SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Entities, Identities, & Registries
Heather Vescent
SSI Meetup | September 2019
Gaps in Corporate and IoT Identity
Creative Commons license. (CC BY-SA 4.0).
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
Who am I
Heather Vescent
• CEO, The Purple Tornado
Strategic Intelligence Consultancy
• Author, Cyber Attack Manual
• Author, SSI Report
• Filmmaker, 14 Films (IIW Films)
• IIW, CCG VC WG Communities
• @heathervescent
Creative Commons license. (CC BY-SA 4.0).
Research Background
• Private Sector Digital Identity
• Funded by DHS Science & Technology
Cybersecurity Division
• Researchers: Heather Vescent & Kaliya
Young
• Download: bit.ly/NPEreport
Objective: Research private sector companies digital identity and data
privacy processes, with an emphasis on identifying market failures.
Creative Commons license. (CC BY-SA 4.0).
Current State
• Past solutions create today’s problems
• New technologies create new opportunities
• Onboard of billions of new identities
– Humans
– Companies
– IoT objects (smart things)
– Tracking (dumb things)
– Robots
• New regulations
Creative Commons license. (CC BY-SA 4.0).
What is a Non-Person Entity Identity?
Creative Commons license. (CC BY-SA 4.0).
What is a Non-Person Entity Identity?
Company
(legal entity)
Creative Commons license. (CC BY-SA 4.0).
Thing
(IoT device)
What is a Non-Person Entity Identity?
Company
(legal entity)
Creative Commons license. (CC BY-SA 4.0).
System
(network)
Thing
(IoT device)
What is a Non-Person Entity Identity?
Company
(legal entity)
Creative Commons license. (CC BY-SA 4.0).
How many identities?
180 Million Companies
2 Gov + 3 Business IDs
900 million identities
7.7 Billion Humans
34-48% online
2 Gov + 5 Online ID
18-26+ billion identities
(FB: 2.38B, G:2+B users)
25-75 billion IoT devices
(by 2021)
35 million packages
daily shipped/tracked
(UPS & FedEx)
9 billion yearly
Creative Commons license. (CC BY-SA 4.0).
How many identities?
180 Million Companies
2 Gov + 3 Business IDs
900 million identities
7.7 Billion Humans
34-48% online
2 Gov + 5 Online ID
18-26+ billion identities
(FB: 2.38B, G:2+B users)
25-75 billion IoT devices
(by 2021)
35 million packages
daily shipped/tracked
(UPS & FedEx)
9 billion yearly
~100 Billion
Identities
Creative Commons license. (CC BY-SA 4.0).
+ robot identity?
Creative Commons license. (CC BY-SA 4.0).
NPEs are given identity (Registries)
Creative Commons license. (CC BY-SA 4.0).
• Identity is used to create
more identifiers
Web of Organizational Trust
Creative Commons license. (CC BY-SA 4.0).
NPE identity requires human identity
• Ownership / Liability
• Responsibility
• Humans take actions for NPEs
• NPEs take action for humans
• (And collect & share data)
Creative Commons license. (CC BY-SA 4.0).
Why important to Government?
• Governments give legal entities identity
• Legal identity is important in many industries
o Banking & Finance (KYC, AML, UBO, Beneficiary)
o Global Trade
• Customs
o Internet of Things is growing exponentially
• Security of sensors
• Authenticity of sensor collected data
• Who is responsible/liable when things go wrong?
Creative Commons license. (CC BY-SA 4.0).
NPE is complex
NPE Identities
• Relate to each other
• Interact with each other
• Depend on each other
Creative Commons license. (CC BY-SA 4.0).
Report identified 11 Market Gaps
Corporate NPE Gaps IOT NPE Gaps
1. Legal Identity of Corporations 1. Legal Identity of IoT Things
2. Conclusive Ultimate Beneficial Owner 2. Tracking and Auditing in the Supply Chain
3. Conclusive Verified Corporate Data 3. IoT Security Standards
4. Corporate Delegation 4. IT Self-Authentication
5. Real-Time Verified Identity 5. Data Integrity from IoT Sensors
6. NPE Responsibility
Creative Commons license. (CC BY-SA 4.0).
1: Legal Identity of Corporations
• PROBLEM: Digitally native identity credentials don’t exist, nor
