of	
  their	
  content	
  through	
  a	
  channel	
  of	
  their	
  choosing	
  versus	
  needing	
  
to	
  use	
  55	
  different	
  web	
  sites	
  or	
  apps
*Research	
  from	
  Infotrends	
  report	
  “The	
  Future	
  of	
  MulM-­‐channel	
  TransacMonal	
  CommunicaMons	
  in	
  the	
  U.S.”
Identity Enables a New Digital Relationship 6 Copyright 2014
TO UNDERSTAND IDENTITY WE FIRST
NEEDTO KNOW OUR CONSUMER
Identity Enables a New Digital Relationship
SECURITY PRIVACY ACCESS
7 Copyright 2014
2 THE CONSUMER
I D E N T I T Y
2 THE CONSUMER
Identity Enables a New Digital Relationship
• Consumers are moving to digital at an unprecedented rate
• Financial services firms have yet to fully take advantage …
• Resulting in high print-mail costs and un-fulfilled opportunities to
enhance customer relationships
• Research illustrates solutions must be consumer centric and digital
interactions must be superior to physical experiences they replace
Successful digital solutions prioritize the needs of the consumer
8 Copyright 2014
2
Early	
  AdopterMainstream	
  AdopterLate	
  AdopterHow	
  would	
  you	
  describe	
  
your	
  personal	
  approach	
  to	
  new	
  technologies?
Source:	
  InfoTrends	
  The	
  Emergence	
  of	
  Digital	
  Mailbox	
  Services	
  Report,	
  November	
  2011
of New Technologies
Adoption by Age
55%
34%
Early
Adopter
Mainstream
Adopter
Late
Adopter
Adoption by Income
42%
33%
of iPads
Apple
iPad
2/12/2012	
  –	
  iPad	
  owners	
  tend	
  to	
  be	
  older	
  and	
  have	
  more	
  money
Source:	
  h"ps://www.npd.com/wps/portal/npd/us/news/press-­‐releases/pr_120217/
THE CONSUMER
Identity Enables a New Digital Relationship 9 Copyright 2014
2
Billion
800
Million
1.7
Billion
1.3
Billion
2015
2009
2015
2009
Source: Morgan Stanley Research http://www.slideshare.net/guest1222bdb/mary-meeker-april-2010-internet-trends
time spent with mobile is growing at 14 times the rate of the desktop
Source: http://m.cmo.com/articles/2013/1/3/the_5_digital_ds_of_.html
2 THE CONSUMER
Mobile vs. Desktop
Global Internet Users
Identity Enables a New Digital Relationship 10 Copyright 2014
DESKTOP
TABLET
SMARTPHONE
http://monetate.com/research/Monetate Q4 2013 Ecommerce Quarterly
Q4
2013
Q4
2012
WEBSITE TRAFFIC BY DEVICE
2 THE CONSUMER
Identity Enables a New Digital Relationship 11 Copyright 2014
2 THE CONSUMER
http://comscore.com/
Identity Enables a New Digital Relationship 12 Copyright 2014
2 THE CONSUMER
Identity Enables a New Digital Relationship 13
http://www.businessinsider.com/ipads-dominate-tablet-
usage-2013-5#ixzz2g22INtdV
Apple iPad Global Market
Share 32.4%
Android
Tablets
Microsoft
Surface
Apple
iPadKindle
Fire
http://chitika.com
TABLET
GLOBAL MARKET SHARE
TABLET
WEB TRAFFIC
Copyright 2014
HOW EFFECTIVE ISTHE INDUSTRY
AT ENGAGING CONSUMERS
Identity Enables a New Digital Relationship
SECURITY PRIVACY ACCESS
14 Copyright 2014
3 INDUSTRY CHALLENGE
I D E N T I T Y
3 INDUSTRY CHALLENGE
Identity Enables a New Digital Relationship
75%	
  OF	
  CLIENTS
CREDENTIALED
60%	
  OF	
  CLIENTS
ACTIVE	
  USERS
RETAIL	
  BANKING
25%	
  OF	
  CLIENTS
CREDENTIALED
5%	
  OF	
  CLIENTS
ACTIVE	
  USERS
WEALTH	
  MANAGEMENT
6%	
  OF	
  CLIENTS
CREDENTIALED
1%	
  OF	
  CLIENTS
ACTIVE	
  USERS
INSURANCE
15
Unfortunately with the exception of retail banking, financial firms have
had difficulty in taking advantage of these trends
Copyright 2014
3 INDUSTRY CHALLENGE
Identity Enables a New Digital Relationship 16
Most companies utilize a Business to Consumer (b2c) model when it
comes to digital efforts.
• In essence financial service companies are
telling their clients to “COMETO ME”
• There are many reasons companies prefer
this approach:
• Control of the overall experience and
content
• Ability to Ensure Regulatory Compliance
• Security
• Unfortunately this approach often does
not resonate with consumers
Firm	
  Websites
&	
  Mobile	
  Apps
Copyright 2014
b2c
3 INDUSTRY CHALLENGE
Identity Enables a New Digital Relationship 17
Cons-­‐
umers
192M
141M*
78M*
92M*
Average	
  Wealth	
  Mgmt	
  web	
  site	
  
