Register:
http://bit.ly/ki-plenary1-2015Agenda:
Time
Group
Presenter
Topic
8:00
10mins
Intro
Sal D'Agostino & Joni Brennan
Kantara Initiative: Join. Innovate. Trust.
8:10
20mins
IRM
Sal D'Agostino & Joni Brennan
- Overview of the Design Principles of Relationships
- Context of real world IRM application
8:30
20mins
UMA
Eve Maler, ForgeRock
- Demo of User-Managed Access (UMA)
- UMA where consent means "U Must Ask"
8:50
20mins
IDoT
Ingo Friese, Deutsche Telekom
- Identities of Things Landscape and Use Cases
9:10
20mins
CIS
Mark Lizar
- Overview of Consent & Information Sharing (CIS) Work Group
- Why is the Minimum Viable Consent Receipt (MVCR) needed
- Value proposition and Real World use
9:30
10mins
Virtual Coffee Break
- Interest Polls
- Tweet Chat Questions
- Connections & Collaborations
9:40
5mins
Welcome Back
Sal D'Agostino & Joni Brennan
- Review feedback over the coffee break etc
9:45
15mins
Identity Assurance
Ken Dagg
- What is IAWG - number of members, leadership, call frequency, charter
- Work plan for 2015
- Accomplishments to date in 2015
- Current work items
- What does the future hold
- Results from the UK study
10:00
15mins
HIA
Pete Palmer, MedAllies
- Overview: Health Identity Assurance (HIA) Work Group
- Why Health care Identity Assurance is important for your organization
10:15
45mins
eGov
Colin Wallis, New Zealand Government Department of Internal Affairs
- Industry update from Connect.gov
- Featuring experts from GSA, SecureKey, ID.me, Verizon
11:00
5mins
Closing / Thanks
Sal D'Agostino & Joni Brennan
Connecting Identity for a more trustworthy Internet -
Overview