do ways to receive and give verified credentials about an
organization’s identity from an authoritative source.
• IMPACT: KYC checks are costly and take time.
“KYC and associated processes cost the average bank
$60m annually.” - Consult Hyperion report
Creative Commons license. (CC BY-SA 4.0).
2: Conclusive Ultimate Beneficial Owner
• PROBLEM: Finding the Ultimate Beneficial Owner (UBO) of a
company is difficult and sometimes impossible. Banks aren’t
required by statute to conclusively find a UBO before
proceeding, but to make a reasonably good-faith effort to do so.
• IMPACT: Hard to quantify the cost but not knowing who a UBO
can result in tax fraud, enable criminal and terrorism activities
and transactions designed to circumvent sanctions.
Creative Commons license. (CC BY-SA 4.0).
3: Conclusive Verified Corporation Data
• PROBLEM: There is no standard way to find verified corporate
identity data, like legal name, address and jurisdiction along
with the identification of authorized delegates who have
authority to sign contracts, transfer funds, and take action on
behalf of the company – in a digitally native format.
• IMPACT: Initial costs (similar to KYC costs) for corporate
identity proofing. These costs include accessing outside
databases for information, confirming that data, as well as
ongoing costs to keep this data current.
Creative Commons license. (CC BY-SA 4.0).
4: Corporate Delegation
Humans enter into contracts, make
financial transactions, and take other
actions on behalf of the corporation.
There are processes to initiate this
delegation, and the need for
up-to-date information of who remains
authorized.
GAP: Real-time verified delegation
Creative Commons license. (CC BY-SA 4.0).
5: Real-Time Verified Identity
• PROBLEM: Real-time updated identity information associated
with corporate accounts, specifically which humans have the
authority to take action on behalf of a company on a real-time
basis. Current corporate delegation data is updated anywhere
from 30 days to 2 years.
• IMPACT: One subject matter experts shared a story of CEO fraud,
where criminals spear phished a corporate account and convinced
CEOs to transfer millions of dollars to the criminal account.
Creative Commons license. (CC BY-SA 4.0).
6: NPE Responsibility
• PROBLEM: A company (which is an NPE) owns robots (which are
NPEs) that work in a factory. A company (an NPE) manufactures
an autonomous vehicle (an NPE). A company (an NPE)
manufactures a pacemaker (an NPE) and also collects data about
the pacemaker’s system as well as data about the human system
whose the device is embedded in.
• IMPACT: This could become an issue in the future, for example the
case of liability of self-driving car, or a factory robot, that isn’t
directly mapped to an individual supervisor or “driver” but under
corporate or algorithmic control.
Creative Commons license. (CC BY-SA 4.0).
7: Legal Identity of IoT Things
Identity is built into very few IoT devices. There are
no universal standards or regulations around which
IoT objects have an identity assigned at “birth,”
unlike a baby registry or corporate registry.
• Some companies give IoT devices an identity – but legal
identity is not required.
• Some companies keep registries for devices like
pacemakers or jet engines.
GAP: Legal IoT Identity
Creative Commons license. (CC BY-SA 4.0).
8: Tracking & Auditing the Supply Chain
• PROBLEM: Many goods are tracked and audited as they
flow from manufacturer through the supply chain to the
destination. While many goods are tracked with a barcode or
serial number, there is the desire to more thoroughly track
goods in the supply chain, including their components,
sources of raw material, and the chain of custody.
• IMPACT: Lost income due to IP theft. Lost tax revenue.
Potential terrorist financing.
