Use this activity of the Secure Identities and Access Workshop to present and discuss the key results and recommendations from all activities included in the Secure Identities and Access Workshop (in the form of design decisions made and high-level deployment plans defined). Agree on the next steps that will help the customer increase their identity security posture based on the Secure Identities and Access Workshop findings.
Objectives
Deliver the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Define and agree with the customer on next steps in terms of follow-up activities and/or engagements.
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
98 - Secure Identities and Access - Design Decision Points.xlsx
Preparation
The delivery resource will need to familiarize themself with:
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
98 - Secure Identities and Access - Design Decision Points.xlsx
Pre-requisites
The activities outlined in 12.2 Demos should be completed prior to starting this activity.
Deliverables
The deliverables are defined as:
Next steps defined and agreed upon with the customer (follow-up engagements).
Final version of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation handed over to the customer.
Final version of the 98 - Secure Identities and Access - Design Decision Points.xlsx presentation handed over to the customer.
Guidance
Deliver the activity by presenting the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx that was prepared earlier as you worked together with the customer through the activities described in section 11 Design and Planning and 12 Workshop Day. Wherever necessary, switch to the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet to discuss details of and/or rationale for design decisions made during the engagement.
When presenting, be concise and stick to the facts.
Allow the customer to draw their own conclusions.
Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Make sure you reserve some time for Q&A.
As this activity concludes the delivery of the Secure Identities and Access Workshop engagement, at the end of the activity, hand over the final versions of the following deliverables to the customer:
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx.
98 - Secure Identities and Access - Design Decision Points.xlsx.
Background reading
To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.