Identity & Access Management




                                                  Jan Quach & Aditya Jayanthi
                                                  Information Security Services



Copyright © 2012 Accenture All rights reserved.                                   1
Agenda

•     We are…
•     It all started…
•     Vision
•     Approach
•     Journey
•     So far, so good
•     What’s in it for you




Copyright © 2012 Accenture All rights reserved.   2
We are VELUX and Accenture
The VELUX Group

•     Established in 1941
•     Approx. 10000 employees globally
•     2600 in Denmark
•     Sales companies in almost 40 countries
•     Production companies in 11 countries
•     Head office in Hørsholm, Denmark
•     Owned by VKR Holding, a limited
      company wholly owned by foundations
      and family
•     VKR Holding turnover 17,8 billion. DKK
      in 2010.
•     One of the strongest global brands in
      the building materials industry
•     Name and brand registered in almost
      100 countries

Copyright © 2012 Accenture All rights reserved.   4
Accenture

•     Global management consulting,
      technology services and outsourcing
      company
•     Globally more than 244.000 people
•     Operating in more than 120 countries
•     Turnover US$25,5 billion in FY 2011


Security Practice
•     Over 1800 security professionals
•     Represented in more than 55
      countries
•     Servicing over 250 clients

Copyright © 2012 Accenture All rights reserved.   5
Cooperation

•     VELUX has outsourced IT-
      application and infrastructure
      management to Accenture

•     Accenture delivers advisory
      services to VELUX

•     Accenture started working
      with VELUX to define IAM as
      part of overall outsourcing
      deal



Copyright © 2012 Accenture All rights reserved.   6
It started with…
Why I&AM?

•     Inefficient onboarding processes
•     Inconsistent identity data
•     Compliance (Audit findings)
•     Labor intensive processes


                                       = Good foundation for I&AM




Copyright © 2012 Accenture All rights reserved.                     8
Vision
Vision

1.      One common corporate identity for each employee or other
        associated person
        •        Ensure that all data related to one identity are linked which will heighten the usability and remove sources of
                 error



2.      Global consistent joiner/mover/leaver process
        •        Save time and resources for the managers and support functions and reduce obstacles and sources of error



3.      Transparency of valid identity data
        •        Ensure a global overview of identity data for optimization and reporting. Furthermore, the transparency will
                 improve risk management capabilities



4.      Agile identity handling and access management
        •        Use automation to reduce time to execute and minimize errors.




Copyright © 2012 Accenture All rights reserved.                                                                                 10
Approach
Approach

1.      Define the vision, high-level strategy and roadmap
        •        Ensure that all business stakeholders are involved and agree on common vision. Define a high-level strategy
                 for implementation that is aligned with business goals across departments



2.      Choose the right technology partners
        •        Technology partners should be aligned with the overall IT Strategy and should fit in the overall IT landscape



3.      Implement a proof-of-concept
        •        To goal is to demonstrate capabilities that are relevant for business in specific organizational setting



4.      Focus on continuous benefit realization with flexible
        implementation
        •        Ensure quick wins and ongoing benefit realization aligned with long-term vision rather than large scale
                 implementations with distinct benefit realizations model




Copyright © 2012 Accenture All rights reserved.                                                                              12
Journey
Journey

1.      Capability assessment and workshops with key stakeholders
        •        Goal was to identify the key areas of improvement and pain points
        •        To introduce the concept to key stakeholders and align the business support



2.      Vendor selection and proof-of-concept
        •        Ensure we chose a vendor and not just a product
        •        Developed a PoC based on multiple scenarios



3.      Focus on quick wins to get program off the ground
        •        Implemented projects that had quick and visible impact
        •        Proactively focused on areas where IAM is the enabler for implementing better process



4.      Aligned with overall IT strategy direction
        •        Be flexible in implementation approach
        •        Align with overall direction of IT strategy to ensure ongoing support




Copyright © 2012 Accenture All rights reserved.                                                          14
So far, so good
Benefit Realization

•      Implemented enterprise level services
•      Consistent processes that are easy to adopt
•      Improved compliance
•      Greater flexibility to adopt new opportunities



                                             The story has just begun




Copyright © 2012 Accenture All rights reserved.                         16
What s in it for you
Do’s

•     Top-level Management support is essential

•     Broad organizational involvement

•     Communication at the right level

•     Risk Management

•     Legal Matters




Copyright © 2012 Accenture All rights reserved.   18
Don’ts

 •      Treat I&AM as an IT-project

 •      Aim too high

 •      Promise too much, things take time

 •      Underestimate the “organizational change” aspect

 •      Put I&AM as secondary task, it is a large coordination
        project




Copyright © 2012 Accenture All rights reserved.              19
Thanks for listening!
Contact information       Contact information
Jan Quach                 Aditya Jayanthi
Accenture                 Accenture
jan.quach@accenture.com   aditya.k.jayanthi@accenture.com
Comments or Questions?
  Come see the Security Systems Team
          in the Expo area:


    Jesper Glahn       Marcus Eriksson                    Sven-Erik Vestergaard
Denmark Sales Leader   Sales Leader, ISS   Sara Anwar
                                                            Security Architect
                           & Qradar        Nordic Sales

More Related Content

PDF
Accenture lean six_sigma 65pages
PDF
Sustainability - business case
PDF
4th Wheel Profile
PPT
Integrating EHS and Risk Management
PPSX
'The Role of Leadership & Innovation in Business Sustainability'
PDF
Bodhtree healthcare payer solutions
PDF
SRCONF 2011 (Quezia Soares)
PDF
Internet Impact on Global GDP - Worldwide Statistics
Accenture lean six_sigma 65pages
Sustainability - business case
4th Wheel Profile
Integrating EHS and Risk Management
'The Role of Leadership & Innovation in Business Sustainability'
Bodhtree healthcare payer solutions
SRCONF 2011 (Quezia Soares)
Internet Impact on Global GDP - Worldwide Statistics

What's hot (20)

PPTX
Reimagining Minnesota State Emerging Themes
PPT
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
PPTX
Organisational culture
PDF
The Sustainability Imperative
PDF
The UN Global Compact-Accenture CEO Study on Sustainability 2013
PDF
Accenture sustainability academy_overview
PDF
The Consumer Study: From Marketing to Mattering, Generating Business Value by...
PDF
Deloitte принципы blockchai 2017
PDF
Risk taking in SME's
PDF
The "Death" of the Business Plan
PDF
Advancing Research: Double Your Mileage
PDF
10trends
PPTX
Jodie G
PPTX
Analytics for manufacturers: The three-minute guide
PDF
Dan C
PDF
UN Global Compact—Accenture CEO Study on Sustainability
PPTX
Clyde F
PDF
Driving High Performance Through Finance Workforce Mastery
PDF
Francesco P
PPTX
Escape the roundabout: A data-driven path to partnerships
Reimagining Minnesota State Emerging Themes
"Case Study: Sustainable Business Practise At Scott Wilson" - Gary Foster, Sc...
Organisational culture
The Sustainability Imperative
The UN Global Compact-Accenture CEO Study on Sustainability 2013
Accenture sustainability academy_overview
The Consumer Study: From Marketing to Mattering, Generating Business Value by...
Deloitte принципы blockchai 2017
Risk taking in SME's
The "Death" of the Business Plan
Advancing Research: Double Your Mileage
10trends
Jodie G
Analytics for manufacturers: The three-minute guide
Dan C
UN Global Compact—Accenture CEO Study on Sustainability
Clyde F
Driving High Performance Through Finance Workforce Mastery
Francesco P
Escape the roundabout: A data-driven path to partnerships
Ad

Viewers also liked (19)

PPTX
4 ways to defend against internal attacks
PPS
my profile
PPT
IAM Solution
PDF
Itsummit2015 blizzard
PDF
14.06.05 IT Summit IAM Presentation
PPTX
Identity & Access Governance
PPTX
Centrify Identity Service Getting Started Guide
PPT
Building Your Roadmap Sucessful Identity And Access Management
PPTX
Developing an IAM Roadmap that Fits Your Business
PPS
Idm Workshop
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PDF
Cyber Crime Infecting Everyone
PPTX
Identity Access Management 101
PPTX
Identity and Access Management (IAM)
PPT
The Gartner IAM Program Maturity Model
PPTX
10 of the Biggest Stories in Technology
PPT
Building an Effective Identity Management Strategy
PDF
Identity and Access Management 101
PDF
Pinterest Your Resume!
4 ways to defend against internal attacks
my profile
IAM Solution
Itsummit2015 blizzard
14.06.05 IT Summit IAM Presentation
Identity & Access Governance
Centrify Identity Service Getting Started Guide
Building Your Roadmap Sucessful Identity And Access Management
Developing an IAM Roadmap that Fits Your Business
Idm Workshop
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Crime Infecting Everyone
Identity Access Management 101
Identity and Access Management (IAM)
The Gartner IAM Program Maturity Model
10 of the Biggest Stories in Technology
Building an Effective Identity Management Strategy
Identity and Access Management 101
Pinterest Your Resume!
Ad

