Why do Identity and Access Management Projects Fail? With FishNet Security IAM Services Group January 26, 2012



Similar documents
The amount of data you have doubles every 12 to 18 months. Information Asset Management that Drives Business Performance Jeremy Pritchard 10/06/2015

BEST PRACTICES RESEARCH

Accenture Advanced Enterprise Performance Management Solution for Oracle

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Game-Changing Industry Leadership

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e.

How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as

OKLAHOMA STATE UNIVERSITY BIG DATA CONFERENCE. April 7, 2015

Beyond the Data Lake

How To Learn About An Enterprise Risk Management

White Paper. Fundamentals of Performance Testing

Job Family Modeling. Tools to Support Job Evaluation and Career Development October 21, Vincent Milich

Avaya Strategic Communications. Consulting. A Strong Foundation for Superior Business Results. Table of Contents. Taking Business Vision to Reality

Cloud vision and capabilities

Four Steps to Faster, Better Application Dependency Mapping

Achieving Business Analysis Excellence

CRM Success Metrics. Drivers & Metrics for Successful CRM: in Theory & in Practice

Software Executive Summit. Executive Briefing Day

Customer Relationship Management:

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Key Market Trends, Drivers and Future Directions in the RPO Solutions Business

Delivering value to the business with IAM

Twin Cities Business Architecture Forum

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

Reducing Technical Debt Using Maintainability Index

Information Technology Solutions at Work

MEDITECH Consulting Services

EIM Strategy & Data Governance

When you have to be right

Identity Management: Securing Information in the HIPAA Environment

Before You Buy: A Checklist for Evaluating Your Analytics Vendor

The Talent Management Framework

Enterprise Architecture: A Governance Framework

Commercial Banking. C. Douglas Lefferson. EVP & Chief Banking Officer. Investor Day August 15, 2012

Practical Approaches to Achieving Sustainable IT Governance

ISO 55001:2014 Asset Management System 5-Day Training Course (IAM Certified)

Business Analysis Capability Assessment

Thank you for your time and interest in KnowledgeLake.

Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

About Us. Payment Solutions. Retail Card. Synchrony Bank. CareCredit

WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)?

ENABLING TODAY S WIRELESS ENTERPRISE

IT Transformation for Health Care

An Introduction to Decision Management. James Taylor CEO

5 Key Trends in Connected Health

Shared Services and Outsourcing Evolution Into a Hybrid Model

Key Industry Challenges addressed by Superior Customer Offerings

JHSPH - Inovalon, Inc. Information Session

MARKETING ANALYTICS AS A SERVICE

INSERT COMPANY LOGO HERE

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Creating a Holistic and Sustainable Approach to Workforce Planning Globally at John Deere

EMA Services for IT Vendors

Leveraging enterprise data and advanced analytics in core operational processes: Demand forecasting at Cisco

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

Talent Analytics. Compare Your Talent against the Best in Your Industry

Management, Organization and Business Improvement Services (MOBIS)

Business Intelligence Maturity Model. Wayne Eckerson Director of Research The Data Warehousing Institute

Achieving Business Analysis Excellence

Guidewire ClaimCenter. Adapt and succeed

Enterprise Data Governance

Marketing research and strategic planning for private equity portfolio companies. MMR delivers practical solutions focused on revenue growth.

Harvestons Securities, Inc.

Best Practices for Architecting Taxonomy and Metadata in an Open Source Environment

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Sales Force Automation with Microsoft Dynamics

A Different Kind of Wealth Manager

Identity and Access Management. Key Initiative Overview

Access. Action. Insight. Healthcare Analytics and Marketing Communications Consultative, Analytical, and Promotional Solutions

BPM Group Coaching Process Level Program

INSURANCE. Adding lasting to success. That s the intelligent enterprise

Sales Performance Management: Integrated System or a Collection Disjointed Practices? Jerome A. Colletti Mary S. Fiss Colletti-Fiss, LLC

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into

The Successful Manager s Leadership Program

A new force in Business Intelligence emerges Company getaway White paper by Nick Bell Company Launch Quick Q & A

Vendor Management: Reduce Risk and Improve Value

Having Trouble Explaining and Predicting Net Revenue?

Janna Systems Inc. Scotia Capital Telecom & Tech Conference November 8, Track Record of Success. William M. Tatham Chief Executive Officer

CASE STUDY ALLSCRIPTS

Transcription:

Why do Identity and Access Management Projects Fail? With FishNet Security IAM Services Group January 26, 2012

Introducing Our Presenters Philip Lentz, Chief Identity Strategist Phillip Lentz is the newly appointed Chief Identity Strategist at Fish Net Security. Prior to the FishNet Security acquisition of Logic Trends, Mr. Lentz was the Co-President, CTO, and founding partner of Logic Trends, Inc., a strategy and Integration firm focused wholly on Identity and Access Management (IAM). Mr. Lentz has more than 25 years in the IT industry, with the past 15 years focused on designing IAM strategies for over 60 of the largest corporations in the Continental United States. Mr. Lentz has been responsible for defining Logic Trends technical direction including research and product development, client strategy, assessments, infrastructure architecture, and IAM market analysis. Ken Stone, Executive Vice President, Advanced Solutions Ken Stone is the newly appointed executive vice president of Advanced Solutions at FishNet Security. Prior to the FishNet acquisition of Logic Trends in December 2011, Stone was the co-founder and CEO of Logic Trends, a strategy and integration firm focused wholly on identity and access management (IAM) solutions. Stone has more than 17 years in the IT industry, with the past 10 years focused on managing and building successful security consulting practices. He helped guide the firm to regional and national prominence, leading the company to multiple service awards and recognition, including being named five times on the Inc. 500 list of fastest-growing privately held U.S. companies.

Introducing Our Panelists Buck Bell, Vice President, Healthcare Practice Buck Bell is the newly appointed VP, Healthcare Practice at FishNet Security. Prior to the FishNet Security acquisition, Bell was VP, Identity Practice, at Logic Trends, with a focus on Microsoft Identity and Access Management solutions. Bell has over 14 years of experience in the fields of Information Systems Management, Technical Sales, and Identity and Access Management, with specific expertise in information systems analysis and design, project and team management, enterprise architecture, and user identity lifecycle management. Bell attended the University of South Florida as an Honors College double major in Economics and Management of Information Systems. Robert Block, Vice President, IAM Services Group As the VP of IAM Services Group for FishNet Security, Robert is responsible for defining FishNet Security s strategic vision, client strategy and assessments, infrastructure architecture, and market analysis. Considered a thought leader in the area of Identity and Access Management, with a specialized focus on Access Governance and Identity Management as a Service. Robert interacts with leading industry analysts on the state of Identity Management on a regular basis.

Agenda FishNet Security IAM Services Practice Overview Metrics of Failed and Successful IAM projects The Anatomy of Failed IAM Projects The Anatomy of Successful IAM Projects Intersectional Analysis of IAM projects Identify points of failure Identify point of success Leveraging Our Findings to Build an Actionable IAM Plan of Success Q&A

5 IAM Services Group Resource Snapshot Customer Benefits Largest Dedicated IT Security Firm in US National Presence of 27 Offices and 12 Training Locations Over 300 Regionally Focused Technical Personnel with national coverage (~70 Dedicated IAM experts) Strategic IAM Thought Leaders Engaged on Every Project Unmatched Combined Experience; delivering enterprise solutions & comprehensive service offerings Financially Sound; deep purchasing power allowing maximum discount to clients Deep Expertise; broad offering with deep expertise, certifications & disciplines Broad Reach; ability to satisfy remote office & data center requirements Objectivity; ability to provide insight into majority of security technologies Bridging Gaps; full lifecycle of offerings to deliver complete solutions, including IAM

IAM Services Profile We ve built our success on delivering strategic solutions for any IAM challenge, and our IAM5 TM Process is founded on a proven philosophical and analytical approach to delivery developed through hundreds of diverse engagements. IAM Services Profile IAM Technology Partners Over 300 Successful IAM Engagements since 2002 Repeatable IAM5 TM Services Framework Full IAM Lifecycle Service Delivery including: Strategic Advisory Program/Project Management Full IAM SDLC Support Healthcare Practice 24X7 Support Center

Metrics of Failed IAM Projects Lack of Executive Sponsorship 2% 6% Bad Product Choice Poor End User Experience 2% 6% Inadequate Program Governance 32% No Failure Occurred 4% Low Quality Source Data 5% Excessive Scope 6% Excessive Cost 2% Offshore Model 35% Tactical Approach

Metrics of Successful IAM Projects 20% Strategic Vision 4% Right Product for the Job 6% Positive End User Experience /Adoption 11% Rigorous Program Governance 6% High Quality Source Data 16% In Progress Realistic Resource Expectations ($ and Human) 13% 24% Manageable Scope

Recipe for Success Smarten the Tactical Approach Create Manageable Scope Enable Strategic Vision Assure Realistic Resource ($$$ and Human) Expectations Enforce Program Governance Stop Inadequate Program Governance Eliminate Excessive Cost End Bad Product Choices Deliver Positive End User Experience/Adoption Ensure High Quality Source Data Stop Excessive Scope Eliminate Low Quality Source Data

Thank You Philip Lentz Chief Identity Strategist FishNet Security Phil.Lentz@FishNetSecurity.com Ken Stone EVP, Advanced Solutions FishNet Security Ken.Stone@FishNetSecurity.com Buck Bell VP, Healthcare Practice FishNet Security Buck.Bell@FishNetSecurity.com Robert Block VP, IAM Services Group FishNet Security Robert.Block@FishNetSecurity.com