Creative Commons license. (CC BY-SA 4.0).
9: IoT Security Standards
• PROBLEM: Smart homes, surveillance devices, connected
appliances, and vehicles have persistent and structural vulnerabilities
that makes them difficult to secure for many real-world situations.
Many tools are designed with weak security and are vulnerable to “IoT
takeovers.”
• IMPACT: The liability ramifications are largely a matter of speculation,
however we can get an idea of some economic impacts by the size of
the ransomware market estimated at $1b in 2016 and $2b in 2017.
“Securing IoT devices is a major challenge, and manufacturers tend to focus on
functionality, compatibility requirements, and time-to-market rather than security.”
—Interagency Report on Status of International Cybersecurity Standardization
Creative Commons license. (CC BY-SA 4.0).
10: IoT Self-Authentication
• PROBLEM: The technical process of
authenticating the veracity of the IoT device
and any data collected by the IoT device.
• IMPACT: Limits utility to high-exposure IoT
applications, due to economic cost. Attack
surfaces remain due to high cost to implement
broadly.
Creative Commons license. (CC BY-SA 4.0).
11: Data Integrity from IoT Sensors
• PROBLEM: How do I know the data coming off the sensor data is
accurate? There needs to be mechanisms to know data coming off
sensors, drones, and other IoT data-generating devices is reliable
for high-security applications.
• IMPACT: Contamination or distortion of data from smart city
sensors, lightweight devices that control utility grids or operations,
and other cyber-physical systems could do serious real-world
damage if an attack occurred and it took significant time to detect
due to failed monitoring sensors.
Creative Commons license. (CC BY-SA 4.0).
Other Impacts
• Regulation
• Global landscape
• Scale
• Formal ownership
One of the major reasons the Internet+ is so insecure today is the absence of government
oversight. Government is by far the most common way we improve our collective
security, and it is almost certainly the most efficient.
—Bruce Schneier, Click Here to Kill Everyone
Creative Commons license. (CC BY-SA 4.0).
Future: Augmented Identity
• Software taking action on your behalf
• Devices doing things on your behalf
• Data collecting/sharing on your behalf
Do we need more nuanced identity?
Creative Commons license. (CC BY-SA 4.0).
Future: Combined Identity
People create a collective identity that acts in a
unified way as more than the sum of its parts.
• Today’s systems are set up for a single or legal
identity.
• There is no way for a group to create a collective
identity with financial and log in authentication.
• This use case could be used for ad-hoc, temporal
business collaborations like film productions and
creative project based partnerships.
• Could include NPEs.
Creative Commons license. (CC BY-SA 4.0).
Why do we care?
• Liability: who pays when something goes wrong?
• Responsibility: who is responsible at a particular time?
• Regulation: global trend for more regulation
• Collaboration: rising trend to work together
• Future Proof: envision the true scale of the problem
Creative Commons license. (CC BY-SA 4.0).
Future Identity System Goals
• Manage a trillion identities
– And all their relationships
• Thrive in dynamic environment
• Enable delegation
– Between humans & NPEs
• Involve automated systems
• Solve current data, privacy problems
Creative Commons license. (CC BY-SA 4.0).
Thank you + Questions
Heather Vescent
• www.ssiscoop.com
• www.thepurpletornado.com
• heathervescent@gmail.com
• vescent@thepurpletornado.com
• @heathervescent Download NPE: bit.ly/NPEreport
Download VDS: bit.ly/vdsreport
Creative Commons license. (CC BY-SA 4.0).
Entities, Identities, & Registries
Heather Vescent
SSI Meetup | September 2019
Gaps in Corporate and IoT Identity
Creative Commons license. (CC BY-SA 4.0).