<	
  350k	
  monthly	
  users
~	
  5%	
  of	
  account	
  holders
Bank	
  
Site
Given the number of options consumers have … A “COME TO ME”
strategy has resulted in firms getting lost among giants
Copyright 2014
CHANGINGTHE BUSINESS MODEL
Identity Enables a New Digital Relationship
SECURITY PRIVACY ACCESS
18 Copyright 2014
4 THE OPPORTUNITY
I D E N T I T Y
4 THE OPPORTUNITY
Identity Enables a New Digital Relationship 19
A better approach would be to shift from a business focused model to
a consumer focused model
“COME	
  TO	
  ME”
“GO	
  TO	
  THEM”
Copyright 2014
has	
  yet	
  to	
  resonate	
  with	
  consumers	
  
and	
  has	
  been	
  largely	
  unsuccessful	
  
despite	
  significant	
  investments
b2c c2b
Bank	
  
Site
consumers
firm
20
4 THE OPPORTUNITY
Identity Enables a New Digital Relationship
For firms to go where the consumers already “live” - Identity is key
Copyright 201420
IDENTITY POWER’S OUR BUSINESS MODEL
Identity Enables a New Digital Relationship
SECURITY PRIVACY ACCESS
21 Copyright 2014
5 THE POWER OF IDENTITY
I D E N T I T Y
• Adaptive
• Reconfigurable
• Better for Customers
• Better for Clients
ADDITIONAL BENEFITS
c2b
22Identity Enables a New Digital Relationship 22 Copyright 2014
5 THE POWER OF IDENTITY
our business model
leverages the power of identity
Financial'
175'
Insurance'
64'
U3li3es'
56'
Government'
96'
Other/'
Small'Biz'
66'
Financial'
12'
Insurance'
6'
U1li1es'
6'
Government'
8'
Other/'
Small'Biz'
23'
~55
+
puXng	
  the	
  consumer	
  in	
  control,	
  by	
  pushing	
  
communicaZons	
  through	
  the	
  channels	
  they	
  
use	
  every	
  day
Investing
Banking
Telco
Small Business
Healthcare
Insurance
Identity Management
5 THE POWER OF IDENTITY
Facilitates secure communication between brands and consumers
23Identity Enables a New Digital Relationship Copyright 201423
Digital Mailboxes
(e.g. Canada ePost)
Online Banking
Cloud Drives
(e.g. Dropbox, Evernote)
Aggregation sites
(e.g. Mint.com)
Social Networks
Working	
   with	
   IDW	
   on	
  
