Gartner Blog Network

Tag: 'nstic' Blog Posts

from the Gartner Blog Network

The Business of Identity: Thoughts from the NSTIC White House Event

by Ian Glazer  |  May 24, 2012

Yesterday’s National Strategy for Trusted Identities in Cyberspace event was a bit of a blur. Really good conversations. Lots of new ideas swimming through my head. Here are some of...

Read more »

Beyond Industrial Era Identity Management

by Ian Glazer  |  May 23, 2012

(The following is the statement I'll deliver today at the National Strategy For Trusted Identities in Cyberspace event at the White House.) Our way of thinking about identity management is...

Read more »

Put 100 Relying Parties in a Room and What Do You Get?

by Ian Glazer  |  May 17, 2012

It’s an open secret among us identity geeks that, despite all of federated identity’s progress, one thing has lagged significantly: relying party participation1. Getting relying parties to the table, to...

Read more »

Collective Punishment: SOPA and Protect-IP are Threats to NSTIC and Federated Identity

by Ian Glazer  |  January 10, 2012

As a technologist you’ve likely heard about the Stop Online Privacy Act (SOPA) or the Protect-IP Act. The intention of these bills, as described by SOPA, is “[t]o promote prosperity,...

Read more »

The Identity Portability and Accountability Act of 2011

by Ian Glazer  |  June 13, 2011

Last week, the NSTIC program office held the first of three outreach workshops. While a who's who of the identerati (along with government and trade group representatives) discussed what kind...

Read more »

Thoughts from IIW East

by Ian Glazer  |  September 15, 2010

Last week was the first Internet Identity Workshop on the east coast. Having IIW in DC is especially timely given the identity-related activity here inside the Beltway. NSTIC: Worst. Card...

Read more »

Considering all side of the issues: A lawyer looks at NSTIC

by Ian Glazer  |  July 21, 2010

As you likely know by now, White House has released a draft strategy on the need for and use of an identity ecosystem. Known as the National Strategy for Trusted...

Read more »