Contenu connexe

Tendances

Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloSSIMeetup
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaSSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...SSIMeetup
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 

Tendances (20)

Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 

Similaire à All you need to know about SSI for Corporates and IoT – Heather Vescent

Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015bmcmenemy
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)JISC.AM
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01Red Morley Hewitt
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxsheronlewthwaite
 

Similaire à All you need to know about SSI for Corporates and IoT – Heather Vescent (20)

Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
 
Strategic Patent Monetization 4Q 2015
Strategic Patent Monetization 4Q 2015Strategic Patent Monetization 4Q 2015
Strategic Patent Monetization 4Q 2015
 

Dernier

𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 

Dernier (20)

𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 

All you need to know about SSI for Corporates and IoT – Heather Vescent

  • 1. Entities, Identities, & Registries Heather Vescent SSI Meetup | September 2019 Gaps in Corporate and IoT Identity Creative Commons license. (CC BY-SA 4.0).
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives
  • 3. Who am I Heather Vescent • CEO, The Purple Tornado Strategic Intelligence Consultancy • Author, Cyber Attack Manual • Author, SSI Report • Filmmaker, 14 Films (IIW Films) • IIW, CCG VC WG Communities • @heathervescent Creative Commons license. (CC BY-SA 4.0).
  • 4. Research Background • Private Sector Digital Identity • Funded by DHS Science & Technology Cybersecurity Division • Researchers: Heather Vescent & Kaliya Young • Download: bit.ly/NPEreport Objective: Research private sector companies digital identity and data privacy processes, with an emphasis on identifying market failures. Creative Commons license. (CC BY-SA 4.0).
  • 5. Current State • Past solutions create today’s problems • New technologies create new opportunities • Onboard of billions of new identities – Humans – Companies – IoT objects (smart things) – Tracking (dumb things) – Robots • New regulations Creative Commons license. (CC BY-SA 4.0).
  • 6. What is a Non-Person Entity Identity? Creative Commons license. (CC BY-SA 4.0).
  • 7. What is a Non-Person Entity Identity? Company (legal entity) Creative Commons license. (CC BY-SA 4.0).
  • 8. Thing (IoT device) What is a Non-Person Entity Identity? Company (legal entity) Creative Commons license. (CC BY-SA 4.0).
  • 9. System (network) Thing (IoT device) What is a Non-Person Entity Identity? Company (legal entity) Creative Commons license. (CC BY-SA 4.0).
  • 10. How many identities? 180 Million Companies 2 Gov + 3 Business IDs 900 million identities 7.7 Billion Humans 34-48% online 2 Gov + 5 Online ID 18-26+ billion identities (FB: 2.38B, G:2+B users) 25-75 billion IoT devices (by 2021) 35 million packages daily shipped/tracked (UPS & FedEx) 9 billion yearly Creative Commons license. (CC BY-SA 4.0).
  • 11. How many identities? 180 Million Companies 2 Gov + 3 Business IDs 900 million identities 7.7 Billion Humans 34-48% online 2 Gov + 5 Online ID 18-26+ billion identities (FB: 2.38B, G:2+B users) 25-75 billion IoT devices (by 2021) 35 million packages daily shipped/tracked (UPS & FedEx) 9 billion yearly ~100 Billion Identities Creative Commons license. (CC BY-SA 4.0).
  • 12. + robot identity? Creative Commons license. (CC BY-SA 4.0).
  • 13. NPEs are given identity (Registries) Creative Commons license. (CC BY-SA 4.0).
  • 14. • Identity is used to create more identifiers Web of Organizational Trust Creative Commons license. (CC BY-SA 4.0).
  • 15. NPE identity requires human identity • Ownership / Liability • Responsibility • Humans take actions for NPEs • NPEs take action for humans • (And collect & share data) Creative Commons license. (CC BY-SA 4.0).
  • 16. Why important to Government? • Governments give legal entities identity • Legal identity is important in many industries o Banking & Finance (KYC, AML, UBO, Beneficiary) o Global Trade • Customs o Internet of Things is growing exponentially • Security of sensors • Authenticity of sensor collected data • Who is responsible/liable when things go wrong? Creative Commons license. (CC BY-SA 4.0).
