Carlos Garcia

Sr Principal Architect; Optum
Carlos has specialized in Identity And Access Management systems for the past 20 years. His experience has been in the architecture and implementation of large enterprise and consumer IAM systems. Most of his career has been spent designing and running the large scale IAM systems for UnitedHealth Group. His experience and leadership led him to work on unique challenges such as helping to stabilize and improve the 2013 troubled implementation of healthcare.gov, as well as other state health exchanges. In his current role, he works in collaboration to drive the future technology state of UnitedHealth Group.

Carlos's Sessions


Tuesday, June 25
4:35 - 5:00 pm
Cabinet
Authentication & Authorization in a micro services world
One of the challenges facing micro-services architecture in the clinical space is developing patterns defining various levels of authentication and authorization for your patient record APIs. Our approach was to use the current identity standards, OIDC and Oauth, as well as ABAC, to create 3 levels of authorized access to our clinical micro-service APIs.

Thursday, June 27
10:30 - 11:20 am
Ballroom
What’s Old is New Again. Can Identity Centric Security Finally Make Zero Trust a Reality?
Zero Trust is not a new concept. It was introduced almost a decade ago, when the economy was still recovering and Software as a Service (aka cloud applications) became the fast path to cost reduction. The number of IoT devices was 900 million compared to 11.2 Billion in 2018. With the explosion of cloud and connected things, Zero Trust is needed now more than ever. But how do we get there without upending decades of architectural decisions and security investments? It starts with the basics and ends with an approach that puts identity at the center of your security strategy, optimizing cyber security investments while controlling risk. Moderated by Julie Talbot-Hubbard, this panel of identity and security leaders from a cross section of industries will share their war stories, best practices and strategies for leading the change to an identity-centric approach to security.

Enter your details to receive email updates from Identiverse