several	
   soluZons	
   both	
  
d o m e s Z c a l l y	
   a n d	
  
internaZonally	
   that	
   will	
  
uZlize	
   IDW’s	
   a"ribute	
  
exchange	
   to	
   validate	
  
consumer	
  idenZZes
First	
  step	
  for	
  Broadridge	
  
to	
   introduce	
   innovaZve	
  
services	
   that	
   enhance	
  
user	
   experience	
   and	
  
privacy,	
   lower	
   industry	
  
costs,	
   and	
   drive	
   new	
  
sources	
  of	
  revenue
NSTIC PILOT
Brands (i.e. mailers) Channels
Digital Mailboxes
(e.g. Canada ePost)
Online Banking
Cloud Drives
(e.g. Dropbox, Evernote)
Aggregation sites
(e.g. Mint.com)
Social Networks
Consumers
Investing
Banking
Telco
Small Business
Healthcare
Insurance
Digital
Platform
Channel Mgmt
Preference Mgmt
Identity Mgmt
Digitization of content
• Brands across multiple verticals participate
• Brands have one integration point
• Brands control security (a federated model, as
brands store data behind their firewalls)
• Platform connects to
the channels brands
support and
consumers are using
• Consumers receive
additional content
from channels they
are already using
5 THE POWER OF IDENTITY
Identity is the glue in our model to enable consumer adoption
24Identity Enables a New Digital Relationship Copyright 201424
Identity Enables a New Digital Relationship 25 Copyright 2014
• Technology is changing consumer behavior
• Consumers have multiple digital relationships and they want an
easier way to connect
• Broadridge is changing the business model by leveraging Identity
• to improve the customer experience
• to empower consumers with more choice
• to improve consumer adoption
• to drive digital relationships
• to give brands more flexibility
• to help brands reduce costs
• Identity is the glue that makes our business model happen
• enabled by NSTIC and IDW
TAKE AWAYS
26 Copyright 2014 July 20, 2014
Broadridge Financial Services
adrianchernoff
Vice President of Digital Strategy
ENABLES A NEW DIGITAL RELATIONSHIP
I D E N T I T Y

Weitere ähnliche Inhalte

Was ist angesagt?

Leaflet ingenious
Leaflet ingenious Leaflet ingenious
Leaflet ingenious iNGENIOUSIoT
 
Inkling Trends 2013
Inkling Trends 2013Inkling Trends 2013
Inkling Trends 2013Nico Sarti
 
Isobar 2016 Trend Report: Australian Edition
Isobar 2016 Trend Report: Australian EditionIsobar 2016 Trend Report: Australian Edition
Isobar 2016 Trend Report: Australian EditionIsobar Australia
 
AI, Blockchain, IOT, Evolution or Singularity? Digital Identity And Digital ...
AI, Blockchain, IOT,  Evolution or Singularity? Digital Identity And Digital ...AI, Blockchain, IOT,  Evolution or Singularity? Digital Identity And Digital ...
AI, Blockchain, IOT, Evolution or Singularity? Digital Identity And Digital ...Dinis Guarda
 
Architecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API EcosystemArchitecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API EcosystemOleg Dulin
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Company Presentation
Company PresentationCompany Presentation
Company Presentationbroadchoice
 
ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)scomes
 
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...Eurotech
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Harbor Research - The Internet of Things Meets the Internet of People
Harbor Research - The Internet of Things Meets the Internet of PeopleHarbor Research - The Internet of Things Meets the Internet of People
Harbor Research - The Internet of Things Meets the Internet of PeopleHarbor Research
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesPavan Kumar
 
Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1accenture
 
12 Digital Predictions for 2012
12 Digital Predictions for 201212 Digital Predictions for 2012
12 Digital Predictions for 2012Kantar
 
Trends in Digital 2019
Trends in Digital 2019Trends in Digital 2019
Trends in Digital 2019Kalev Peekna
 

Was ist angesagt? (19)

Leaflet ingenious
Leaflet ingenious Leaflet ingenious
Leaflet ingenious
 
Inkling Trends 2013
Inkling Trends 2013Inkling Trends 2013
Inkling Trends 2013
 
Isobar 2016 Trend Report: Australian Edition
Isobar 2016 Trend Report: Australian EditionIsobar 2016 Trend Report: Australian Edition
Isobar 2016 Trend Report: Australian Edition
 
AI, Blockchain, IOT, Evolution or Singularity? Digital Identity And Digital ...
AI, Blockchain, IOT,  Evolution or Singularity? Digital Identity And Digital ...AI, Blockchain, IOT,  Evolution or Singularity? Digital Identity And Digital ...
AI, Blockchain, IOT, Evolution or Singularity? Digital Identity And Digital ...
 
Architecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API EcosystemArchitecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API Ecosystem
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Company Presentation
Company PresentationCompany Presentation
Company Presentation
 
ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)
 
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
 
Emerging Technologies
Emerging  TechnologiesEmerging  Technologies
Emerging Technologies
 
Top 9 Technology Trends 
Top 9 Technology Trends Top 9 Technology Trends 
Top 9 Technology Trends 
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Empathic Computing: From Wearables to Biohacking
Empathic Computing: From Wearables to BiohackingEmpathic Computing: From Wearables to Biohacking
Empathic Computing: From Wearables to Biohacking
 
Harbor Research - The Internet of Things Meets the Internet of People
Harbor Research - The Internet of Things Meets the Internet of PeopleHarbor Research - The Internet of Things Meets the Internet of People
Harbor Research - The Internet of Things Meets the Internet of People
 
Ethics of computing
Ethics of computingEthics of computing
Ethics of computing
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
 
Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1
 
12 Digital Predictions for 2012
12 Digital Predictions for 201212 Digital Predictions for 2012
12 Digital Predictions for 2012
 
Trends in Digital 2019
Trends in Digital 2019Trends in Digital 2019
Trends in Digital 2019
 

Andere mochten auch

CIS14: Spinning New Threads with Existing Identity Systems
CIS14: Spinning New Threads with Existing Identity SystemsCIS14: Spinning New Threads with Existing Identity Systems
CIS14: Spinning New Threads with Existing Identity SystemsCloudIDSummit
 
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...CloudIDSummit
 
2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summitCloudIDSummit
 
CIS13: Identity Tech Overview: Less Pain, More Gain
CIS13: Identity Tech Overview: Less Pain, More GainCIS13: Identity Tech Overview: Less Pain, More Gain
CIS13: Identity Tech Overview: Less Pain, More GainCloudIDSummit
 
CIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
CIS14: Bringing Crypto Back: Web Authentication without Bearer TokensCIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
CIS14: Bringing Crypto Back: Web Authentication without Bearer TokensCloudIDSummit
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCloudIDSummit
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCloudIDSummit
 
CIS14: Authorization: It's What's for Dessert
CIS14: Authorization: It's What's for DessertCIS14: Authorization: It's What's for Dessert
CIS14: Authorization: It's What's for DessertCloudIDSummit
 
CIS14: Handling Identity in AllJoyn 14.06
CIS14: Handling Identity in AllJoyn 14.06CIS14: Handling Identity in AllJoyn 14.06
CIS14: Handling Identity in AllJoyn 14.06CloudIDSummit
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCloudIDSummit
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...CloudIDSummit
 
CIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Best Practices You Must Apply to Secure Your APIsCIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Best Practices You Must Apply to Secure Your APIsCloudIDSummit
 
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CloudIDSummit
 
CIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the EnterpriseCIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the EnterpriseCloudIDSummit
 
CIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST APICIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST APICloudIDSummit
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCloudIDSummit
 
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...CloudIDSummit
 

Andere mochten auch (19)

CIS14: Spinning New Threads with Existing Identity Systems
CIS14: Spinning New Threads with Existing Identity SystemsCIS14: Spinning New Threads with Existing Identity Systems
CIS14: Spinning New Threads with Existing Identity Systems
 
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
CIS13: The Good, The Bad, and the Government: Wrangling Attributes in the Sta...
 
2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summit
 
CIS13: Identity Tech Overview: Less Pain, More Gain
CIS13: Identity Tech Overview: Less Pain, More GainCIS13: Identity Tech Overview: Less Pain, More Gain
CIS13: Identity Tech Overview: Less Pain, More Gain
 
CIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
CIS14: Bringing Crypto Back: Web Authentication without Bearer TokensCIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
CIS14: Bringing Crypto Back: Web Authentication without Bearer Tokens
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground Up
 
CIS14: Authorization: It's What's for Dessert
CIS14: Authorization: It's What's for DessertCIS14: Authorization: It's What's for Dessert
CIS14: Authorization: It's What's for Dessert
 
CIS14: Handling Identity in AllJoyn 14.06
CIS14: Handling Identity in AllJoyn 14.06CIS14: Handling Identity in AllJoyn 14.06
CIS14: Handling Identity in AllJoyn 14.06
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
 
CIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Best Practices You Must Apply to Secure Your APIsCIS14: Best Practices You Must Apply to Secure Your APIs
CIS14: Best Practices You Must Apply to Secure Your APIs
 
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
 
CIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the EnterpriseCIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the Enterprise
 
CIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST APICIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST API
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
 
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
CIS13: Is Identity the Answer to the Great Question of Life, the Universe, an...
 