Similar to Værdien af Identity & Access Management, Jan Quach, Accenture (20)

PPTX
EOK Technologies - Healthcare IT services
PPTX
Best Software Development Company |Salesforce Consulting Services in Singapor...
PPT
Accenture organisational design and structure of formalisation
PPTX
Best Presentation About Infosys
PDF
The Offshore Development Services Model.
PDF
Enterey Overview 2012 V6 Tt August 2012 Final Blue Background
PDF
UVIA Technologies Profile
PPTX
Stepping Up Your Mobility Readiness
PDF
Confidis-Briefing-Web
PPT
Introducing process insight rev 1 short
PPT
Introducing process insight rev 1 short
PPTX
New alliance presentation
PDF
Real life with Oracle's JD Edwards Applications in the Cloud
PPTX
Technorishi's Corporate Presentation
PDF
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
PPSX
Cylsys Software Solution Profile
PPTX
How to Centre your PCI Programme Around your Business Objective - SureCloud
PPTX
Digital Transformation Myths Debunking 3 Common Confusions
PPTX
Security Management in the Cloud
EOK Technologies - Healthcare IT services
Best Software Development Company |Salesforce Consulting Services in Singapor...
Accenture organisational design and structure of formalisation
Best Presentation About Infosys
The Offshore Development Services Model.
Enterey Overview 2012 V6 Tt August 2012 Final Blue Background
UVIA Technologies Profile
Stepping Up Your Mobility Readiness
Confidis-Briefing-Web
Introducing process insight rev 1 short
Introducing process insight rev 1 short
New alliance presentation
Real life with Oracle's JD Edwards Applications in the Cloud
Technorishi's Corporate Presentation
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Cylsys Software Solution Profile
How to Centre your PCI Programme Around your Business Objective - SureCloud
Digital Transformation Myths Debunking 3 Common Confusions
Security Management in the Cloud

More from IBM Danmark (20)

PPTX
DevOps, Development and Operations, Tina McGinley
PPTX
Velkomst, Universitetssporet 2013, Pia Rønhøj
PPTX
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
PPT
Mobile, Philip Nyborg
PPTX
IT innovation, Kim Escherich
PPTX
Echo.IT, Stefan K. Madsen
PPT
Big Data & Analytics, Peter Jönsson
PPTX
Social Business, Alice Bayer
PDF
Numascale Product IBM
PDF
Mellanox IBM
PDF
Intel HPC Update
PDF
IBM general parallel file system - introduction
PDF
NeXtScale HPC seminar
PDF
Future of Power: PowerLinux - Jan Kristian Nielsen
PDF
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
PDF
Future of Power: Big Data - Søren Ravn
PDF
Future of Power: IBM PureFlex - Kim Mortensen
PDF
Future of Power: IBM Trends & Directions - Erik Rex
PDF
Future of Power: Håndtering af nye teknologier - Kim Escherich
PDF
Future of Power - Lars Mikkelgaard-Jensen
DevOps, Development and Operations, Tina McGinley
Velkomst, Universitetssporet 2013, Pia Rønhøj
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Mobile, Philip Nyborg
IT innovation, Kim Escherich
Echo.IT, Stefan K. Madsen
Big Data & Analytics, Peter Jönsson
Social Business, Alice Bayer
Numascale Product IBM
Mellanox IBM
Intel HPC Update
IBM general parallel file system - introduction
NeXtScale HPC seminar
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Big Data - Søren Ravn
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power - Lars Mikkelgaard-Jensen

Recently uploaded (20)

PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Basics of Cloud Computing - Cloud Ecosystem
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Auditboard EB SOX Playbook 2023 edition.
Co-training pseudo-labeling for text classification with support vector machi...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Enhancing plagiarism detection using data pre-processing and machine learning...
Module 1 Introduction to Web Programming .pptx
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
future_of_ai_comprehensive_20250822032121.pptx
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Lung cancer patients survival prediction using outlier detection and optimize...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf

Værdien af Identity & Access Management, Jan Quach, Accenture

  • 1. Identity & Access Management Jan Quach & Aditya Jayanthi Information Security Services Copyright © 2012 Accenture All rights reserved. 1
  • 2. Agenda • We are… • It all started… • Vision • Approach • Journey • So far, so good • What’s in it for you Copyright © 2012 Accenture All rights reserved. 2
  • 3. We are VELUX and Accenture
  • 4. The VELUX Group • Established in 1941 • Approx. 10000 employees globally • 2600 in Denmark • Sales companies in almost 40 countries • Production companies in 11 countries • Head office in Hørsholm, Denmark • Owned by VKR Holding, a limited company wholly owned by foundations and family • VKR Holding turnover 17,8 billion. DKK in 2010. • One of the strongest global brands in the building materials industry • Name and brand registered in almost 100 countries Copyright © 2012 Accenture All rights reserved. 4
  • 5. Accenture • Global management consulting, technology services and outsourcing company • Globally more than 244.000 people • Operating in more than 120 countries • Turnover US$25,5 billion in FY 2011 Security Practice • Over 1800 security professionals • Represented in more than 55 countries • Servicing over 250 clients Copyright © 2012 Accenture All rights reserved. 5
  • 6. Cooperation • VELUX has outsourced IT- application and infrastructure management to Accenture • Accenture delivers advisory services to VELUX • Accenture started working with VELUX to define IAM as part of overall outsourcing deal Copyright © 2012 Accenture All rights reserved. 6
  • 8. Why I&AM? • Inefficient onboarding processes • Inconsistent identity data • Compliance (Audit findings) • Labor intensive processes = Good foundation for I&AM Copyright © 2012 Accenture All rights reserved. 8
  • 10. Vision 1. One common corporate identity for each employee or other associated person • Ensure that all data related to one identity are linked which will heighten the usability and remove sources of error 2. Global consistent joiner/mover/leaver process • Save time and resources for the managers and support functions and reduce obstacles and sources of error 3. Transparency of valid identity data • Ensure a global overview of identity data for optimization and reporting. Furthermore, the transparency will improve risk management capabilities 4. Agile identity handling and access management • Use automation to reduce time to execute and minimize errors. Copyright © 2012 Accenture All rights reserved. 10
  • 12. Approach 1. Define the vision, high-level strategy and roadmap • Ensure that all business stakeholders are involved and agree on common vision. Define a high-level strategy for implementation that is aligned with business goals across departments 2. Choose the right technology partners • Technology partners should be aligned with the overall IT Strategy and should fit in the overall IT landscape 3. Implement a proof-of-concept • To goal is to demonstrate capabilities that are relevant for business in specific organizational setting 4. Focus on continuous benefit realization with flexible implementation • Ensure quick wins and ongoing benefit realization aligned with long-term vision rather than large scale implementations with distinct benefit realizations model Copyright © 2012 Accenture All rights reserved. 12
  • 14. Journey 1. Capability assessment and workshops with key stakeholders • Goal was to identify the key areas of improvement and pain points • To introduce the concept to key stakeholders and align the business support 2. Vendor selection and proof-of-concept • Ensure we chose a vendor and not just a product • Developed a PoC based on multiple scenarios 3. Focus on quick wins to get program off the ground • Implemented projects that had quick and visible impact • Proactively focused on areas where IAM is the enabler for implementing better process 4. Aligned with overall IT strategy direction • Be flexible in implementation approach • Align with overall direction of IT strategy to ensure ongoing support Copyright © 2012 Accenture All rights reserved. 14
  • 15. So far, so good
  • 16. Benefit Realization • Implemented enterprise level services • Consistent processes that are easy to adopt • Improved compliance • Greater flexibility to adopt new opportunities The story has just begun Copyright © 2012 Accenture All rights reserved. 16
  • 17. What s in it for you
  • 18. Do’s • Top-level Management support is essential • Broad organizational involvement • Communication at the right level • Risk Management • Legal Matters Copyright © 2012 Accenture All rights reserved. 18
  • 19. Don’ts • Treat I&AM as an IT-project • Aim too high • Promise too much, things take time • Underestimate the “organizational change” aspect • Put I&AM as secondary task, it is a large coordination project Copyright © 2012 Accenture All rights reserved. 19
  • 20. Thanks for listening! Contact information Contact information Jan Quach Aditya Jayanthi Accenture Accenture [email protected] [email protected]
  • 21. Comments or Questions? Come see the Security Systems Team in the Expo area: Jesper Glahn Marcus Eriksson Sven-Erik Vestergaard Denmark Sales Leader Sales Leader, ISS Sara Anwar Security Architect & Qradar Nordic Sales