  • 17. NPE is complex NPE Identities • Relate to each other • Interact with each other • Depend on each other Creative Commons license. (CC BY-SA 4.0).
  • 18. Report identified 11 Market Gaps Corporate NPE Gaps IOT NPE Gaps 1. Legal Identity of Corporations 1. Legal Identity of IoT Things 2. Conclusive Ultimate Beneficial Owner 2. Tracking and Auditing in the Supply Chain 3. Conclusive Verified Corporate Data 3. IoT Security Standards 4. Corporate Delegation 4. IT Self-Authentication 5. Real-Time Verified Identity 5. Data Integrity from IoT Sensors 6. NPE Responsibility Creative Commons license. (CC BY-SA 4.0).
  • 19. 1: Legal Identity of Corporations • PROBLEM: Digitally native identity credentials don’t exist, nor do ways to receive and give verified credentials about an organization’s identity from an authoritative source. • IMPACT: KYC checks are costly and take time. “KYC and associated processes cost the average bank $60m annually.” - Consult Hyperion report Creative Commons license. (CC BY-SA 4.0).
  • 20. 2: Conclusive Ultimate Beneficial Owner • PROBLEM: Finding the Ultimate Beneficial Owner (UBO) of a company is difficult and sometimes impossible. Banks aren’t required by statute to conclusively find a UBO before proceeding, but to make a reasonably good-faith effort to do so. • IMPACT: Hard to quantify the cost but not knowing who a UBO can result in tax fraud, enable criminal and terrorism activities and transactions designed to circumvent sanctions. Creative Commons license. (CC BY-SA 4.0).
  • 21. 3: Conclusive Verified Corporation Data • PROBLEM: There is no standard way to find verified corporate identity data, like legal name, address and jurisdiction along with the identification of authorized delegates who have authority to sign contracts, transfer funds, and take action on behalf of the company – in a digitally native format. • IMPACT: Initial costs (similar to KYC costs) for corporate identity proofing. These costs include accessing outside databases for information, confirming that data, as well as ongoing costs to keep this data current. Creative Commons license. (CC BY-SA 4.0).
  • 22. 4: Corporate Delegation Humans enter into contracts, make financial transactions, and take other actions on behalf of the corporation. There are processes to initiate this delegation, and the need for up-to-date information of who remains authorized. GAP: Real-time verified delegation Creative Commons license. (CC BY-SA 4.0).
  • 23. 5: Real-Time Verified Identity • PROBLEM: Real-time updated identity information associated with corporate accounts, specifically which humans have the authority to take action on behalf of a company on a real-time basis. Current corporate delegation data is updated anywhere from 30 days to 2 years. • IMPACT: One subject matter experts shared a story of CEO fraud, where criminals spear phished a corporate account and convinced CEOs to transfer millions of dollars to the criminal account. Creative Commons license. (CC BY-SA 4.0).
  • 24. 6: NPE Responsibility • PROBLEM: A company (which is an NPE) owns robots (which are NPEs) that work in a factory. A company (an NPE) manufactures an autonomous vehicle (an NPE). A company (an NPE) manufactures a pacemaker (an NPE) and also collects data about the pacemaker’s system as well as data about the human system whose the device is embedded in. • IMPACT: This could become an issue in the future, for example the case of liability of self-driving car, or a factory robot, that isn’t directly mapped to an individual supervisor or “driver” but under corporate or algorithmic control. Creative Commons license. (CC BY-SA 4.0).
  • 25. 7: Legal Identity of IoT Things Identity is built into very few IoT devices. There are no universal standards or regulations around which IoT objects have an identity assigned at “birth,” unlike a baby registry or corporate registry. • Some companies give IoT devices an identity – but legal identity is not required. • Some companies keep registries for devices like pacemakers or jet engines. GAP: Legal IoT Identity Creative Commons license. (CC BY-SA 4.0).
