Contact Us   |   Print Page   |   Sign In   |   Register
June 2013

Identity Management: Are You Really a Dog Surfing on the Internet?

Recorded Live:
June 25, 2013
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here for presentation slides.
Click here to view recorded web conference.

Generously supported by:

Web Conference Overview:

It has been said, "No one on the internet knows you are a dog.” This simple statement exemplifies only one of the major problems of identity. Not only do we not know you are a dog, we don’t really know where you are, or what your entitlements may be. In addition, those entitlements are always constantly changing, and actually trying to manage entitlements and identity in any world is difficult enough. Now what happens when we Bring Your Own Identity (BYOI), Cloud and BYOD together? This webinar will attempt to address the evolving issues and strategies for dealing with identity in the evolving world.


Malcolm Harkins
Vice President, Software and Services Group, Chief Security and Privacy Officer, Intel Corporation

Malcolm Harkins is vice president and Chief Security and Privacy Officer (CSPO) at Intel Corporation. In this role Malcolm is responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel’s information assets, products and services.

Before becoming Intel’s first CSPO he was the Chief Information Security Officer (CISO) reporting into the Chief Information Officer. Malcolm also held roles in Finance, Procurement and various business operations. He has managed IT benchmarking efforts and Sarbanes Oxley systems compliance efforts. Harkins acted as the profit and loss manager for the Flash Product Group at Intel; was the general manager of Enterprise Capabilities, responsible for the delivery and support of Intel’s Finance and HR systems; and worked in an Intel business venture focusing on e-commerce hosting.

Malcolm previously taught at the CIO institute at the UCLA Anderson School of Business and was an adjunct faculty member at Susquehanna University in 2009. In 2010, he received the excellence in the field of security award at the RSA conference. He was recognized by Computerworld magazine as one of the top 100 Information Technology Leaders for 2012. In addition, (ISC)2 recognized Malcolm in 2012 with the Information Security Leadership Award. Malcolm is a frequent speaker at Industry events, he is also an author of many white papers, and recently published his first book titled Managing Risk and Information Security, Protect to Enable.

Malcolm received his bachelor’s degree in economics from the University of California at Irvine and an MBA in finance and accounting from the University of California at Davis.

Nathan Moon
- Utah, USA Chapter
IT Security Architect/Administrator at Intermountain Health Care

Nathan Moon is an IT Security Architect for Intermountain Healthcare in Salt Lake City, Utah. Nathan has 17 years of experience working in the IT security healthcare field. In his current position, Nathan is responsible for developing solutions and security plans to ensure Intermountain meets the evolving healthcare regulatory security standards, securely achieves business and strategic goals, and implements security best practices. Over the past 11 years, Nathan has architected and helped to implement a complete user management framework to streamline employee onboarding to a master user directory, provide the appropriate workflow to track access approvals, automate the provisioning and de-provisioning of access, provide one-stop shop for managers and IT support staff to manage identities, and provide a simple interface for auditing of access requests and changes.

In addition, the user management framework that Nathan helped to architect and implement supports the provisioning and de-provisioning of access for patient/member, employee, physician, trustee, broker, and volunteer user portals. The current solution has been able to keep up with the demand for the growing number of new applications being used within Intermountain Healthcare; while, reducing the time-to-provision for new employee and provide automated ROI for previous manual processes to provision access.

Nathan has a Bachelor of Arts in Accounting with a minor in Spanish and a Masters of Professional Accountancy from Weber State University in Ogden, Utah.

Jaimon Jose

Distinguished Engineer, Office of the CTO, NetIQ

Jaimon Jose is a Distinguished Engineer and Member of the CTO team in NetIQ responsible for technical vision and strategy.

As an Identity and Security expert and a CISSP, he focuses on security aspects of emerging technologies including BYO{D|I} and Big Data. He believes that a lot of innovation and solutions will evolve in the mobile computing domain and that will be a trigger for the accelerated cloud adoption. His current research interest includes identity analytics using Big Data and predictive analytics that leverages disparate sources like physical, virtual and cloud.

As member of the CTO team, he is responsible for the architecture and vision of Novell Identity Manager and related products. He has been with Novell, now part of the Attachmate group, for over 15 years working on identity and security technologies including the Novell's flagship directory services, eDirectory.

He represents NetIQ in standard organizations like IETF, OpenGroup and DMTF. Jaimon is a regular speaker at various conferences in India and abroad including InterOp, Silicon India, BrainShare and other industry-academia collaborations. He has published a number of technical articles in various journals and also a co-author of DMTF cloud management standards.

Philip H. Griffin - ISSA Fellow, Raleigh, USA Chapter
ISSA Web Conference Committee, Session Moderator

Phillip H. Griffin, CISM, has over 18 years of information assurance experience. Phil has served as a trusted security advisor, security architect, and consultant with leading corporations. He has acted as committee chair, editor, and head of delegation in the development of international security standards, and he currently serves on the ISSA Educational Advisory Council, and on the board of the Raleigh ISSA Chapter.

His most recent work encompasses authentication technologies, access control policy, and message schema. Phil has five U.S. patents at the intersection of biometrics and information security, and has spoken at leading security conferences around the world.

Community Search
Sign In


4th Annual Healthcare Cybersecurity Summit

ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6

ISSA Thought Leadership Series - Zero Trust: The evolution of Perimeter Security

ISSA of Wisconsin - Annual Meeting and Conference

ISSA Thought Leadership Series: Security-as-a-Service for Small and Medium Sized Businesses

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information