Speaking at Telco 2.0 ‘Best Practice Live!’

The folks at Telco 2.0 invited me to speak at Telco 2.0 ‘Best Practice Live!’ – a FREE virtual (online) event, 2-3 Feb – on New Business Model Case Studies, Use Cases and Strategies from around the globe

It is happening twice – once for those in Europe Wednesday, Feb 2 and once in America Thursday Feb 3. You can register for FREE here.

The aim of the event is to give players in the Telecoms, Media and Technology sector tangible examples of what they can do to enhance their business models, using rich, interactive virtual event technology to disseminate and discuss these practical ideas. It will include plenary sessions on the following key Telco 2.0 areas:

  • External Threats to the Telco Business Model,
  • New Broadband Business Models,
  • Cloud Services,
  • Digital Entertainment 2.0,
  • Personal Data 2.0,
  • Augmented Reality,
  • Enterprise 2.0,
  • M2M 2.0,
  • Mobile Money 2.0
  • The Roadmap to Telco 2.0.

View the agenda here.

My presentation will be broadcast at 1230 on Wednesday (GMT) and Thursday 12:30 (Pacific Time) and will be followed by a Q&A and discussion session. Other key industry speakers include:

  • Personal Data 2.0: Von Wright, VP Cloud & Wholesale, Mobility & Consumer Markets, AT8T
  • External Threats to the Telco Business Model: Paul Smith, Partner, Bain & Co
  • Personal Data 2.0: Eric Sachs, Product Manager, Security, Google
  • Personal Data 2.0: John Clippinger, Co-Director, The Law Lab, The Berkman Center for Internet & Society, Harvard
  • Digital Entertainment 2.0: Andrew Ground, Chief Commercial Officer, LOVEFiLM
  • Digital Entertainment 2.0: Gerry Guoy, Senior Director, Digital Media, MTV
  • Mobile Money 2.0: Roberto Rittes, General Manager, Oi Paggo, Oi
  • External Threats to the Telco Business Model: Chris Barraclough, Managing Director, Telco 2.0 Initiative
  • M2M 2.0: Philip Laidler, Consulting Director, Telco 2.0 Initiative
  • Enterprise 2.0: Roberto Saracco, Director of the Future Centre, Telecom Italia
  • M2M 2.0: Magnus Bakken, Head of Market Communication, Telenor Objects
  • Digital Entertainment 2.0: Rob Salter, Category Director, Entertainment, Tesco
  • New Broadband Business Models: Diego Massida, Director of Video & Connected Home,Vodafone
  • Personal Data 2.0: William Hoffman, Associate Director, World Economic Forum
  • New Broadband Business Models: Dennis Sverdlov, CEO, Yota

You will also have access to case study presentations and examples from those leading the way in business model innovation from around the world, including Amazon, AT&T, BT Wholesale, Deutsche Telekom, TELUS and Vodafone.

How does it work? Telco 2.0 Best Practice Live! is made up of short (10 minute) pre-recorded video presentations, which are then broadcast online at set times as part of the event. Online Q&A and discussion between participants follows afterwards. Attendees can also attend the online exhibition where they can visit sponsors’ stands and download research, white papers and product information.

The event is broadcast to 2 timezones, as below and is then available ‘on-demand’ afterwards for 3 months:

· 2nd February (EMEA – 0900-1500 GMT)
· 3rd February (Americas – 0900-1500 Pacific Time)

If you want to contact the Telco 2.0 initiative to find out more or discuss your involvement in the next Best Practice Live! you can contact them here: contact@telco2.net

Register for FREE here.For more information visit the event website:www.telco2bestpracticelive.com.

Personal Data Ecosystem talk at Digital Privacy Forum, Jan 20th, 2011 in NYC

This is my talk presented to the Digital Privacy Forum produced by Media Bistro, January 20th, 2011 about Personal Data Ecosystem and the emerging consortium in the space.

Thanks for inviting me here to speak with you today.

The purpose of my talk is to share a new possibility for the future regarding users’ personal data that most have not yet explored. It sits between the two extremes of a familiar spectrum.

On one end, “Do not track” using technology and a legal mandate to prevent any data collection.

AND

On the other end, “Business as usual” leaving the door open for ever more “innovative” pervasive and intrusive data collection and cross referencing.

There is a third possibility that aligns with peoples’ privacy needs as well as offering enormous business opportunities.

A nascent but growing industry of personal data storage services is emerging.  These strive to allow individuals to collect their own personal data to manage it and then give permissioned access to their digital footprint to the business and services they choose—businesses they trust to provide better customization, more relevant search results, and real value for the user from their data.

With other leading industry thinkers, I have come to believe that there is more money to be made in an ecosystem that allows users to determine which businesses have access to what data,and under what terms and conditions, than there is under present more diffused, scattershot, and unethical collection systems. Today I will articulate the broad outlines of this emerging “personal data ecosystem” and talk about developments in the industry.

Those of you who know me will find it unusual for me to have such a keen focus on making money on user data and emerging business models.

I am, after all, known as the “Identity Woman – Saving the World with User-Centric Identity”. Since first learning about issues around identity technologies online in 2003, I have been an end user advocate and industry catalyst.

[Read more...]

National! Identity! Cyberspace!: Why we shouldn’t freak out about NSTIC.

This is cross posted on my Fast Company Expert Blog with the same title.

I was very skeptical when I first learned government officials were poking around the identity community to learn from us and work with us.  Over the last two and a half years, I have witnessed dozens of dedicated government officials work with the various communities focused on digital identity to really make sure they get it right. Based on what I heard in the announcements Friday at Stanford by Secretary of Commerce Locke and White House Cybersecurity Coordinator  Howard Schmidt to put the Program Office in support of NSTIC (National Strategy for Trusted Identities in Cyberspace) within the Department of Commerce. I am optimistic about their efforts and frustrated by the lack of depth and insight displayed in the news cycle with headlines that focus on a few choice phrases to raise hackles about this initiative, like this from CBS News: Obama Eyeing Internet ID for Americans.

I was listening to the announcement with a knowledgeable ear, having spent the last seven years of my life focused on user-centric digital identity.Internet Identity Workshop Logo Our main conference Internet Identity Workshop held every 6 months since the fall of 2005 has for a logo the identity dog: an allusion to the famous New Yorker cartoon On the internet, nobody knows you are a dog. To me, this symbolizes the two big threads of our work: 1) maintaining the freedom to be who you want to be on the internet AND 2) having the freedom and ability to share verified information about yourself when you do want to.  I believe the intentions of NSTIC align with both of these, and with other core threads of our communities’ efforts: to support identifiers portable from one site to another, to reduce the number of passwords people need, to prevent one centralized identity provider from being the default identity provider for the whole internet, to support verified anonymity (sharing claims about yourself that are verified and true but not giving away “who you are”),  support broader diffusion of strong authentication technologies (USB tokens, one-time passwords on cellphones, or smart cards), and mutual authentication, allowing users to see more closely that the site they are intending to do business with is actually that site.

Looking at use cases that government agencies need to solve is the best way to to understand why the government is working with the private sector to catalyze an “Identity Ecosystem”.

[Read more...]