IdentityFirst Summit 2014 Proceedings

Identity First Summit Proceedings: Access the full proceedings from our inaugural Summit event, including presentations, attendees list, speakers bios.

Identity Access Management: Beyond Convenience

Most people outside our community think identity and access management (IAM) is merely a "single sign-on" issue. This paper aims to clarify and explain the full scope of IAM to support your organization increase productivity, strengthen security and achieve regulatory compliance.

Read more>>

Most Innovative and Fastest Growing Companies Join to Collaborate on Identity Management Challenges

October 21, 2014 Announces Agenda for Inaugural Summit San Francisco, CA – Oct. 21, 2014 –, the first industry forum focused on best practices for identity manag…

Read more>>

How IAM Helps Susan G. Komen Foundation Fulfull Its Mission

October 9, 2014

I was already familiar with the Susan G. Komen Foundation and the outstanding work they do to educate, support research, offer grants, provide emotional assistance and advocate for better bre…

Read more>>

Where to Improve Your Identity Program? Benchmarking will help

September 16, 2014

As an IT Identity Practitioner, do you have all the answers to execute your identity policy across the organization? Do you have visibility into all apps (web, mobile, desktop) used in your o…

Read more>> Announces Inaugural Global Summit on Identity Management from October 29 - 30, 2014

September 10, 2014

IT Leaders to Share Identity Management Challenges, Best Practices and Vision in Their Transformation to Identity First and Explore the Future of Active Directory (AD), Cloud Directory, Mobile…

Read more>>

The Cloud Changes Everything - Especially for the IT Team

September 3, 2014

It sounds like an oversimplification but it really isn’t. Nothing works the same way in business today as it did even ten years ago. And that’s especially true of the IT departmen…

Read more>>

Death of the VPN

August 27, 2014

Juniper’s recent sale of its SSL VPN business to Siris Capital is just another nail in the coffin for on-premise software. Juniper owned the lion’s share of the SSL VPN market and…

Read more>>

Securing Cloud Apps at Pandora Part 4: Lessons Learned

August 20, 2014

In previous posts for Identity First, I discussed processes and tools for onboarding cloud vendors. I described Pandora’s cloud vendor onboarding certification (CVOC) policy, which enab…

Read more>>

Top Ten Excuses Cloud Vendors Give for Not Having a SAML Connector, and How to Respond Constructively

August 14, 2014

In previous posts for Identity First, my colleague Doug Meier described Pandora’s cloud vendor onboarding certification (CVOC) policy and explained why we think it is essential for ente…

Read more>>

Best Practices for Getting Employees On-board with Identity and Access Management

August 4, 2014

At RichRelevance, we manage more than 70 web applications. Doing so has its challenges, such as maintaining security and access control, and staying compliant with the various rules and regul…

Read more>>

Securing Cloud Apps at Pandora - Part 3: Essentials of a CVOC Survey

July 28, 2014

In my previous posts for Identity First, I introduced Pandora’s policy for onboarding cloud vendors and discussed the steps security professionals can take to drive the cultural adoptio…

Read more>>

Shadow-y IT

While cloud computing is typically the primary driver of these Shadow IT and Shadow-y IT situations, it can also be the answer according to our conversations and recent survey work.

Read more>>


Benchmark Your Identity Program vs. Your Peers.  It takes just 5 minutes to complete the the Benchmark Survey. All participants get a copy of the completed study.  Survey open for two weeks only.  


On October 29th and 30th, join the conversation live in Sausalito, CA at the Identity First Summit 2014. Members from companies like Yahoo, Netflix, Pandora and Zendesk will discuss challenges and best practices for their identity first journeys.