SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
1	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
NSTIC	
  in	
  Mo+on	
  
Pilots,	
  Policy	
  and	
  Progress	
  
	
  
Jeremy	
  Grant	
  	
  
Senior	
  Execu+ve	
  Advisor,	
  Iden+ty	
  Management	
  
Na+onal	
  Ins+tute	
  of	
  Standards	
  and	
  Technology	
  (NIST)	
  
	
  
	
  
	
  
	
  
2	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
NSTIC	
  Workshop	
  Agenda	
  
Sessions	
  
1pm	
   Part	
  1	
  
•  “The	
  State	
  of	
  the	
  NSTIC”	
  –	
  Jeremy	
  Grant	
  
•  Pilot	
  Report	
  #1:	
  MFA	
  in	
  the	
  Commercial	
  Sector	
  –	
  Cathy	
  Tilton,	
  Daon	
  
2pm	
   Part	
  2	
  
•  Pilot	
  Report	
  #2:	
  	
  AKribute	
  Exchange	
  Network	
  –	
  Dave	
  Coxe,	
  Criterion	
  Systems	
  
•  Pilot	
  Report	
  #3:	
  	
  Scalable	
  Privacy	
  and	
  MFA	
  –	
  Ken	
  Klingenstein,	
  Internet2	
  
3pm	
   Part	
  3	
  
•  Iden%ty	
  Ecosystem	
  Steering	
  Group	
  (IDESG)	
  –	
  Bob	
  Blakely,	
  Ci%group	
  
•  Federal	
  Cloud	
  Creden%al	
  Exchange	
  (FCCX)	
  –	
  Jeremy	
  Grant	
  (NIST)	
  and	
  Doug	
  
Glair	
  (USPS)	
  
•  NSTIC	
  and	
  the	
  Na%onal	
  Cybersecurity	
  Center	
  of	
  Excellence	
  (NCCoE)	
  –	
  Nate	
  
Lesser	
  (NIST)	
  
•  Discussion	
  and	
  Perspec%ves	
  
3	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
State of the
NSTIC
4	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Imagine	
  if…	
  
Four	
  years	
  from	
  now,	
  80%	
  of	
  your	
  customers	
  arrived	
  
at	
  your	
  website	
  already	
  holding	
  a	
  secure	
  creden+al	
  
for	
  iden+fica+on	
  and	
  authen+ca+on	
  –	
  and	
  you	
  could	
  
trust	
  this	
  creden+al	
  in	
  lieu	
  of	
  your	
  exis+ng	
  
username/password	
  system.	
  
Interoperable	
  
with	
  your	
  
login	
  system	
  
(you	
  don’t	
  
have	
  to	
  issue	
  
creden%als)	
  
Mul%-­‐factor	
  
authen%ca%on	
  
(no	
  more	
  
password	
  
management)	
  
Tied	
  to	
  a	
  robust	
  
iden%ty	
  proofing	
  
mechanism	
  (you	
  
know	
  if	
  they	
  are	
  
who	
  they	
  claim	
  
to	
  be)	
  
With	
  baked-­‐in	
  
rules	
  to	
  limit	
  
liability	
  and	
  
protect	
  
privacy	
  
5	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
What	
  would	
  this	
  mean…	
  
For	
  Security	
  and	
  Loss	
  Preven+on?	
  
• 5	
  of	
  the	
  top	
  6	
  vectors	
  of	
  aKack	
  in	
  2011	
  data	
  breaches	
  %ed	
  to	
  
passwords;	
  76%	
  of	
  all	
  2012	
  records	
  breached	
  %ed	
  to	
  passwords.	
  
• The	
  number	
  of	
  Americans	
  impacted	
  by	
  data	
  breaches	
  rose	
  67%	
  
from	
  2010	
  to	
  2011	
  
• Weak	
  iden%ty	
  systems	
  fuel	
  online	
  fraud,	
  make	
  it	
  impossible	
  to	
  
know	
  who	
  is	
  a	
  “dog	
  on	
  the	
  Internet”	
  
For	
  Reducing	
  Fric+on	
  in	
  Online	
  Commerce?	
  
• Today,	
  75%	
  of	
  customers	
  will	
  avoid	
  crea%ng	
  new	
  accounts.	
  	
