SlideShare una empresa de Scribd logo
1 de 58
An NSTIC/IDESG Update
a.k.a.
Is the One World Government
coming for my Identity?
Ian Glazer
Delegate-at-Large, Management Council – IDESG
Board of Directors Member – IDESG Inc.
Senior Director, Identity – salesforce.com
@iglazer
Guide to the deck
What NSTIC isn’t
10Na onal Strategy for Trusted Iden es in Cyberspace
Trusted Iden es provide a founda on
Economic
benefits
Improved privacy
standards
Enhanced security
TRUSTED IDENTITIES
• Fight cybercrime and iden ty the
• Increased consumer confidence
• Offer consumers more control over when
and how data is revealed
• Share minimal amount of informa on
• Enable new types of transac ons online
• Reduce costs for sensi ve transac ons
• Improve customer experiences
Usernames and passwords are broken
• Most people have 25 different passwords, or use the same one over
and over
• Even strong passwords are vulnerable…criminals have many paths to
easily capture “keys to the kingdom”
• Rising costs of identity theft
÷ 11.6M U.S. victims (+13% YoY) in 2011 at a cost of $37 billion
÷ 67% increase in # of Americans impacted by data breaches in 2011
(Source: Javelin Strategy & Research)
• A common vector of attack
÷ Sony Playstation, Zappos, Lulzsec, LinkedIn, among dozens
of 2011-12 breaches tied to passwords.
Ian’s slides
NSTIC Program
Office slides
IDESG slides
What NSTIC isn’t
NSTIC is not a driver’s
license for the
Internet!
What is NSTIC?
8National Strategy for Trusted Identities in Cyberspace
Called for in President’s Cyberspace Policy Review (May 2009):
a “cybersecurity focused identity management vision and strategy…that
addresses privacy and civil-liberties interests, leveraging privacy-enhancing
technologies for the nation.”
Guiding Principles
• Privacy-Enhancing and Voluntary
• Secure and Resilient
• Interoperable
• Cost-Effective and Easy To Use
NSTIC calls for an Identity Ecosystem,
“an online environment where individuals
and organizations will be able to trust each other
because they follow agreed upon standards to obtain
and authenticate their digital identities.”
What is NSTIC?
Principles Produce Progress
1. Privacy-Enhancing and Voluntary
2. Secure and Resilient
3. Interoperable
4. Cost-Effective and Easy To Use
10National Strategy for Trusted Identities in Cyberspace
Trusted Identities provide a foundation
Economic
benefits
Improved privacy
standards
Enhanced security
TRUSTED IDENTITIES
• Fight cybercrime and identity theft
• Increased consumer confidence
• Offer consumers more control over when
and how data is revealed
• Share minimal amount of information
• Enable new types of transactions online
• Reduce costs for sensitive transactions
• Improve customer experiences
11National Strategy for Trusted Identities in Cyberspace
Private sector
will lead the
effort
Federal
government
will provide
support
• Not a government-run identity program
• Private sector is in the best position to
drive technologies and solutions…
• …and ensure the Identity Ecosystem
offers improved online trust and better
customer experiences
• Help develop a private-sector led
governance model
• Facilitate and lead development of
interoperable standards
• Provide clarity on national policy and
legal issues (i.e., liability and privacy)
• Fund pilots to stimulate the marketplace
• Act as an early adopter to stimulate
demand
What does NSTIC call for?
Why have a strategy
in the first place?
Internet as Economic Engine
• The bright spot in the
US economy
• Reduce transaction
costs and inefficiencies
• Expand every business’
reach
• Moving more
interactions online is
the inevitable future
Usernames and passwords are broken
• Most people have 25 different passwords, or use the same one over
and over
• Even strong passwords are vulnerable…criminals have many paths to
easily capture “keys to the kingdom”
• Rising costs of identity theft
 11.6M U.S. victims (+13% YoY) in 2011 at a cost of $37 billion
 67% increase in # of Americans impacted by data breaches in 2011
(Source: Javelin Strategy & Research)
• A common vector of attack
 Sony Playstation, Zappos, Lulzsec, LinkedIn, among dozens
of 2011-12 breaches tied to passwords.
Identities are difficult to verify
over the internet
• Numerous government services still must be
conducted in person or by mail, leading to continual
rising costs for state, local and federal governments
• Electronic health records could save billions, but
can’t move forward without solving authentication
challenge for providers and individuals
• Many transactions, such as signing an auto loan or a
mortgage, are still considered too risky to conduct
online due to liability risks
The Status Quo is Meh
• No formal market for identity
• Poor choices of identity providers
– Who can and do monetize personal data
