Through our Technical Working Groups, members come together to discuss the common challenges happening across the customer landscape. The Technical Working Group (TWG) subcommittees encompass everything from the basics of best practices to innovations at the intersection of identity and security. We partner to examine the problem (or opportunity) and collectively develop vendor-neutral practical guidance to help organizations achieve their security goals through identity.

Our current Technical Working Groups focus on the following: AI and Identity, Beyond Best Practices, Cloud Infrastructure Entitlement Management, Customer Identity and Access Management and Zero Trust.

The Path to Zero Trust Starts with Identity

Technical Working Group Leader

Asad Ali, Director of Technology, Thales

Asad Ali is a technologist at Thales with 25 years of experience, and a track record of technical innovation, research, development, team management and product delivery in the digital security space. He currently serves in the CTO office of Thales cyber-security business unit, and has been an evangelist for company-wide adoption of user-centered design and usable security framework. He has also represented Thales in technology Standards bodies (W3C, OpenID Foundation), industry technology alliances (CSA, IDSA), and academia outreach programs. He holds 10 patents and has over 40 publications in peer-reviewed technical journals and international conferences. Mr. Ali received a Master’s degree in Engineering from MIT.

AI and Identity

This technical workgroup is focused on outlining how Artificial Intelligence and Machine Learning are being utilized today to solve many of the real-world complexities found in Identity Security. We are also excited to discuss the how the emergence of AI/ML driven technologies are changing the way organizations view the typical pillars of Identity: Access Management, Compliance, and Provisioning.

Technical Working Group Subcommittee Leader: Adam Creaney, SailPoint

Members: Atos, SailPoint, Saviynt, Sharelock, Thales, Wells Fargo

Content:

Beyond Best Practices

Beyond Best Practices: expand on the current library of best practices, currently focused on identity and access management, to encompass best practices for implementing Identity Defined Security Outcomes and Approaches. Creating new and creative ways for our target audience of identity practitioners to learn about, understand and integrate identity-defined security into their own environments.

Technical Working Group Subcommittee Leader: Jerry Chapman, Chief Identity Officer at Fischer Identity.

Members: Atos, BeyondTrust, Fischer Identity, Omada Identity, Optiv, Ping Identity, Remediant, SecZetta, VMware

Content:

Cloud-Infrastructure-Entitlement-Management (CIEM)

Study the role on identity in CIEM. How is this entitlement different from general cloud identity management? Goal: mitigate the risk of data breaches and outages due to excessive entitlements or access permissions. Reduce risks caused by unintended access.

Technical Working Group Subcommittee Leader: Lior Zatlavi and Shawn Larsen, Tenable

Members: BeyondTrust, CyberArk, Tenable, ObserveID, Optiv, Saviynt

Content:

Customer-Identity-and-Access-Management (CIAM)

Study how Customer IAM is different from the traditional Enterprise IAM. Discuss evolution of IAM to CIAM and how identity fits in this evolution.

Technical Working Group Subcommittee Leader: Gil Mazor, Thales

Members: Atos, CyberArk, ForgeRock, Okta, Strivacity, Thales

Content:

Zero Trust

The Zero Trust Technical Working Group (ZT TWG) is striving to raise awareness, highlight the benefits of embracing the ZT concepts and assist organizations with information and approaches, to embark on the Zero Trust journey as the ZT concepts continue to evolve.The ZT TWG group is focused on identity-centric zero trust concepts, relationship to other Zero Trust frameworks and expansion of existing content published by the IDSA.

Technical Working Subcommittee Group Leader: Stefan Lesaru, Atos

Members: Atos, Banyan Security, F5, ForgeRock, Okta, Optiv, VMware

Content:

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.