  54%	
  
leave	
  the	
  site	
  or	
  do	
  not	
  return	
  
• Today,	
  45%	
  of	
  consumers	
  will	
  abandon	
  a	
  site	
  rather	
  than	
  
aKempt	
  to	
  reset	
  their	
  passwords	
  or	
  answer	
  security	
  ques%ons	
  
6	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Two	
  years,	
  two	
  months	
  and	
  24	
  days	
  ago…	
  
An	
  Iden+ty	
  Ecosystem…with	
  4	
  Guiding	
  
Principles	
  
•  Privacy-­‐Enhancing	
  and	
  Voluntary	
  
•  Secure	
  and	
  Resilient	
  
•  Interoperable	
  
•  Cost-­‐Effec%ve	
  and	
  Easy	
  To	
  Use	
  
7	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
There	
  is	
  a	
  marketplace	
  today	
  –	
  but	
  there	
  
are	
  barriers	
  the	
  market	
  has	
  not	
  yet	
  
addressed	
  on	
  its	
  own	
  
Why	
  NSTIC?	
  
8	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Barriers:	
  	
  Security	
  is	
  a	
  big	
  issue	
  
Source:	
  	
  2012	
  Data	
  Breach	
  Inves%ga%ons	
  Report,	
  Verizon	
  and	
  USSS	
  
2011:	
  	
  5	
  of	
  the	
  top	
  6	
  aKack	
  vectors	
  are	
  %ed	
  to	
  passwords	
  
2010:	
  	
  4	
  of	
  the	
  top	
  10	
  
9	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Business	
  
Models	
  
But	
  –	
  it’s	
  not	
  all	
  about	
  security	
  	
  
Usability	
  
Liability	
  
Interoperability	
  Privacy	
  
Source:	
  	
  xkcd	
  
10	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
There	
  is	
  a	
  marketplace	
  today	
  –	
  but	
  there	
  
are	
  barriers	
  the	
  market	
  has	
  not	
  yet	
  
addressed	
  on	
  its	
  own.	
  
Government	
  can	
  serve	
  as	
  a	
  convener	
  and	
  
facilitator,	
  and	
  a	
  catalyst.	
  
	
  
Why	
  NSTIC?	
  
11	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Our	
  Implementa+on	
  Strategy	
  
12	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
We don’t want to boil the ocean.
13	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Let’s go surfing where the waves are…	

NSTIC	
  
14	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Private	
  sector	
  
will	
  lead	
  the	
  
effort	
  
Federal	
  
government	
  
will	
  provide	
  
support	
  
• Not	
  a	
  government-­‐run	
  iden%ty	
  program	
  
• Private	
  sector	
  is	
  in	
  the	
  best	
  posi%on	
  to	
  
drive	
  technologies	
  and	
  solu%ons…	
  
• …and	
  ensure	
  the	
  Iden%ty	
  Ecosystem	
  
offers	
  improved	
  online	
  trust	
  and	
  beKer	
  
customer	
  experiences	
  
• Support	
  development	
  of	
  a	
  private-­‐sector	
  
led	
  governance	
  model	
  
• Facilitate	
  and	
  lead	
  development	
  of	
  
interoperable	
  standards	
  
• Provide	
  clarity	
  on	
  na%onal	
  policy	
  and	
  
legal	
  issues	
  (i.e.,	
  liability	
  and	
  privacy)	
  	
  
• Fund	
  pilots	
  to	
  s%mulate	
  the	
  marketplace	
  
• Act	
  as	
  an	
  early	
  adopter	
  to	
  s%mulate	
  
demand	
  
What	
  does	
  NSTIC	
  call	
  for?	
  
15	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Where	
  do	
  we	
  stand?	
  
16	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
The	
  marketplace	
  has	
  started	
  to	
  respond	
  
17	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
But	
  instead	
  of	
  this…	
  
18	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
…I	
  now	
  am	
  managing	
  one-­‐off	
  2FA	
  solu+ons	
  for	
  
19	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
NSTIC	
  has	
  funded	
  5	
  pilots…with	
  more	
  coming	
  
AAMVA	
  
• Focus:	
  	
  Develop	
  
public-­‐private	
  
partnership	
  to	
  
strengthen	
  
private-­‐sector	
  
creden%als	
  with	
  
aKributes	
  from	
  
a	
  state	
  DMV	
  
• Virginia	
  DMV,	
  
Microsom,	
  CA,	
  
AT&T	
  are	
  key	
  
partners	
  
• Coming	
  soon:	
  	
  
an	
  important	
  
health	
  care	
  RP	
  
Daon	
  
• Focus:	
  	
  deploy	
  
smartphone	
  
based,	
  mul%-­‐
factor	
  
authen%ca%on	
  
to	
  consumers	
  
• AARP,	
  PayPal,	
  
Purdue	
  are	
  key	
  
relying	
  par%es	
  
• A	
  major	
  bank	
  
(not	
  yet	
  publicly	
  
named)	
  will	
  also	
  
be	
  an	
  RP	
  
Criterion	
  
• Focus:	
  develop	
  a	
  
viable	
  business	
  
model	
  for	
  
Iden%ty	
  
Ecosystem	
  and	
  
aKribute	
  
exchange	
  
• Broadridge	
  
Financial,	
  eBay,	
  
Wal-­‐Mart,	
  AOL,	
  
Verizon,	
  GE,	
  
Experian,	
  Lexis	
  
Nexis,	
  Ping,	
  CA,	
  
PacificEast	
  are	
  
key	
  partners	
  
Internet2	
  
• Focus:	
  deploy	
  
smartphone	
  
based,	
  mul%-­‐
factor	
  
authen%ca%on	
  
across	
  3	
  major	
  
universi%es,	
  
integrate	
  it	
  with	
  
a	
  privacy-­‐
protec%ng	
  
infrastructure.	
  
• MIT,	
  University	
  
of	
  Texas,	
  
University	
  of	
  
Utah	
  are	
  
deployment	
  
sites	
  
Resilient	
  
• Focus:	
  	
  test	
  	
  
“privacy	
  
enhancing”	
  
infrastructure	
  in	
  
health	
  care	
  and	
  
K-­‐12	
  
environments.	
  
• AMA,	
  American	
  
College	
  of	
  
Cardiology,	
  
LexisNexis,	
  
Neustar,	
  
Knowledgefactor	
  
are	
  key	
  partners	
  
20	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Pilots	
  lessons	
  learned	
  
Each	
  pilot	
  has	
  run	
  into	
  the	
  same	
  challenges	
  –	
  underscoring	
  the	
  
need	
  for	
  a	
  robust	
  Iden%ty	
  Ecosystem	
  Framework.	
  
Common	
  considera%ons:	
  
	
   o  No	
  standard	
  way	
  to	
  bring	
  on	
  new	
  RP’s	
  
(technical/policy/legal)	
  
o  Exis%ng	
  trust	
  frameworks	
  only	
  go	
  so	
  
far	
  
o  RP’s	
  struggle	
  to	
  sort	
  out	
  how	
  to	
  apply	
  
risk	
  assessment	
  to	
  determine	
  
creden%al	
  strength/LOA	
  (800-­‐63	
  aside,	
  
no	
  great	
  alterna%ves)	
  
o  Trust	
  frameworks	
  do	
  not	
  extend	
  to	
  
aKribute	
  providers/verifiers	
  	
  
o  How	
  to	
  ensure	
  “data	
  minimiza%on”	
  in	
  
aKribute	
  exchange,	
  when	
  some	
  APs	
  
offer	
  “data	
  promiscuity”	
  
o  How	
  to	
  flow	
  down	
  consent	
  
requirements	
  to	
  end-­‐users	
  in	
  a	
  logical	
  
fashion	
  
	
  
21	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
The	
  Iden+ty	
  Ecosystem	
  Steering	
  Group	
  	
  
Source:	
  	
  Phil	
  Wolff,	
  hKp://www.flickr.com/photos/philwolff/7789263898/in/photostream	
  
	
  	
  	
  	
  	
  	
  	
  First	
  plenary,	
  August	
  2012	
  
22	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
The	
  Iden+ty	
  Ecosystem	
  Steering	
  Group:	
  	
  	
  
Bringing	
  together	
  many	
  types	
  of	
  stakeholders	
  
23	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
•  200+	
  firms/organiza%ons;	
  60+	
  individuals	
  
•  Elected	
  Plenary	
  Chair	
  (Bob	
  Blakley/Ci%)	
  and	
  Management	
  Council	
  Chair	
  
(Peter	
  Brown);	
  Elected	
  16	
  delegates	
  to	
  Management	
  Council	
  
•  Member	
  firms	
  include:	
  	
  Verizon,	
  Visa,	
  PayPal,	
  Fidelity,	
  Ci%group,	
  Mass	
  
Mutual,	
  IBM,	
  Bank	
  of	
  America,	
  Microsom,	
  Oracle,	
  3M,	
  CA,	
  Symantec,	
  Lexis	
  
Nexis,	
  Experian,	
  Equifax,	
  Neiman	
  Marcus,	
  Aetna,	
  Merck,	
  United	
  Health,	
  Intel.	
  	
  
•  Also:	
  	
  AARP,	
  ACLU,	
  EPIC,	
  EFF,	
  and	
  more	
  than	
  65	
  universi%es.	
  	
  Par%cipants	
  
from	
  12+	
  countries.	
  	
  	
  
•  CommiKees	
  include:	
  
The	
  Iden+ty	
  Ecosystem	
  Steering	
  Group	
  
o Standards	
  
o Policy	
  
o Privacy	
  
o User	
  Experience	
  
o Security	
  
o Trust	
  Frameworks	
  &	
  Trustmarks	
  
o Health	
  Care	
  
o Financial	
  Sector	
  
o Interna%onal	
  Coordina%on	
  
	
  
24	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Linking	
  Strategy	
  to	
  Execu+on	
  
•  Voluntary,	
  mul%-­‐stakeholder	
  
collabora%ve	
  efforts	
  are	
  
hard.	
  	
  
•  What	
  is	
  the	
  art	
  of	
  the	
  
possible?	
  
•  What	
  incen%ves	
  might	
  be	
  
needed	
  to	
  fully	
  realize	
  the	
  
NSTIC	
  vision?	
  
25	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
NSTIC	
  envisions	
  the	
  poten+al	
  need	
  for	
  new	
  policies	
  
“The	
  Federal	
  Government	
  may	
  need	
  to	
  establish	
  or	
  
amend	
  both	
  policies	
  and	
  laws	
  to	
  address"	
  concerns	
  such	
  
as	
  "the	
  uncertainty	
  and	
  fear	
  of	
  unbounded	
  liability	
  that	
  
have	
  limited	
  the	
  market's	
  growth.”	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  -­‐NSTIC,	
  page	
  31	
  
•  The	
  IDESG	
  Policy	
  CommiKee	
  is	
  reviewing	
  this	
  topic	
  
•  A	
  unique	
  window	
  of	
  opportunity	
  
26	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Ensuring	
  the	
  U.S.	
  Government	
  
can	
  be	
  an	
  early	
  Adopter	
  
27	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Making	
  progress	
  in	
  government	
  is	
  tough…	
  
28	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
…but	
  not	
  impossible	
  
29	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Where	
  we	
  started	
  
FICAM	
  
(TFPAP)	
  
TFP	
  
MoUs	
  
Cer+fica+on	
  Agreements	
  
IdP	
   IdP	
  
IdP	
  
TFP	
  
Integra%on	
  
???	
  
$$$!!!	
  
RP	
   RP	
  
RP	
  RP	
  
Agencies	
  
Current	
  Agency	
  Environment	
  
Ci%zens	
  Government	
  
A	
  befer	
  way	
  
Ci%zens	
  Government	
  
FCCX	
  
32	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
New	
  study	
  shows	
  real	
  USG	
  cost	
  savings	
  from	
  
NSTIC	
  
•  Funded	
  by	
  NIST	
  Economic	
  
Analysis	
  Office	
  ,	
  conducted	
  
in	
  partnership	
  with	
  the	
  IRS	
  
•  Focus:	
  	
  cost-­‐benefit	
  analysis	
  
comparing	
  federa%on	
  
(NSTIC)	
  approach	
  vs.	
  one-­‐off	
  
proprietary	
  authen%ca%on	
  
system	
  
•  Looked	
  at	
  3	
  scenarios:	
  	
  20%,	
  
50%,	
  70%	
  adop%on	
  
33	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
New	
  study	
  shows	
  real	
  USG	
  cost	
  savings	
  from	
  
NSTIC	
  
Key	
  Findings	
  
•  Over	
  a	
  10-­‐year	
  period,	
  IRS	
  would	
  save	
  $63	
  million	
  to	
  $298	
  
million	
  by	
  aligning	
  its	
  ci%zen-­‐facing	
  iden%ty	
  and	
  
authen%ca%on	
  efforts	
  with	
  NSTIC	
  (vs.	
  building	
  a	
  stovepiped,	
  
IRS-­‐only	
  system)	
  
•  Up-­‐front	
  adop%on	
  savings	
  would	
  be	
  $40	
  million	
  to	
  $111	
  
million	
  	
  	
  
•  Savings	
  driven	
  both	
  by	
  avoidance	
  of	
  duplica%ve	
  iden%ty	
  
proofing	
  and	
  authen%ca%on	
  costs,	
  as	
  well	
  as	
  increased	
  
customer	
  uptake	
  of	
  online	
  offerings	
  	
  	
  
•  Opportunity:	
  	
  IRS	
  spent	
  over	
  $1	
  billion	
  communica%ng	
  with	
  
taxpayers	
  on	
  paper	
  and	
  by	
  telephone	
  in	
  2012	
  
	
  
34	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
A	
  final	
  thought	
  
35	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
$2	
  	
  	
  	
  
Trillion	
  
The	
  total	
  
projected	
  
online	
  retail	
  
sales	
  across	
  
the	
  G20	
  
na%ons	
  in	
  
2016	
  
$2.5	
  
trillion	
  	
  
What	
  this	
  
number	
  can	
  
grow	
  to	
  if	
  
consumers	
  
believe	
  the	
  
Internet	
  is	
  
more	
  worthy	
  
of	
  their	
  trust	
  	
  	
  
$1.5	
  
Trillion	
  
What	
  this	
  
number	
  will	
  
fall	
  to	
  if	
  Trust	
  
is	
  eroded	
  
Trust	
  mafers	
  to	
  online	
  business	
  
Source:	
  	
  Rethinking	
  Personal	
  Data:	
  Strengthening	
  Trust.	
  	
  World	
  Economic	
  Forum,	
  May	
  2012.	
  	
  	
  
36	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Ques+ons?	
  
Jeremy	
  Grant	
  
jgrant@nist.gov	
  
202.482.3050	
  
	
  
	
  
Iden+ty	
  Ecosystem	
  Steering	
  Group	
  
www.idecosytem.org	
  
idecosystem@trustedfederal.com	
  
	
  	
  
	
  
37	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
NSTIC	
  Workshop	
  Agenda	
  
Sessions	
  
1pm	
   Part	
  1	
  
•  “The	
  State	
  of	
  the	
  NSTIC”	
  –	
  Jeremy	
  Grant	
  
•  Pilot	
  Report	
  #1:	
  MFA	
  in	
  the	
  Commercial	
  Sector	
  –	
  Cathy	
  Tilton,	
  Daon	
  
2pm	
   Part	
  2	
  
•  Pilot	
  Report	
  #2:	
  	
  AKribute	
  Exchange	
  Network	
  –	
  Dave	
  Coxe,	
  Criterion	
  Systems	
  
•  Pilot	
  Report	
  #3:	
  	
  Scalable	
  Privacy	
  and	
  MFA	
  –	
  Ken	
  Klingenstein,	
  Internet2	
  
3pm	
   Part	
  3	
  
•  Iden%ty	
  Ecosystem	
  Steering	
  Group	
  (IDESG)	
  –	
  Bob	
  Blakely,	
  Ci%group	
  
•  Federal	
  Cloud	
  Creden%al	
  Exchange	
  (FCCX)	
  –	
  Jeremy	
  Grant	
  (NIST)	
  and	
  Doug	
  
Glair	
  (USPS)	
  
•  NSTIC	
  and	
  the	
  Na%onal	
  Cybersecurity	
  Center	
  of	
  Excellence	
  (NCCoE)	
  –	
  Nate	
  
Lesser	
  (NIST)	
  
•  Discussion	
  and	
  Perspec%ves	
  
38	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
39	
  Na%onal	
  Strategy	
  for	
  Trusted	
  Iden%%es	
  in	
  Cyberspace	
  
Created	
  to	
  administer	
  the	
  development	
  of	
  
policies,	
  standards,	
  and	
  accreditaHon	
  
processes	
  for	
  the	
  Iden&ty	
  Ecosystem	
  
Framework.	
  
	
  
	
  
	
  
www.idecosystem.org	
  	
  
The	
  Iden+ty	
  Ecosystem	
  Steering	
  Group	
  

Contenu connexe

Tendances

Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Novetta Entity Analytics
Novetta Entity AnalyticsNovetta Entity Analytics
Novetta Entity AnalyticsNovetta
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityMighty Guides, Inc.
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax Technology
 
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkWhy the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkNovetta
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 
Threat Hunting ve EDR Etkinliği Carbon Black Sunumu
Threat Hunting ve EDR Etkinliği Carbon Black SunumuThreat Hunting ve EDR Etkinliği Carbon Black Sunumu
Threat Hunting ve EDR Etkinliği Carbon Black SunumuBGA Cyber Security
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity SurveyAdobe
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Accenture Security
 
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA Argentina
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 

Tendances (20)

Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Novetta Entity Analytics
Novetta Entity AnalyticsNovetta Entity Analytics
Novetta Entity Analytics
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint Security
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkWhy the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Threat Hunting ve EDR Etkinliği Carbon Black Sunumu
Threat Hunting ve EDR Etkinliği Carbon Black SunumuThreat Hunting ve EDR Etkinliği Carbon Black Sunumu
Threat Hunting ve EDR Etkinliği Carbon Black Sunumu
 
Data Driven Cybersecurity Governance
Data Driven Cybersecurity GovernanceData Driven Cybersecurity Governance
Data Driven Cybersecurity Governance
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPECSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 

Similaire à CIS13: FCCX and IDESG: An Industry Perspectives

Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutLuong Trung Thanh
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Ensighten
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris Perficient, Inc.
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 

Similaire à CIS13: FCCX and IDESG: An Industry Perspectives (20)

Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned About
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 

Plus de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

CIS13: FCCX and IDESG: An Industry Perspectives

  • 1. 1  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   NSTIC  in  Mo+on   Pilots,  Policy  and  Progress     Jeremy  Grant     Senior  Execu+ve  Advisor,  Iden+ty  Management   Na+onal  Ins+tute  of  Standards  and  Technology  (NIST)          
  • 2. 2  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   NSTIC  Workshop  Agenda   Sessions   1pm   Part  1   •  “The  State  of  the  NSTIC”  –  Jeremy  Grant   •  Pilot  Report  #1:  MFA  in  the  Commercial  Sector  –  Cathy  Tilton,  Daon   2pm   Part  2   •  Pilot  Report  #2:    AKribute  Exchange  Network  –  Dave  Coxe,  Criterion  Systems   •  Pilot  Report  #3:    Scalable  Privacy  and  MFA  –  Ken  Klingenstein,  Internet2   3pm   Part  3   •  Iden%ty  Ecosystem  Steering  Group  (IDESG)  –  Bob  Blakely,  Ci%group   •  Federal  Cloud  Creden%al  Exchange  (FCCX)  –  Jeremy  Grant  (NIST)  and  Doug   Glair  (USPS)   •  NSTIC  and  the  Na%onal  Cybersecurity  Center  of  Excellence  (NCCoE)  –  Nate   Lesser  (NIST)   •  Discussion  and  Perspec%ves  
  • 3. 3  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   State of the NSTIC
  • 4. 4  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Imagine  if…   Four  years  from  now,  80%  of  your  customers  arrived   at  your  website  already  holding  a  secure  creden+al   for  iden+fica+on  and  authen+ca+on  –  and  you  could   trust  this  creden+al  in  lieu  of  your  exis+ng   username/password  system.   Interoperable   with  your   login  system   (you  don’t   have  to  issue   creden%als)   Mul%-­‐factor   authen%ca%on   (no  more   password   management)   Tied  to  a  robust   iden%ty  proofing   mechanism  (you   know  if  they  are   who  they  claim   to  be)   With  baked-­‐in   rules  to  limit   liability  and   protect   privacy  
  • 5. 5  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   What  would  this  mean…   For  Security  and  Loss  Preven+on?   • 5  of  the  top  6  vectors  of  aKack  in  2011  data  breaches  %ed  to   passwords;  76%  of  all  2012  records  breached  %ed  to  passwords.   • The  number  of  Americans  impacted  by  data  breaches  rose  67%   from  2010  to  2011   • Weak  iden%ty  systems  fuel  online  fraud,  make  it  impossible  to   know  who  is  a  “dog  on  the  Internet”   For  Reducing  Fric+on  in  Online  Commerce?   • Today,  75%  of  customers  will  avoid  crea%ng  new  accounts.    54%   leave  the  site  or  do  not  return   • Today,  45%  of  consumers  will  abandon  a  site  rather  than   aKempt  to  reset  their  passwords  or  answer  security  ques%ons  
  • 6. 6  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Two  years,  two  months  and  24  days  ago…   An  Iden+ty  Ecosystem…with  4  Guiding   Principles   •  Privacy-­‐Enhancing  and  Voluntary   •  Secure  and  Resilient   •  Interoperable   •  Cost-­‐Effec%ve  and  Easy  To  Use  
  • 7. 7  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   There  is  a  marketplace  today  –  but  there   are  barriers  the  market  has  not  yet   addressed  on  its  own   Why  NSTIC?  
  • 8. 8  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Barriers:    Security  is  a  big  issue   Source:    2012  Data  Breach  Inves%ga%ons  Report,  Verizon  and  USSS   2011:    5  of  the  top  6  aKack  vectors  are  %ed  to  passwords   2010:    4  of  the  top  10  
  • 9. 9  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Business   Models   But  –  it’s  not  all  about  security     Usability   Liability   Interoperability  Privacy   Source:    xkcd  
  • 10. 10  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   There  is  a  marketplace  today  –  but  there   are  barriers  the  market  has  not  yet   addressed  on  its  own.   Government  can  serve  as  a  convener  and   facilitator,  and  a  catalyst.     Why  NSTIC?  
  • 11. 11  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Our  Implementa+on  Strategy  
  • 12. 12  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   We don’t want to boil the ocean.
  • 13. 13  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Let’s go surfing where the waves are… NSTIC  
  • 14. 14  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Private  sector   will  lead  the   effort   Federal   government   will  provide   support   • Not  a  government-­‐run  iden%ty  program   • Private  sector  is  in  the  best  posi%on  to   drive  technologies  and  solu%ons…   • …and  ensure  the  Iden%ty  Ecosystem   offers  improved  online  trust  and  beKer   customer  experiences   • Support  development  of  a  private-­‐sector   led  governance  model   • Facilitate  and  lead  development  of   interoperable  standards   • Provide  clarity  on  na%onal  policy  and   legal  issues  (i.e.,  liability  and  privacy)     • Fund  pilots  to  s%mulate  the  marketplace   • Act  as  an  early  adopter  to  s%mulate   demand   What  does  NSTIC  call  for?  
  • 15. 15  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Where  do  we  stand?  
  • 16. 16  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   The  marketplace  has  started  to  respond  
  • 17. 17  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   But  instead  of  this…  
  • 18. 18  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   …I  now  am  managing  one-­‐off  2FA  solu+ons  for  
  • 19. 19  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   NSTIC  has  funded  5  pilots…with  more  coming   AAMVA   • Focus:    Develop   public-­‐private   partnership  to   strengthen   private-­‐sector   creden%als  with   aKributes  from   a  state  DMV   • Virginia  DMV,   Microsom,  CA,   AT&T  are  key   partners   • Coming  soon:     an  important   health  care  RP   Daon   • Focus:    deploy   smartphone   based,  mul%-­‐ factor   authen%ca%on   to  consumers   • AARP,  PayPal,   Purdue  are  key   relying  par%es   • A  major  bank   (not  yet  publicly   named)  will  also   be  an  RP   Criterion   • Focus:  develop  a   viable  business   model  for   Iden%ty   Ecosystem  and   aKribute   exchange   • Broadridge   Financial,  eBay,   Wal-­‐Mart,  AOL,   Verizon,  GE,   Experian,  Lexis   Nexis,  Ping,  CA,   PacificEast  are   key  partners   Internet2   • Focus:  deploy   smartphone   based,  mul%-­‐ factor   authen%ca%on   across  3  major   universi%es,   integrate  it  with   a  privacy-­‐ protec%ng   infrastructure.   • MIT,  University   of  Texas,   University  of   Utah  are   deployment   sites   Resilient   • Focus:    test     “privacy   enhancing”   infrastructure  in   health  care  and   K-­‐12   environments.   • AMA,  American   College  of   Cardiology,   LexisNexis,   Neustar,   Knowledgefactor   are  key  partners  
  • 20. 20  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Pilots  lessons  learned   Each  pilot  has  run  into  the  same  challenges  –  underscoring  the   need  for  a  robust  Iden%ty  Ecosystem  Framework.   Common  considera%ons:     o  No  standard  way  to  bring  on  new  RP’s   (technical/policy/legal)   o  Exis%ng  trust  frameworks  only  go  so   far   o  RP’s  struggle  to  sort  out  how  to  apply   risk  assessment  to  determine   creden%al  strength/LOA  (800-­‐63  aside,   no  great  alterna%ves)   o  Trust  frameworks  do  not  extend  to   aKribute  providers/verifiers     o  How  to  ensure  “data  minimiza%on”  in   aKribute  exchange,  when  some  APs   offer  “data  promiscuity”   o  How  to  flow  down  consent   requirements  to  end-­‐users  in  a  logical   fashion    
  • 21. 21  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   The  Iden+ty  Ecosystem  Steering  Group     Source:    Phil  Wolff,  hKp://www.flickr.com/photos/philwolff/7789263898/in/photostream                First  plenary,  August  2012  
  • 22. 22  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   The  Iden+ty  Ecosystem  Steering  Group:       Bringing  together  many  types  of  stakeholders  
  • 23. 23  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   •  200+  firms/organiza%ons;  60+  individuals   •  Elected  Plenary  Chair  (Bob  Blakley/Ci%)  and  Management  Council  Chair   (Peter  Brown);  Elected  16  delegates  to  Management  Council   •  Member  firms  include:    Verizon,  Visa,  PayPal,  Fidelity,  Ci%group,  Mass   Mutual,  IBM,  Bank  of  America,  Microsom,  Oracle,  3M,  CA,  Symantec,  Lexis   Nexis,  Experian,  Equifax,  Neiman  Marcus,  Aetna,  Merck,  United  Health,  Intel.     •  Also:    AARP,  ACLU,  EPIC,  EFF,  and  more  than  65  universi%es.    Par%cipants   from  12+  countries.       •  CommiKees  include:   The  Iden+ty  Ecosystem  Steering  Group   o Standards   o Policy   o Privacy   o User  Experience   o Security   o Trust  Frameworks  &  Trustmarks   o Health  Care   o Financial  Sector   o Interna%onal  Coordina%on    
  • 24. 24  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Linking  Strategy  to  Execu+on   •  Voluntary,  mul%-­‐stakeholder   collabora%ve  efforts  are   hard.     •  What  is  the  art  of  the   possible?   •  What  incen%ves  might  be   needed  to  fully  realize  the   NSTIC  vision?  
  • 25. 25  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   NSTIC  envisions  the  poten+al  need  for  new  policies   “The  Federal  Government  may  need  to  establish  or   amend  both  policies  and  laws  to  address"  concerns  such   as  "the  uncertainty  and  fear  of  unbounded  liability  that   have  limited  the  market's  growth.”                    -­‐NSTIC,  page  31   •  The  IDESG  Policy  CommiKee  is  reviewing  this  topic   •  A  unique  window  of  opportunity  
  • 26. 26  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Ensuring  the  U.S.  Government   can  be  an  early  Adopter  
  • 27. 27  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Making  progress  in  government  is  tough…  
  • 28. 28  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   …but  not  impossible  
  • 29. 29  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Where  we  started   FICAM   (TFPAP)   TFP   MoUs   Cer+fica+on  Agreements   IdP   IdP   IdP   TFP   Integra%on   ???   $$$!!!   RP   RP   RP  RP   Agencies  
  • 30. Current  Agency  Environment   Ci%zens  Government  
  • 31. A  befer  way   Ci%zens  Government   FCCX  
  • 32. 32  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   New  study  shows  real  USG  cost  savings  from   NSTIC   •  Funded  by  NIST  Economic   Analysis  Office  ,  conducted   in  partnership  with  the  IRS   •  Focus:    cost-­‐benefit  analysis   comparing  federa%on   (NSTIC)  approach  vs.  one-­‐off   proprietary  authen%ca%on   system   •  Looked  at  3  scenarios:    20%,   50%,  70%  adop%on  
  • 33. 33  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   New  study  shows  real  USG  cost  savings  from   NSTIC   Key  Findings   •  Over  a  10-­‐year  period,  IRS  would  save  $63  million  to  $298   million  by  aligning  its  ci%zen-­‐facing  iden%ty  and   authen%ca%on  efforts  with  NSTIC  (vs.  building  a  stovepiped,   IRS-­‐only  system)   •  Up-­‐front  adop%on  savings  would  be  $40  million  to  $111   million       •  Savings  driven  both  by  avoidance  of  duplica%ve  iden%ty   proofing  and  authen%ca%on  costs,  as  well  as  increased   customer  uptake  of  online  offerings       •  Opportunity:    IRS  spent  over  $1  billion  communica%ng  with   taxpayers  on  paper  and  by  telephone  in  2012    
  • 34. 34  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   A  final  thought  
  • 35. 35  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   $2         Trillion   The  total   projected   online  retail   sales  across   the  G20   na%ons  in   2016   $2.5   trillion     What  this   number  can   grow  to  if   consumers   believe  the   Internet  is   more  worthy   of  their  trust       $1.5   Trillion   What  this   number  will   fall  to  if  Trust   is  eroded   Trust  mafers  to  online  business   Source:    Rethinking  Personal  Data:  Strengthening  Trust.    World  Economic  Forum,  May  2012.      
  • 36. 36  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Ques+ons?   Jeremy  Grant   jgrant@nist.gov   202.482.3050       Iden+ty  Ecosystem  Steering  Group   www.idecosytem.org   idecosystem@trustedfederal.com        
  • 37. 37  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   NSTIC  Workshop  Agenda   Sessions   1pm   Part  1   •  “The  State  of  the  NSTIC”  –  Jeremy  Grant   •  Pilot  Report  #1:  MFA  in  the  Commercial  Sector  –  Cathy  Tilton,  Daon   2pm   Part  2   •  Pilot  Report  #2:    AKribute  Exchange  Network  –  Dave  Coxe,  Criterion  Systems   •  Pilot  Report  #3:    Scalable  Privacy  and  MFA  –  Ken  Klingenstein,  Internet2   3pm   Part  3   •  Iden%ty  Ecosystem  Steering  Group  (IDESG)  –  Bob  Blakely,  Ci%group   •  Federal  Cloud  Creden%al  Exchange  (FCCX)  –  Jeremy  Grant  (NIST)  and  Doug   Glair  (USPS)   •  NSTIC  and  the  Na%onal  Cybersecurity  Center  of  Excellence  (NCCoE)  –  Nate   Lesser  (NIST)   •  Discussion  and  Perspec%ves  
  • 38. 38  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace  
  • 39. 39  Na%onal  Strategy  for  Trusted  Iden%%es  in  Cyberspace   Created  to  administer  the  development  of   policies,  standards,  and  accreditaHon   processes  for  the  Iden&ty  Ecosystem   Framework.         www.idecosystem.org     The  Iden+ty  Ecosystem  Steering  Group