Ähnlich wie CIS14: NSTIC: Identity Enables a New Digital Relationship

Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Insurance - Opportunities in a digital and changing world
Insurance - Opportunities in a digital and changing worldInsurance - Opportunities in a digital and changing world
Insurance - Opportunities in a digital and changing worldClaus Høyer Madsen
 
89% of consumers switch to a competitor after a poor CX
89% of consumers switch to a competitor after a poor CX 89% of consumers switch to a competitor after a poor CX
89% of consumers switch to a competitor after a poor CX Abhishek Sood
 
Daring to be Digital - London - 20.11.13
Daring to be Digital - London - 20.11.13Daring to be Digital - London - 20.11.13
Daring to be Digital - London - 20.11.13Precedent
 
Daring to be Digital - Glasgow - 26th Nov 2013
Daring to be Digital - Glasgow - 26th Nov 2013Daring to be Digital - Glasgow - 26th Nov 2013
Daring to be Digital - Glasgow - 26th Nov 2013Precedent
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
Digital strategy Report John Lynn
Digital strategy Report John LynnDigital strategy Report John Lynn
Digital strategy Report John LynnJohn Lynn
 
Technology Vision 2014 by Accenture
Technology Vision 2014 by AccentureTechnology Vision 2014 by Accenture
Technology Vision 2014 by AccentureTaufikurrahman .
 
The Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectivesThe Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectivesMWD Advisors
 
Unlock Digital Banking with SAP Bank Analyzer & S4
Unlock Digital Banking with SAP Bank Analyzer & S4Unlock Digital Banking with SAP Bank Analyzer & S4
Unlock Digital Banking with SAP Bank Analyzer & S4Guillermo Salazar
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?The Digital Insurer
 
Daring to be digital - 13 June 2013
Daring to be digital - 13 June 2013 Daring to be digital - 13 June 2013
Daring to be digital - 13 June 2013 Precedent
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVIDPerficient, Inc.
 
ICAA Business Forum - Harnessing the potential of digital
ICAA Business Forum - Harnessing the potential of digitalICAA Business Forum - Harnessing the potential of digital
ICAA Business Forum - Harnessing the potential of digitalPrecedent
 
Daring to be_digital seminar_5th march edinburgh
Daring to be_digital seminar_5th march edinburghDaring to be_digital seminar_5th march edinburgh
Daring to be_digital seminar_5th march edinburghPrecedent
 
Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Monica Ioannidou Polemitis
 
Digital Enterprise_Cover Story
Digital Enterprise_Cover StoryDigital Enterprise_Cover Story
Digital Enterprise_Cover Storysmita vasudevan
 
Digital Enterprise_Cover Story
Digital Enterprise_Cover StoryDigital Enterprise_Cover Story
Digital Enterprise_Cover Storysmita vasudevan
 

Ähnlich wie CIS14: NSTIC: Identity Enables a New Digital Relationship (20)

Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Insurance - Opportunities in a digital and changing world
Insurance - Opportunities in a digital and changing worldInsurance - Opportunities in a digital and changing world
Insurance - Opportunities in a digital and changing world
 
89% of consumers switch to a competitor after a poor CX
89% of consumers switch to a competitor after a poor CX 89% of consumers switch to a competitor after a poor CX
89% of consumers switch to a competitor after a poor CX
 
Daring to be Digital - London - 20.11.13
Daring to be Digital - London - 20.11.13Daring to be Digital - London - 20.11.13
Daring to be Digital - London - 20.11.13
 
Daring to be Digital - Glasgow - 26th Nov 2013
Daring to be Digital - Glasgow - 26th Nov 2013Daring to be Digital - Glasgow - 26th Nov 2013
Daring to be Digital - Glasgow - 26th Nov 2013
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Digital strategy Report John Lynn
Digital strategy Report John LynnDigital strategy Report John Lynn
Digital strategy Report John Lynn
 
Technology Vision 2014 by Accenture
Technology Vision 2014 by AccentureTechnology Vision 2014 by Accenture
Technology Vision 2014 by Accenture
 
The Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectivesThe Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectives
 
Unlock Digital Banking with SAP Bank Analyzer & S4
Unlock Digital Banking with SAP Bank Analyzer & S4Unlock Digital Banking with SAP Bank Analyzer & S4
Unlock Digital Banking with SAP Bank Analyzer & S4
 
Banking on experience
Banking on experienceBanking on experience
Banking on experience
 
Banks taking a quantum leap through digital 21 April 2015
Banks taking a quantum leap through digital 21 April 2015Banks taking a quantum leap through digital 21 April 2015
Banks taking a quantum leap through digital 21 April 2015
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?
 
