Through our Technical Working Groups, members come together to discuss the common challenges happening across the customer landscape. The Technical Working Group (TWG) subcommittees encompass everything from the basics of best practices to innovations at the intersection of identity and security. We partner to examine the problem (or opportunity) and collectively develop vendor-neutral practical guidance to help organizations achieve their security goals through identity.
Our current Technical Working Groups focus on the following: AI and Identity, Beyond Best Practices, Cloud Infrastructure Entitlement Management, Customer Identity and Access Management and Zero Trust.

Technical Working Group Leader
Asad Ali, Director of Technology, Thales
Asad Ali is a technologist at Thales with 25 years of experience, and a track record of technical innovation, research, development, team management and product delivery in the digital security space. He currently serves in the CTO office of Thales cyber-security business unit, and has been an evangelist for company-wide adoption of user-centered design and usable security framework. He has also represented Thales in technology Standards bodies (W3C, OpenID Foundation), industry technology alliances (CSA, IDSA), and academia outreach programs. He holds 10 patents and has over 40 publications in peer-reviewed technical journals and international conferences. Mr. Ali received a Master’s degree in Engineering from MIT.
AI and Identity
This technical workgroup is focused on outlining how Artificial Intelligence and Machine Learning are being utilized today to solve many of the real-world complexities found in Identity Security. We are also excited to discuss the how the emergence of AI/ML driven technologies are changing the way organizations view the typical pillars of Identity: Access Management, Compliance, and Provisioning.
Technical Working Group Subcommittee Leader: Adam Creaney, SailPoint
Members: Atos, SailPoint, Saviynt, Sharelock, Thales, Wells Fargo
Content:
Beyond Best Practices
Beyond Best Practices: expand on the current library of best practices, currently focused on identity and access management, to encompass best practices for implementing Identity Defined Security Outcomes and Approaches. Creating new and creative ways for our target audience of identity practitioners to learn about, understand and integrate identity-defined security into their own environments.
Technical Working Group Subcommittee Leader: Paul Lanzi, Remediant
Members: Atos, BeyondTrust, Fischer Identity, Omada Identity, Optiv, Ping Identity, Remediant, SecZetta, VMware
Content:
Cloud-Infrastructure-Entitlement-Management (CIEM)
Study the role on identity in CIEM. How is this entitlement different from general cloud identity management? Goal: mitigate the risk of data breaches and outages due to excessive entitlements or access permissions. Reduce risks caused by unintended access.
Technical Working Group Subcommittee Leader: Lior Zatlavi and Shawn Larsen, Ermetic
Members: BeyondTrust, CyberArk, Ermetic, ObserveID, Optiv, Saviynt
Content:
Customer-Identity-and-Access-Management (CIAM)
Zero Trust
The Zero Trust Technical Working Group (ZT TWG) is striving to raise awareness, highlight the benefits of embracing the ZT concepts and assist organizations with information and approaches, to embark on the Zero Trust journey as the ZT concepts continue to evolve.The ZT TWG group is focused on identity-centric zero trust concepts, relationship to other Zero Trust frameworks and expansion of existing content published by the IDSA.
Technical Working Subcommittee Group Leader: Stefan Lesaru, Atos
Members: Atos, Banyan Security, F5, ForgeRock, Okta, Optiv, VMware
Content: