...
06.05.2009 11:30-12:30

European Identity Conference 2009
Combined Session

Moderator:

<a J�rg Asma, KPMG

Digital Identity as a Business Enabler in the Financial Supply Chain

The expansion of electronic commerce and globalization of supply chains is driving companies to streamline their business processes and move to a paperless environment without compromising security, confidentiality, compliance, and integrity of transactions. Digital Identity has become the lynchpin in electronic workflows, helping firms know who is on the other end of the transaction, creating legally binding transactions, while ensuring the integrity of those transactions to satisfy regulatory and audit requirements.

Citi’s Global Transaction Services has been leveraging high assurance digital identity as an enabler to re-engineer traditional banking services, ranging from bank account management, to secure payment transaction processes. Identity-enabled banking will revolutionize the industry and change processes that have not significantly changed in over 100 years. These changes not only increase security, and mitigate risks inherent in the process, but take advantage of new technology to provide a simplified user experience and provide unprecedented levels of control and visibility.

New services, such as federated identity issuance, non-repudiable digital signatures, paperless contracts, electronic vaulting and new levels of interoperability across banks and organizations will bring increased value and differentiation into the financial supply chain.

An Ounce of Prevention is Worth a Pound of Cure – Moving from Detective Controls to Automated Prevention.

Implementing controls automation has an enormuous potential to save money and time. A maybe even greater benefit comes from the ability of automated controls to be both detective and preventive, helping you to increase customer satisfaction through improved services and to reduce the working capital through improved delivery speed. In this Panel, we will discuss the steps you need to take when moving from detective controls to a system of automated prevention. 

  • What are the limitations of typical controls implementations?
  • Where are we? Maturity models for Enterprise Authorization Management 
  • Implementing Controls Automation 

 

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.