Daring to be digital - 13 June 2013
Daring to be digital - 13 June 2013 Daring to be digital - 13 June 2013
Daring to be digital - 13 June 2013
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
ICAA Business Forum - Harnessing the potential of digital
ICAA Business Forum - Harnessing the potential of digitalICAA Business Forum - Harnessing the potential of digital
ICAA Business Forum - Harnessing the potential of digital
 
Daring to be_digital seminar_5th march edinburgh
Daring to be_digital seminar_5th march edinburghDaring to be_digital seminar_5th march edinburgh
Daring to be_digital seminar_5th march edinburgh
 
Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...
 
Digital Enterprise_Cover Story
Digital Enterprise_Cover StoryDigital Enterprise_Cover Story
Digital Enterprise_Cover Story
 
Digital Enterprise_Cover Story
Digital Enterprise_Cover StoryDigital Enterprise_Cover Story
Digital Enterprise_Cover Story
 

Mehr von CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Mehr von CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Kürzlich hochgeladen

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

CIS14: NSTIC: Identity Enables a New Digital Relationship

  • 1. Broadridge Financial Services adrianchernoff Vice President of Digital Strategy ENABLES A NEW DIGITAL RELATIONSHIP Copyright 2014 I D E N T I T Y July 20, 2014
  • 2. IDENTITY USE CASE WHO WE ARE THE CONSUMER INDUSTRY CHALLENGE THE OPPORTUNITY 1 2 3 4 THE POWER OF IDENTITY5 Identity enables a New Digital Relationship Identity Enables a New Digital Relationship 2 Copyright 2014
  • 3. IDENTITY IS CORETO OUR DIGITAL PRODUCT OFFERING Identity Enables a New Digital Relationship IDENTITY USE CASE SECURITY PRIVACY ACCESS 3 Copyright 2014 I D E N T I T Y
  • 4. WHO WE ARE NYSE: BR1 • Responsible for sending out proxies and tallying shareholder votes for tens of millions of stock owners around the world • Processes 85% of all outstanding shares voted in the U.S. and 72% of shares voted outside of the U.S. Excerpts from the November 18, 2013 issue of Forbes http://www.forbes.com/sites/steveschaefer/2013/10/30/the-broad-reach-of-broadridge-the-most-important-financial-firm-youve-never-heard-of/ “Broadridge is the most important firm on Wall Street that you’ve never heard of” Former NewYork Stock Exchange chairman and CEO Dick Grasso Identity Enables a New Digital Relationship 4 Copyright 2014
  • 5. WHO WE ARE A Financial Industry Communications Hub 950+ Banks & Brokers 12,000 Corporate issuers 550+ Mutual funds Institutional investors Retirement Plans, VA’s/TPA’s 140,000,000 + Individual Accounts 3 billion distributions annually across North America, proprietary technology drives 60% + suppression rates NYSE: BR1 Identity Enables a New Digital Relationship 5 Copyright 2014
  • 6. ~55 ~450 Rela)onships Annual  Communica)ons Financial' 12' Insurance' 6' U1li1es' 6' Government' 8' Other/' Small'Biz' 23' Financial' 175' Insurance' 64' U3li3es' 56' Government' 96' Other/' Small'Biz' 66' WHO WE ARE Out of the~55 providers that consumers receive printed communications from - financial is a significant portion 1 Research*  shows  that  for  consumers  to  adopt  “DIGITAL  COMMUNICATIONS”  they  need  to  be   able  to  access  at  least  60%  of  their  content  through  a  channel  of  their  choosing  versus  needing   to  use  55  different  web  sites  or  apps *Research  from  Infotrends  report  “The  Future  of  MulM-­‐channel  TransacMonal  CommunicaMons  in  the  U.S.” Identity Enables a New Digital Relationship 6 Copyright 2014
  • 7. TO UNDERSTAND IDENTITY WE FIRST NEEDTO KNOW OUR CONSUMER Identity Enables a New Digital Relationship SECURITY PRIVACY ACCESS 7 Copyright 2014 2 THE CONSUMER I D E N T I T Y