• Meager controls for the individual
• Inequitable use of personal data
• Privacy is increasingly only for the well-to-do
• If moving transactions online is inevitable, do we
want the status quo to be the only way we get
online services?
17National Strategy for Trusted Identities in Cyberspace
Privacy remains a challenge
• Individuals often must provide more personally identifiable information (PII)
than necessary for a particular transaction
– This data is often stored, creating “honey pots” of information for cybercriminals to pursue
• Individuals have few practical means to control use of their information
The Problem Today
18National Strategy for Trusted Identities in Cyberspace
Privacy: Increasingly Complex as Volumes
of Personal Data Grow
Source: World Economic Forum, “Rethinking Personal Data: Strengthening Trust,” May 2012
19National Strategy for Trusted Identities in Cyberspace
$2
Trillion
The total
projected
online retail
sales across
the G20
nations in
2016
$2.5
trillion
What this
number can
grow to if
consumers
believe the
Internet is
more worthy
of their trust
$1.5
Trillion
What this
number will
fall to if Trust
is eroded
Trust matters to online business
Source: Rethinking Personal Data: Strengthening Trust. World Economic Forum, May 2012.
What is NSTIC
working on?
21National Strategy for Trusted Identities in Cyberspace
Key Implementation Steps
•August 2012: Launched privately-led Identity Ecosystem Steering Group (IDESG).
Funded by NIST grant, IDESG tasked with crafting standards and policies for the Identity
Ecosystem Framework http://www.idecosystem.org/
•October 2013: IDESG incorporates as 501(c)3, prepares to raise private funds
Convene the Private Sector
•Three rounds of pilot grants in 2012 and 2013; 10 pilots now active
•Solicitations took a challenge-based approach focused on addressing barriers the
marketplace has not yet overcome
Fund Innovative Pilots to Advance the Ecosystem
•Ensure government-wide alignment with the Federal Identity, Credential, and Access
Management (FICAM) Roadmap
•White House effort to create a Federal Cloud Credential Exchange (FCCX)
•August 2013: USPS awards FCCX contract
•March 2014: FCCX rolls into pre-beta
Government as an early adopter to stimulate demand
22National Strategy for Trusted Identities in Cyberspace
5 NSTIC Pilots Awarded September 2012
AAMVA
Virginia/$1.6M
•Focus: Develop
public-private
partnership to
strengthen
private-sector
credentials with
attributes from
a state DMV
•Virginia DMV,
Inova,
Microsoft, CA,
AT&T are key
partners
Daon
Virginia/$1.8M
•Focus: deploy
smartphone
based, multi-
factor
authentication
to consumers
•AARP, Purdue,
eBay/Paypal are
key relying
parties
•A major bank
(not yet publicly
named) will also
be an RP
Criterion
Virginia/$1.97M
•Focus: develop a
viable business
model for
Identity
Ecosystem and
attribute
exchange
•Broadridge
Financial, eBay,
Google, Wal-
Mart, AOL,
Verizon, GE,
Experian, Lexis
Nexis, CA, are
key partners
Internet2
Michigan/$1.8M
•Focus: deploy
smartphone
based, multi-
factor
authentication
across 3 major
universities,
integrate it with
a privacy
manager.
•MIT, University
of Texas,
University of
Utah are
deployment
sites
Resilient
California/$2M
•Focus: test
“privacy
enhancing”
infrastructure in
health care and
K-12
environments.
•AMA, American
College of
Cardiology,
LexisNexis,
Neustar,
Knowledgefactor
are key partners
23National Strategy for Trusted Identities in Cyberspace
New NSTIC Pilots Awarded September 2013
Troop ID
(Virginia/$1.2M)
•Focus: Develop and
deploy smartphone-
based, MFA solution
for veterans and
military community
•UnderArmour, USAA,
AT&T, VA, Virginia
DMV are among
participants
PRIVO
(Virginia/$1.6M)
•Focus: deploy an
NSTIC-aligned
identity solution for
children and families
•Designed to address
COPPA and unique
issues it creates for
online service firms
•Partners include one
of the largest online
content providers and
several large toy
companies
GTRI
(Georgia/$1.7M)
•Focus: Develop a
“Trustmark
Framework” that
makes is easier for
individuals and
organizations to
understand complex
technical, privacy and
security requirements
and policies
•NASCIO, NIEF are
partners
TSCP
(Virginia/$1.2M)
•Focus: enable people
to use employer-
issued MFA credential
to access their
retirement accounts
at a brokerage.
•Develop open-source
Trust Framework
Development
Guidance document
to support future
cross-sector
interoperability
•Fidelity, Chicago
Mercantile Exchange
are partners.
Federal Cloud Credential Exchange:
Current Agency Environment
CitizensGovernment
FCCX: A better way
CitizensGovernment
FCCX
What is the
IDESG?
Mission
The Mission of the Identity Ecosystem Steering Group (IDESG)
shall be to govern and administer the Identity Ecosystem
