TRUSTED IDENTITY: Faith in a Technology World

Who are you and why would I believe it?

Why should I trust you electronically, ethically, or in reality? I'm sorry, I don't have faith in your 1.0 technology.

By no means is this going to be a conference structured entirely on the arcane concepts of security, authentication, and validation of logons and access rights. Yes, how computers manage a Trusted Identity is a fascinating technical feat. No doubt we will address that in some sessions, but there's a much more troubling concern rising about real-life vs.E-life TRUSTED IDENTITY.

Managing and protecting your identity is becoming baffling and frustrating. This is the realm where the way we work, evaluate the tools we use, or advise on the very technologies we rely upon are increasingly dubious. Most of us agree, we manage our own IDENTITY in ways that don't reflect what most people consider their personal preferences of TRUST, simply because we are not given the choices we want in delegating or withholding control.

Delegation of trust is becoming delegation of your TRUSTED IDENTITY, and the more we are stacking technology upon other technology for for information management, or communications and privacy, we are putting our TRUSTED IDENTITY at risk based upon FAITH IN A TECHNOLOGY WORLD. It used to be that only a fool would leave their car unlocked while parked on a city street, and yet we are rapidly headed in that direction with every electronic device and tool we integrated together with our identity.

The most dangerous tools we have in managing privacy and security are the very ones we choose to allow in our lives, we opt-in. More importantly, as an SMB consultant, you are taking on a much more broad set of concerns by advising your clients on what to do, or doing work that delegates TRUSTED IDENTITY to other service providers.

Let's put some terminology and topics up for consideration:

  • Trusted Advisor
  • Identity Theft
  • Social Media Privacy Breaches
  • Hosted Environments
  • Government Oversight and Activities
  • Unintended Electronic Disclosures 
  • Branding Realities in a Business or Technology without Trust
  • Partnership and Service Provider Failures
  • Identity Federation (Facebook, Gmail, Passport, service aggragators)

Most people over the age of 35 probably thought they would only struggle once getting started to create a TRUSTED IDENTITY, to build one in business and personal reputation. We are now in a world where protecting a TRUSTED IDENTITY means fending off invasion and deception as a daily concern because of our technology, and our default instinct for faith in it.

For anything you invest in about your IDENTITY, you are placing faith in that investment. The opposite perspective is the risk you assume by investing any IDENTITY management in technologies that span beyond your reach or control.

IT Pro Conference 2012 is going to explore not only the new products and technologies we use today, but the vision of how providing IT consulting in the future is moving well beyond product knowledge of functionality. We are all becoming a firewall against faith as the only thing protecting a TRUSTED IDENTITY.


Jeff Middleton


Conference Theme: Each year we plan our conference sessions to draw inspiration or alignment from two basic guidelines: What are the new products or technologies, and what essential reality is on everyone's mind as what's going on in the world view. For example, following Hurricane Katrina we looked at Disaster Recovery, and on the heals of the economic meltdown of 2010 we looked at Optimization, how to do more with less to work with. This year's selected theme looks at where technology is taking identity management out of trusted process and oversight.

Learn more about....
Conference Host