Latest Training: Consumer Identity & Access Management Market & Technology Overview
The Why: To provide a virtual workshop for industry leaders, practitioners and consultants looking to develop external facing identity and access management systems.
The course is run by Simon Moffatt, author of CIAM Design Fundamentals,
For Who: Your Current Role: Information leader, CISO, identity architect, security architect, CIO, digital consultant
Pre-Reqs: Infrastructure understanding, digital concepts, basic security, basic identity. This is a no-code course.
The What: PDF copy of “Consumer Identity & Access Management Design Fundamentals” book
~8 modules of deep dive learning content – covering technical, business and requirements design.
Based on the
The CIAM Market and Technology overview course is based on the best selling book “Consumer Identity & Access Management: Design Fundamentals”.
A business focused Industry first book on consumer identity
Kindle & Paperback
Digital or paperback copy available for free when buying course
A 2 day immersive masterclass, providing industry experts with a deep dive learning experience, coupled with demonstrations and technology showcases from the leading consumer identity and access management vendors in the industry.
CIAM Masterclass Day 1
A live virtual masterclass to prepare industry leaders with the skills to develop and procure internet scale secure and usable digital experiences. Day 1 will introduce the key terms and a methodology for design.
The differences to CIAM. Employee automation and origins.
We analyse two CIAM case studies – one in the public sector and one in the private sector, focusing on the objectives, strategy and tactics.
We explore the benefits of consumer identity to both the end user and the service provider
What is driving demand for digital identity – digital transformation and emerging security threats amongst them.
Onboarding and Proofing
How are identities created in the external facing world and how is proofing evolving?
Security as a first relies on the ability to capture and analyse context as well as responding proactively with adaptive controls.
Compliance initiatives such as GDPR and CCPA are promoting the need for strong consent capture, storage and revocation capabilities.
Be it based on standard MFA or modern biometrics and passwordless authentication how best to authenticate end users?
External identities will require a central dashboard experience to manage preferences and data requests.
Consumer identity data will be integrated across a range of systems – be it PII or activity data. CRM, data platforms and profile stores will require strong integration.
Understanding the requirements for a new consumer project can be complex and full of nuance.
Consumer identity will introduce new stakeholders to the identity team such as the CMO, CDO and CEO. We need to understand and validate their needs and objectives.
Consumer identity platforms will require a broad set of features and capabilities in a solution design that covers many different systems with different success metrics.
CIAM Masterclass Day 2
Day 2 will see us understand the key technology areas and how we can measure success.
Crypto Crash Course
A 101 primer to some of the key cryptographic themes and how they relate to CIAM.
OAuth2 and OIDC
OAuth2 and OIDC are omnipresent in the protection of APIs and micro services. We will introduce the concepts.
SCIM & LDAP
Identity data needs creating and storing. Standards such as SCIM and LDAP provide mechanisms that help.
APIs, REST & JSON
The modern app is based on APIs -some key terms and acronyms and how they relate to app design.
Modern authentication should not rely on passwords – FIDO and its more recent evolution can get us there.
User Managed Access
User centric sharing is a fundamental property of an external facing system. How can data be shared? UMA may help.
Procuring a consumer identity platform can be complex and time consuming. What is the process and how can it be managed?
A request for proposal will be a useful part of the vendor engagement process. How can they be designed?
A proof of concept may be a key component of the vendor analysis process. What are the different types and how can they be designed and managed?
Measuring success will not only help calculate returns on investment but can also help expand a CIAM project into new areas. We examine some samples.
Metrics effectiveness will focus upon how quantitative and qualitative measurements can be applied to a range of different capabilities to understand their success.
Consumer identity platforms will introduce a range of both volume and transaction performance characteristics that need designing and measuring.
Demonstrations and Technology Showcase
Each day will feature demonstrations and questions and answers with some of the leading providers of consumer identity and access management capabilities in the market – from full platforms, to authentication and passwordless technology.
Simon is Founder & Analyst at The Cyber Hut and owns all content and strategic direction. He has a 20+ year career within the identity and access management space, having worked as a consultant, product manager and technical sales leader.
He is author of CIAM Design Fundamentals and has reviewed identity standards at the likes of NIST and the IETF.