  • 8. 2 THE CONSUMER Identity Enables a New Digital Relationship • Consumers are moving to digital at an unprecedented rate • Financial services firms have yet to fully take advantage … • Resulting in high print-mail costs and un-fulfilled opportunities to enhance customer relationships • Research illustrates solutions must be consumer centric and digital interactions must be superior to physical experiences they replace Successful digital solutions prioritize the needs of the consumer 8 Copyright 2014
  • 9. 2 Early  AdopterMainstream  AdopterLate  AdopterHow  would  you  describe   your  personal  approach  to  new  technologies? Source:  InfoTrends  The  Emergence  of  Digital  Mailbox  Services  Report,  November  2011 of New Technologies Adoption by Age 55% 34% Early Adopter Mainstream Adopter Late Adopter Adoption by Income 42% 33% of iPads Apple iPad 2/12/2012  –  iPad  owners  tend  to  be  older  and  have  more  money Source:  h"ps://www.npd.com/wps/portal/npd/us/news/press-­‐releases/pr_120217/ THE CONSUMER Identity Enables a New Digital Relationship 9 Copyright 2014
  • 10. 2 Billion 800 Million 1.7 Billion 1.3 Billion 2015 2009 2015 2009 Source: Morgan Stanley Research http://www.slideshare.net/guest1222bdb/mary-meeker-april-2010-internet-trends time spent with mobile is growing at 14 times the rate of the desktop Source: http://m.cmo.com/articles/2013/1/3/the_5_digital_ds_of_.html 2 THE CONSUMER Mobile vs. Desktop Global Internet Users Identity Enables a New Digital Relationship 10 Copyright 2014
  • 11. DESKTOP TABLET SMARTPHONE http://monetate.com/research/Monetate Q4 2013 Ecommerce Quarterly Q4 2013 Q4 2012 WEBSITE TRAFFIC BY DEVICE 2 THE CONSUMER Identity Enables a New Digital Relationship 11 Copyright 2014
  • 12. 2 THE CONSUMER http://comscore.com/ Identity Enables a New Digital Relationship 12 Copyright 2014
  • 13. 2 THE CONSUMER Identity Enables a New Digital Relationship 13 http://www.businessinsider.com/ipads-dominate-tablet- usage-2013-5#ixzz2g22INtdV Apple iPad Global Market Share 32.4% Android Tablets Microsoft Surface Apple iPadKindle Fire http://chitika.com TABLET GLOBAL MARKET SHARE TABLET WEB TRAFFIC Copyright 2014
  • 14. HOW EFFECTIVE ISTHE INDUSTRY AT ENGAGING CONSUMERS Identity Enables a New Digital Relationship SECURITY PRIVACY ACCESS 14 Copyright 2014 3 INDUSTRY CHALLENGE I D E N T I T Y
  • 15. 3 INDUSTRY CHALLENGE Identity Enables a New Digital Relationship 75%  OF  CLIENTS CREDENTIALED 60%  OF  CLIENTS ACTIVE  USERS RETAIL  BANKING 25%  OF  CLIENTS CREDENTIALED 5%  OF  CLIENTS ACTIVE  USERS WEALTH  MANAGEMENT 6%  OF  CLIENTS CREDENTIALED 1%  OF  CLIENTS ACTIVE  USERS INSURANCE 15 Unfortunately with the exception of retail banking, financial firms have had difficulty in taking advantage of these trends Copyright 2014
  • 16. 3 INDUSTRY CHALLENGE Identity Enables a New Digital Relationship 16 Most companies utilize a Business to Consumer (b2c) model when it comes to digital efforts. • In essence financial service companies are telling their clients to “COMETO ME” • There are many reasons companies prefer this approach: • Control of the overall experience and content • Ability to Ensure Regulatory Compliance • Security • Unfortunately this approach often does not resonate with consumers Firm  Websites &  Mobile  Apps Copyright 2014 b2c
  • 17. 3 INDUSTRY CHALLENGE Identity Enables a New Digital Relationship 17 Cons-­‐ umers 192M 141M* 78M* 92M* Average  Wealth  Mgmt  web  site   <  350k  monthly  users ~  5%  of  account  holders Bank   Site Given the number of options consumers have … A “COME TO ME” strategy has resulted in firms getting lost among giants Copyright 2014
  • 18. CHANGINGTHE BUSINESS MODEL Identity Enables a New Digital Relationship SECURITY PRIVACY ACCESS 18 Copyright 2014 4 THE OPPORTUNITY I D E N T I T Y
  • 19. 4 THE OPPORTUNITY Identity Enables a New Digital Relationship 19 A better approach would be to shift from a business focused model to a consumer focused model “COME  TO  ME” “GO  TO  THEM” Copyright 2014 has  yet  to  resonate  with  consumers   and  has  been  largely  unsuccessful   despite  significant  investments b2c c2b
  • 20. Bank   Site consumers firm 20 4 THE OPPORTUNITY Identity Enables a New Digital Relationship For firms to go where the consumers already “live” - Identity is key Copyright 201420
  • 21. IDENTITY POWER’S OUR BUSINESS MODEL Identity Enables a New Digital Relationship SECURITY PRIVACY ACCESS 21 Copyright 2014 5 THE POWER OF IDENTITY I D E N T I T Y • Adaptive • Reconfigurable • Better for Customers • Better for Clients ADDITIONAL BENEFITS
  • 22. c2b 22Identity Enables a New Digital Relationship 22 Copyright 2014 5 THE POWER OF IDENTITY our business model leverages the power of identity Financial' 175' Insurance' 64' U3li3es' 56' Government' 96' Other/' Small'Biz' 66' Financial' 12' Insurance' 6' U1li1es' 6' Government' 8' Other/' Small'Biz' 23' ~55 + puXng  the  consumer  in  control,  by  pushing   communicaZons  through  the  channels  they   use  every  day
  • 23. Investing Banking Telco Small Business Healthcare Insurance Identity Management 5 THE POWER OF IDENTITY Facilitates secure communication between brands and consumers 23Identity Enables a New Digital Relationship Copyright 201423 Digital Mailboxes (e.g. Canada ePost) Online Banking Cloud Drives (e.g. Dropbox, Evernote) Aggregation sites (e.g. Mint.com) Social Networks Working   with   IDW   on   several   soluZons   both   d o m e s Z c a l l y   a n d   internaZonally   that   will   uZlize   IDW’s   a"ribute   exchange   to   validate   consumer  idenZZes First  step  for  Broadridge   to   introduce   innovaZve   services   that   enhance   user   experience   and   privacy,   lower   industry   costs,   and   drive   new   sources  of  revenue NSTIC PILOT
  • 24. Brands (i.e. mailers) Channels Digital Mailboxes (e.g. Canada ePost) Online Banking Cloud Drives (e.g. Dropbox, Evernote) Aggregation sites (e.g. Mint.com) Social Networks Consumers Investing Banking Telco Small Business Healthcare Insurance Digital Platform Channel Mgmt Preference Mgmt Identity Mgmt Digitization of content • Brands across multiple verticals participate • Brands have one integration point • Brands control security (a federated model, as brands store data behind their firewalls) • Platform connects to the channels brands support and consumers are using • Consumers receive additional content from channels they are already using 5 THE POWER OF IDENTITY Identity is the glue in our model to enable consumer adoption 24Identity Enables a New Digital Relationship Copyright 201424
  • 25. Identity Enables a New Digital Relationship 25 Copyright 2014 • Technology is changing consumer behavior • Consumers have multiple digital relationships and they want an easier way to connect • Broadridge is changing the business model by leveraging Identity • to improve the customer experience • to empower consumers with more choice • to improve consumer adoption • to drive digital relationships • to give brands more flexibility • to help brands reduce costs • Identity is the glue that makes our business model happen • enabled by NSTIC and IDW TAKE AWAYS
  • 26. 26 Copyright 2014 July 20, 2014 Broadridge Financial Services adrianchernoff Vice President of Digital Strategy ENABLES A NEW DIGITAL RELATIONSHIP I D E N T I T Y