  • 26. 8: Tracking & Auditing the Supply Chain • PROBLEM: Many goods are tracked and audited as they flow from manufacturer through the supply chain to the destination. While many goods are tracked with a barcode or serial number, there is the desire to more thoroughly track goods in the supply chain, including their components, sources of raw material, and the chain of custody. • IMPACT: Lost income due to IP theft. Lost tax revenue. Potential terrorist financing. Creative Commons license. (CC BY-SA 4.0).
  • 27. 9: IoT Security Standards • PROBLEM: Smart homes, surveillance devices, connected appliances, and vehicles have persistent and structural vulnerabilities that makes them difficult to secure for many real-world situations. Many tools are designed with weak security and are vulnerable to “IoT takeovers.” • IMPACT: The liability ramifications are largely a matter of speculation, however we can get an idea of some economic impacts by the size of the ransomware market estimated at $1b in 2016 and $2b in 2017. “Securing IoT devices is a major challenge, and manufacturers tend to focus on functionality, compatibility requirements, and time-to-market rather than security.” —Interagency Report on Status of International Cybersecurity Standardization Creative Commons license. (CC BY-SA 4.0).
  • 28. 10: IoT Self-Authentication • PROBLEM: The technical process of authenticating the veracity of the IoT device and any data collected by the IoT device. • IMPACT: Limits utility to high-exposure IoT applications, due to economic cost. Attack surfaces remain due to high cost to implement broadly. Creative Commons license. (CC BY-SA 4.0).
  • 29. 11: Data Integrity from IoT Sensors • PROBLEM: How do I know the data coming off the sensor data is accurate? There needs to be mechanisms to know data coming off sensors, drones, and other IoT data-generating devices is reliable for high-security applications. • IMPACT: Contamination or distortion of data from smart city sensors, lightweight devices that control utility grids or operations, and other cyber-physical systems could do serious real-world damage if an attack occurred and it took significant time to detect due to failed monitoring sensors. Creative Commons license. (CC BY-SA 4.0).
  • 30. Other Impacts • Regulation • Global landscape • Scale • Formal ownership One of the major reasons the Internet+ is so insecure today is the absence of government oversight. Government is by far the most common way we improve our collective security, and it is almost certainly the most efficient. —Bruce Schneier, Click Here to Kill Everyone Creative Commons license. (CC BY-SA 4.0).
  • 31. Future: Augmented Identity • Software taking action on your behalf • Devices doing things on your behalf • Data collecting/sharing on your behalf Do we need more nuanced identity? Creative Commons license. (CC BY-SA 4.0).
  • 32. Future: Combined Identity People create a collective identity that acts in a unified way as more than the sum of its parts. • Today’s systems are set up for a single or legal identity. • There is no way for a group to create a collective identity with financial and log in authentication. • This use case could be used for ad-hoc, temporal business collaborations like film productions and creative project based partnerships. • Could include NPEs. Creative Commons license. (CC BY-SA 4.0).
  • 33. Why do we care? • Liability: who pays when something goes wrong? • Responsibility: who is responsible at a particular time? • Regulation: global trend for more regulation • Collaboration: rising trend to work together • Future Proof: envision the true scale of the problem Creative Commons license. (CC BY-SA 4.0).
  • 34. Future Identity System Goals • Manage a trillion identities – And all their relationships • Thrive in dynamic environment • Enable delegation – Between humans & NPEs • Involve automated systems • Solve current data, privacy problems Creative Commons license. (CC BY-SA 4.0).
  • 35. Thank you + Questions Heather Vescent • www.ssiscoop.com • www.thepurpletornado.com • heathervescent@gmail.com • vescent@thepurpletornado.com • @heathervescent Download NPE: bit.ly/NPEreport Download VDS: bit.ly/vdsreport Creative Commons license. (CC BY-SA 4.0).
  • 36. Entities, Identities, & Registries Heather Vescent SSI Meetup | September 2019 Gaps in Corporate and IoT Identity Creative Commons license. (CC BY-SA 4.0).