Framework in a manner that stimulates the development and
sustainability of the Identity Ecosystem. The IDESG will always
operate in accordance with the NSTIC’s Guiding Principles.
GUIDING PRINCIPLES
1. Privacy-enhancing and voluntary.
2. Secure and resilient.
3. Interoperable.
4. Cost-effective and easy to use.
• IDESG is working to create a world where people trust the security and privacy of
online identification and confidently exchange personal information via the
Internet.
– As an organization, IDESG seeks to address the critical issue of identity given our growing
dependence and reliance on technology for our everyday lives.
– IDESG is committed to building an identity framework that is privacy-enhancing and voluntary;
secure and resilient; interoperable; and cost-effective and easy-to-use for businesses,
government and individuals.
– IDESG is turning the identity challenge into an opportunity to provide a holistic solution that
balances the competing security and privacy needs of businesses, government and individuals.
• IDESG is a government-inspired, commercially-led, member-driven organization
that is serving the public good.
– IDESG will establish common solutions that drive trusted transactions to promote confidence,
protect the consumers’ and organizations’ privacy and propel economic growth and
innovation.
– IDESG will define the norms for verified identities used in the marketplace that increase
confidence in transactions and promote privacy for business, government and individuals.
– IDESG is at the nexus of the technologically possible, politically desirable and publically
accepted in terms of online identity
• IDESG is at the heart of the identity solution, driving innovation and serving as a
catalyst for industry and the economy.
– IDESG’s framework will allow seamless exchange of information, supporting a growing multi-
billion dollar industry of the future.
– IDESG blends public sector objectives with the reality of industry, leading to innovative
solutions for the challenges of tomorrow today.
– IDESG promotes peace of mind in online transactions, accelerating growth and new
opportunities for online engagement.
Where it all Began - Chicago, August 2012
The Identity
Ecosystem Steering
Group was
established during a
Kickoff Meeting held
in Chicago from
August 15-16, 2012.
Apply for
mortgage
online with
e-signature
Trustworthy
critical service
delivery
Security ‘built-into’
system to
reduce user error
Privately post location
to her friends
Secure Sign-On to state
website
Online
shopping
with minimal
sharing of PII
January 1, 2016
The Identity Ecosystem: Individuals can choose among multiple identity providers and digital
credentials for convenient, secure, and privacy-enhancing transactions anywhere, anytime.
Objectives
The activities and work products of the IDESG shall be conducted in support of
the following objectives:
 Ensuring that the Identity Ecosystem and Identity Ecosystem Framework
conform to the four NSTIC Guiding Principles.
 Administering the process for policy and standards development and adoption
for the Identity Ecosystem Framework and, where necessary establishing
policies standards for the Identity Ecosystem Framework.
 Adopting and, where necessary, establishing standards for the Identity
Ecosystem Framework.
 Certifying that accreditation authorities validate adherence to the
requirements of the Identity Ecosystem Framework.
Text taken from the Identity Ecosystem Steering Group (IDESG) 2013 Rules of Association.
Read more about the IDESG in its policy documents.
Organizational Structure
IDESG Committees
Committee Objective(s)
Financial
Services
Working to enable full participation of financial services stakeholders
Healthcare Addressing the identity technology, policy and relationship (liability)
requirements of the health care community
International
Coordination
Coordinating engagement with relevant international identity standards
bodies, initiatives, and policy bodies
Trust Framework
& Trustmark
A forum for trust framework representatives and other interested parties
to develop and manage a trustmark program
Policy
Coordination
Inspiring awareness and reuse of successful policies, including operating
rules, business process methods and risk allocation methods
Privacy
Coordination
Identifying privacy issues and recommendations to remedy them.
Security Responsible for recommending a Security Model
Standards
Coordination
Identifying standards and frameworks that can support the stated key
attributes of the Identity Ecosystem
User Experience Evaluating technologies and identity solutions within the IE to confirm
that they are easy-to-use and accessible for all potential users.
What is the IDESG
working on?
2014 IDESG Goal
 Complete version 1 of the IEF by December 31, 2014
 Will allow a baseline to which self-attestations can occur
 Sets the stage for development of a comprehensive
compliance and conformance program by December 31,
2015
35
Purpose
 The IEF Development Plan (currently a draft) is
intended to:
 Identify key IEF components
 Define 2014 component objectives
 Establish targets for component completion
 Facilitate project planning
 Support prioritization and resourcing
 Serve as guidance to committees and chairs
36
Framework Development Plan Components
37
Functional Model
Define Guiding Principle
Requirements
Define Initial Risk Model(s)
IEF Compliance/Conformance
Program
Implementation Tools
Use Cases
• Frame the IDESG’s initial objectives and scope of work
• Provide a basis for the development of IDESG work products
• Drive consensus among IDESG plenary members about the
characteristics of the ecosystem and identity ecosystem framework
they are trying to bring into existence
• Provide a method for the elicitation and capture the requirements
of the various NSTIC constituencies
• Make more concrete the application of the NSTIC guiding principles
in terms of real- world scenarios
• Serve as a test target against which IDESG work products can be
evaluated
• Serve as a guide for the collective efforts of the IDESG, to maintain
a common focus and alignment
http://www.idecosystem.org/index.php?q=filedepot_download/944/1272
https://www.idecosystem.org/wiki/Use_Cases
• Create a modular, flexible, and adaptive set of functional elements that can be
effectively applied to the broadest possible collection of use cases, frameworks,
and identity models.
• Establish functional elements in such a way that requirements can be written to
them and assessed against them.
• Thus, the Functional Elements should:
o Provide a basis set of functional elements that can be combined to support NSTIC
pilot and IDESG Use Cases
o Be implementable by various Actors within the identity ecosystem to fulfil required
Roles
o Help to delineate the responsibilities of various Actors in the identity ecosystem so
that accountability for privacy/security/legal requirements is clear.
o Define the functional elements that can be assessed by certification providers to
provide interoperable functional components.
Functional Elements Goals
6/5/2014
Functional Elements Diagram
6/5/2014
Why and how to
get involved
Why be involved
• Help shape an alternative to / augmentation
of the status quo
• Aid in the creation of a true market for
identity
• Grow your business
• Work with industry peers
www.idecosystem.org
Rules of Association,
Membership Agreements,
Policies, etc.
Can all be found under
About - Governance
Joining the IDESG
 www.idecosystem.org
 Click Membership - Join
How to Get Involved
Connect with Members.
Join one of the email discussion lists -
Post on a forum - Contribute to the Wiki
and other projects.
Learn and Develop.
Read the Member E-Newsletter –
Read about upcoming events on the
Website - Attend online and in person.
Run for a Leadership Position.
Advocate.
Tell your associates - Include IEDSG in
your industry presentations, etc.
Present Your Ideas.
Submit an idea for group discussion.
Share your own experience with your
colleagues!
Participate. Be a part of the solution!
More Info
• NSTIC Program Office
– http://www.nist.gov/nstic/npo.html
• NSTIC Blog
– http://nstic.blogs.govdelivery.com/
• IDESG
– https://www.idecosystem.org/
Thanks!
Meet the IDESG
Leadership
IDESG Leadership
Management Council Chair
Peter Brown
Management Council Vice Chair
Jeremy Grant
NSTIC NPO Director
Management Council Delegates
1. Privacy & Civil Liberties
Adrian Gropper
2. Usability & Human Factors
Steve Bruck
BruckEdwards, Inc.
Management Council Delegates
3. Consumer Advocates
Jim Barnett
AARP
4. U.S. Federal Government
Deborah Gallagher
GSA
Management Council Delegates
5. U.S. State, Local, Tribal,
and Territorial Government
Dave Burhop
Commonwealth of Virginia
Department of Motor Vehicles
6. Research, Development,
Education & Innovation
Jack Suess
InCommon
Management Council Delegates
7. Identity & Attribute
Providers
Matt Thompson
ID.me
8. Interoperability
Peter Alterman
SAFE-BioPharma Association
Management Council Delegates
9. Information Technology
(IT) Infrastructure
Paul Laurent
Oracle Corporation
10. Regulated Industries
Mark Coderre
Aetna
Management Council Delegates
11. Small Business &
Entrepreneurs
Kaliya Hamlin
12. Security
Neville Pattinson
Gemalto
Management Council Delegates
13. Relying Parties
Pete Pouridis
The Neiman Marcus Group
14. Unaffiliated
Individuals:
James Zok
Management Council Delegates
Delegate at Large
Ian Glazer
Delegate at Large
Adam Madlin
Symantec
IDESG Leadership
Plenary Chair
Kim Little
Lexis Nexis Risk Solutions
Plenary Vice Chair
Andrew Hughes

Más contenido relacionado

La actualidad más candente

BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneTim Rich
 
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018insightscare
 
Future agenda the future of digital business - dubai - 29 april 2018
Future agenda   the future of digital business - dubai - 29 april 2018Future agenda   the future of digital business - dubai - 29 april 2018
Future agenda the future of digital business - dubai - 29 april 2018Future Agenda
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018UNLOQ
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary finalAndrew_Goss
 
Leveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information SuccessLeveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information SuccessNick Inglis
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and GovernanceKate Carruthers
 
Big Data: The Main Pillar of Technology Disruption
Big Data: The Main Pillar of Technology DisruptionBig Data: The Main Pillar of Technology Disruption
Big Data: The Main Pillar of Technology DisruptionRishabh Sinha
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?John D. Johnson
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?MicheleNati
 
The 10 most trusted healthcare it security solution providers 2018
The 10 most trusted healthcare it security solution providers 2018The 10 most trusted healthcare it security solution providers 2018
The 10 most trusted healthcare it security solution providers 2018insightscare
 
Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsNEXTConference
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Daniel Austin
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analyticsAtilla Elçi
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 

La actualidad más candente (20)

BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
 
Future agenda the future of digital business - dubai - 29 april 2018
Future agenda   the future of digital business - dubai - 29 april 2018Future agenda   the future of digital business - dubai - 29 april 2018
Future agenda the future of digital business - dubai - 29 april 2018
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
Developing A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care OganizationsDeveloping A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care Oganizations
 
Leveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information SuccessLeveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information Success
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and Governance
 
Big Data: The Main Pillar of Technology Disruption
Big Data: The Main Pillar of Technology DisruptionBig Data: The Main Pillar of Technology Disruption
Big Data: The Main Pillar of Technology Disruption
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
 
The 10 most trusted healthcare it security solution providers 2018
The 10 most trusted healthcare it security solution providers 2018The 10 most trusted healthcare it security solution providers 2018
The 10 most trusted healthcare it security solution providers 2018
 
Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethics
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
Big data security
Big data securityBig data security
Big data security
 

Similar a NSTIC and IDESG Update

Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked EconomySonia Kaul Takoo
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCloudIDSummit
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)JISC.AM
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsNita Rollins, Ph.D.
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
D2 d turning information into a competive asset - 23 jan 2014
D2 d   turning information into a competive asset - 23 jan 2014D2 d   turning information into a competive asset - 23 jan 2014
D2 d turning information into a competive asset - 23 jan 2014Henk van Roekel
 

Similar a NSTIC and IDESG Update (20)

Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry Perspectives
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita Rollins
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
D2 d turning information into a competive asset - 23 jan 2014
D2 d   turning information into a competive asset - 23 jan 2014D2 d   turning information into a competive asset - 23 jan 2014
D2 d turning information into a competive asset - 23 jan 2014
 
Longhash - the end game of blockchain
Longhash - the end game of blockchainLonghash - the end game of blockchain
Longhash - the end game of blockchain
 
Longhash the end game of blockchain
Longhash the end game of blockchainLonghash the end game of blockchain
Longhash the end game of blockchain
 

Último

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 

Último (20)

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 

NSTIC and IDESG Update

  • 1. An NSTIC/IDESG Update a.k.a. Is the One World Government coming for my Identity? Ian Glazer Delegate-at-Large, Management Council – IDESG Board of Directors Member – IDESG Inc. Senior Director, Identity – salesforce.com @iglazer
  • 2. Guide to the deck What NSTIC isn’t 10Na onal Strategy for Trusted Iden es in Cyberspace Trusted Iden es provide a founda on Economic benefits Improved privacy standards Enhanced security TRUSTED IDENTITIES • Fight cybercrime and iden ty the • Increased consumer confidence • Offer consumers more control over when and how data is revealed • Share minimal amount of informa on • Enable new types of transac ons online • Reduce costs for sensi ve transac ons • Improve customer experiences Usernames and passwords are broken • Most people have 25 different passwords, or use the same one over and over • Even strong passwords are vulnerable…criminals have many paths to easily capture “keys to the kingdom” • Rising costs of identity theft ÷ 11.6M U.S. victims (+13% YoY) in 2011 at a cost of $37 billion ÷ 67% increase in # of Americans impacted by data breaches in 2011 (Source: Javelin Strategy & Research) • A common vector of attack ÷ Sony Playstation, Zappos, Lulzsec, LinkedIn, among dozens of 2011-12 breaches tied to passwords. Ian’s slides NSTIC Program Office slides IDESG slides
  • 3.
  • 5. NSTIC is not a driver’s license for the Internet!
  • 6.
  • 8. 8National Strategy for Trusted Identities in Cyberspace Called for in President’s Cyberspace Policy Review (May 2009): a “cybersecurity focused identity management vision and strategy…that addresses privacy and civil-liberties interests, leveraging privacy-enhancing technologies for the nation.” Guiding Principles • Privacy-Enhancing and Voluntary • Secure and Resilient • Interoperable • Cost-Effective and Easy To Use NSTIC calls for an Identity Ecosystem, “an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.” What is NSTIC?
  • 9. Principles Produce Progress 1. Privacy-Enhancing and Voluntary 2. Secure and Resilient 3. Interoperable 4. Cost-Effective and Easy To Use
  • 10. 10National Strategy for Trusted Identities in Cyberspace Trusted Identities provide a foundation Economic benefits Improved privacy standards Enhanced security TRUSTED IDENTITIES • Fight cybercrime and identity theft • Increased consumer confidence • Offer consumers more control over when and how data is revealed • Share minimal amount of information • Enable new types of transactions online • Reduce costs for sensitive transactions • Improve customer experiences
  • 11. 11National Strategy for Trusted Identities in Cyberspace Private sector will lead the effort Federal government will provide support • Not a government-run identity program • Private sector is in the best position to drive technologies and solutions… • …and ensure the Identity Ecosystem offers improved online trust and better customer experiences • Help develop a private-sector led governance model • Facilitate and lead development of interoperable standards • Provide clarity on national policy and legal issues (i.e., liability and privacy) • Fund pilots to stimulate the marketplace • Act as an early adopter to stimulate demand What does NSTIC call for?
  • 12. Why have a strategy in the first place?
  • 13. Internet as Economic Engine • The bright spot in the US economy • Reduce transaction costs and inefficiencies • Expand every business’ reach • Moving more interactions online is the inevitable future
  • 14. Usernames and passwords are broken • Most people have 25 different passwords, or use the same one over and over • Even strong passwords are vulnerable…criminals have many paths to easily capture “keys to the kingdom” • Rising costs of identity theft  11.6M U.S. victims (+13% YoY) in 2011 at a cost of $37 billion  67% increase in # of Americans impacted by data breaches in 2011 (Source: Javelin Strategy & Research) • A common vector of attack  Sony Playstation, Zappos, Lulzsec, LinkedIn, among dozens of 2011-12 breaches tied to passwords.
  • 15. Identities are difficult to verify over the internet • Numerous government services still must be conducted in person or by mail, leading to continual rising costs for state, local and federal governments • Electronic health records could save billions, but can’t move forward without solving authentication challenge for providers and individuals • Many transactions, such as signing an auto loan or a mortgage, are still considered too risky to conduct online due to liability risks
  • 16. The Status Quo is Meh • No formal market for identity • Poor choices of identity providers – Who can and do monetize personal data • Meager controls for the individual • Inequitable use of personal data • Privacy is increasingly only for the well-to-do • If moving transactions online is inevitable, do we want the status quo to be the only way we get online services?
  • 17. 17National Strategy for Trusted Identities in Cyberspace Privacy remains a challenge • Individuals often must provide more personally identifiable information (PII) than necessary for a particular transaction – This data is often stored, creating “honey pots” of information for cybercriminals to pursue • Individuals have few practical means to control use of their information The Problem Today
  • 18. 18National Strategy for Trusted Identities in Cyberspace Privacy: Increasingly Complex as Volumes of Personal Data Grow Source: World Economic Forum, “Rethinking Personal Data: Strengthening Trust,” May 2012
  • 19. 19National Strategy for Trusted Identities in Cyberspace $2 Trillion The total projected online retail sales across the G20 nations in 2016 $2.5 trillion What this number can grow to if consumers believe the Internet is more worthy of their trust $1.5 Trillion What this number will fall to if Trust is eroded Trust matters to online business Source: Rethinking Personal Data: Strengthening Trust. World Economic Forum, May 2012.
  • 21. 21National Strategy for Trusted Identities in Cyberspace Key Implementation Steps •August 2012: Launched privately-led Identity Ecosystem Steering Group (IDESG). Funded by NIST grant, IDESG tasked with crafting standards and policies for the Identity Ecosystem Framework http://www.idecosystem.org/ •October 2013: IDESG incorporates as 501(c)3, prepares to raise private funds Convene the Private Sector •Three rounds of pilot grants in 2012 and 2013; 10 pilots now active •Solicitations took a challenge-based approach focused on addressing barriers the marketplace has not yet overcome Fund Innovative Pilots to Advance the Ecosystem •Ensure government-wide alignment with the Federal Identity, Credential, and Access Management (FICAM) Roadmap •White House effort to create a Federal Cloud Credential Exchange (FCCX) •August 2013: USPS awards FCCX contract •March 2014: FCCX rolls into pre-beta Government as an early adopter to stimulate demand
  • 22. 22National Strategy for Trusted Identities in Cyberspace 5 NSTIC Pilots Awarded September 2012 AAMVA Virginia/$1.6M •Focus: Develop public-private partnership to strengthen private-sector credentials with attributes from a state DMV •Virginia DMV, Inova, Microsoft, CA, AT&T are key partners Daon Virginia/$1.8M •Focus: deploy smartphone based, multi- factor authentication to consumers •AARP, Purdue, eBay/Paypal are key relying parties •A major bank (not yet publicly named) will also be an RP Criterion Virginia/$1.97M •Focus: develop a viable business model for Identity Ecosystem and attribute exchange •Broadridge Financial, eBay, Google, Wal- Mart, AOL, Verizon, GE, Experian, Lexis Nexis, CA, are key partners Internet2 Michigan/$1.8M •Focus: deploy smartphone based, multi- factor authentication across 3 major universities, integrate it with a privacy manager. •MIT, University of Texas, University of Utah are deployment sites Resilient California/$2M •Focus: test “privacy enhancing” infrastructure in health care and K-12 environments. •AMA, American College of Cardiology, LexisNexis, Neustar, Knowledgefactor are key partners
  • 23. 23National Strategy for Trusted Identities in Cyberspace New NSTIC Pilots Awarded September 2013 Troop ID (Virginia/$1.2M) •Focus: Develop and deploy smartphone- based, MFA solution for veterans and military community •UnderArmour, USAA, AT&T, VA, Virginia DMV are among participants PRIVO (Virginia/$1.6M) •Focus: deploy an NSTIC-aligned identity solution for children and families •Designed to address COPPA and unique issues it creates for online service firms •Partners include one of the largest online content providers and several large toy companies GTRI (Georgia/$1.7M) •Focus: Develop a “Trustmark Framework” that makes is easier for individuals and organizations to understand complex technical, privacy and security requirements and policies •NASCIO, NIEF are partners TSCP (Virginia/$1.2M) •Focus: enable people to use employer- issued MFA credential to access their retirement accounts at a brokerage. •Develop open-source Trust Framework Development Guidance document to support future cross-sector interoperability •Fidelity, Chicago Mercantile Exchange are partners.
  • 24. Federal Cloud Credential Exchange: Current Agency Environment CitizensGovernment
  • 25. FCCX: A better way CitizensGovernment FCCX
  • 27. Mission The Mission of the Identity Ecosystem Steering Group (IDESG) shall be to govern and administer the Identity Ecosystem Framework in a manner that stimulates the development and sustainability of the Identity Ecosystem. The IDESG will always operate in accordance with the NSTIC’s Guiding Principles. GUIDING PRINCIPLES 1. Privacy-enhancing and voluntary. 2. Secure and resilient. 3. Interoperable. 4. Cost-effective and easy to use.
  • 28. • IDESG is working to create a world where people trust the security and privacy of online identification and confidently exchange personal information via the Internet. – As an organization, IDESG seeks to address the critical issue of identity given our growing dependence and reliance on technology for our everyday lives. – IDESG is committed to building an identity framework that is privacy-enhancing and voluntary; secure and resilient; interoperable; and cost-effective and easy-to-use for businesses, government and individuals. – IDESG is turning the identity challenge into an opportunity to provide a holistic solution that balances the competing security and privacy needs of businesses, government and individuals. • IDESG is a government-inspired, commercially-led, member-driven organization that is serving the public good. – IDESG will establish common solutions that drive trusted transactions to promote confidence, protect the consumers’ and organizations’ privacy and propel economic growth and innovation. – IDESG will define the norms for verified identities used in the marketplace that increase confidence in transactions and promote privacy for business, government and individuals. – IDESG is at the nexus of the technologically possible, politically desirable and publically accepted in terms of online identity • IDESG is at the heart of the identity solution, driving innovation and serving as a catalyst for industry and the economy. – IDESG’s framework will allow seamless exchange of information, supporting a growing multi- billion dollar industry of the future. – IDESG blends public sector objectives with the reality of industry, leading to innovative solutions for the challenges of tomorrow today. – IDESG promotes peace of mind in online transactions, accelerating growth and new opportunities for online engagement.
  • 29. Where it all Began - Chicago, August 2012 The Identity Ecosystem Steering Group was established during a Kickoff Meeting held in Chicago from August 15-16, 2012.
  • 30. Apply for mortgage online with e-signature Trustworthy critical service delivery Security ‘built-into’ system to reduce user error Privately post location to her friends Secure Sign-On to state website Online shopping with minimal sharing of PII January 1, 2016 The Identity Ecosystem: Individuals can choose among multiple identity providers and digital credentials for convenient, secure, and privacy-enhancing transactions anywhere, anytime.
  • 31. Objectives The activities and work products of the IDESG shall be conducted in support of the following objectives:  Ensuring that the Identity Ecosystem and Identity Ecosystem Framework conform to the four NSTIC Guiding Principles.  Administering the process for policy and standards development and adoption for the Identity Ecosystem Framework and, where necessary establishing policies standards for the Identity Ecosystem Framework.  Adopting and, where necessary, establishing standards for the Identity Ecosystem Framework.  Certifying that accreditation authorities validate adherence to the requirements of the Identity Ecosystem Framework. Text taken from the Identity Ecosystem Steering Group (IDESG) 2013 Rules of Association. Read more about the IDESG in its policy documents.
  • 33. IDESG Committees Committee Objective(s) Financial Services Working to enable full participation of financial services stakeholders Healthcare Addressing the identity technology, policy and relationship (liability) requirements of the health care community International Coordination Coordinating engagement with relevant international identity standards bodies, initiatives, and policy bodies Trust Framework & Trustmark A forum for trust framework representatives and other interested parties to develop and manage a trustmark program Policy Coordination Inspiring awareness and reuse of successful policies, including operating rules, business process methods and risk allocation methods Privacy Coordination Identifying privacy issues and recommendations to remedy them. Security Responsible for recommending a Security Model Standards Coordination Identifying standards and frameworks that can support the stated key attributes of the Identity Ecosystem User Experience Evaluating technologies and identity solutions within the IE to confirm that they are easy-to-use and accessible for all potential users.
  • 34. What is the IDESG working on?
  • 35. 2014 IDESG Goal  Complete version 1 of the IEF by December 31, 2014  Will allow a baseline to which self-attestations can occur  Sets the stage for development of a comprehensive compliance and conformance program by December 31, 2015 35
  • 36. Purpose  The IEF Development Plan (currently a draft) is intended to:  Identify key IEF components  Define 2014 component objectives  Establish targets for component completion  Facilitate project planning  Support prioritization and resourcing  Serve as guidance to committees and chairs 36
  • 37. Framework Development Plan Components 37 Functional Model Define Guiding Principle Requirements Define Initial Risk Model(s) IEF Compliance/Conformance Program Implementation Tools
  • 38. Use Cases • Frame the IDESG’s initial objectives and scope of work • Provide a basis for the development of IDESG work products • Drive consensus among IDESG plenary members about the characteristics of the ecosystem and identity ecosystem framework they are trying to bring into existence • Provide a method for the elicitation and capture the requirements of the various NSTIC constituencies • Make more concrete the application of the NSTIC guiding principles in terms of real- world scenarios • Serve as a test target against which IDESG work products can be evaluated • Serve as a guide for the collective efforts of the IDESG, to maintain a common focus and alignment http://www.idecosystem.org/index.php?q=filedepot_download/944/1272 https://www.idecosystem.org/wiki/Use_Cases
  • 39. • Create a modular, flexible, and adaptive set of functional elements that can be effectively applied to the broadest possible collection of use cases, frameworks, and identity models. • Establish functional elements in such a way that requirements can be written to them and assessed against them. • Thus, the Functional Elements should: o Provide a basis set of functional elements that can be combined to support NSTIC pilot and IDESG Use Cases o Be implementable by various Actors within the identity ecosystem to fulfil required Roles o Help to delineate the responsibilities of various Actors in the identity ecosystem so that accountability for privacy/security/legal requirements is clear. o Define the functional elements that can be assessed by certification providers to provide interoperable functional components. Functional Elements Goals 6/5/2014
  • 41. Why and how to get involved
  • 42. Why be involved • Help shape an alternative to / augmentation of the status quo • Aid in the creation of a true market for identity • Grow your business • Work with industry peers
  • 43. www.idecosystem.org Rules of Association, Membership Agreements, Policies, etc. Can all be found under About - Governance
  • 44. Joining the IDESG  www.idecosystem.org  Click Membership - Join
  • 45. How to Get Involved Connect with Members. Join one of the email discussion lists - Post on a forum - Contribute to the Wiki and other projects. Learn and Develop. Read the Member E-Newsletter – Read about upcoming events on the Website - Attend online and in person. