
ERCOT IAM Future-Ready Identity Management Update
Explore ERCOT's journey towards future-ready identity and access management (IAM) solutions, including goals, processes, and collaborative efforts with market participants. Enhance security, streamline access, and implement modern authentication systems for a seamless user experience. Stay updated with constant integration and collaboration for a secure business environment.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Identity and Access Management (IAM): Future Ready Identity Drew Bonser Vice President, Security and Chief Information Security Officer Nicholas Jessett Head of IAM Technology Working Group 26 of March 2025
ERCOTs Identity & Access Management (IAM) Our Goals for Market Participants Enable our Market Participant partners to log into their tools easily, seamlessly, and once to do their work One simple logon with all the access you need Replace Certificates with a modern authentication solution Ensure an easier process for User Security Administrator (USA s) to administer their user base Increase the security of the Market Participant tools, while enabling ERCOT and the Market Participants to seamlessly work together Hired Deloitte to review our tooling and processes in order to recommend new authentication systems and a roadmap to implement modern tooling and processes for our Market Participants, also known as Business to Business (B2B) 2024 report from Sophos found that over three-quarters (77%) of attacks saw compromised credentials as an initial access method Item 3.2.2 ERCOT Public 2
Future Ready Identity: Market Participants Our Process Update our Protocols for Market Participant Individuals with ERCOT Access (MPIEA) through the PUCT Select a Future Ready, Modern Authentication vendor to facilitate easier and more streamlined access Build out the new authentication solution Integrate pilot applications to new solution Pilot authentication solution with Market Participant volunteers to gain feedback and improve the process Phased integration of remaining applications and rollout authentication solution to Market Participants System to System Access Constant Updates and Collaboration With Our Market Participant Partners Item 3.2.2 ERCOT Public 93% of organizations had two or more identity-related breaches in the past year 3
Appendix 4 Item 5 ERCOT Public/Confidential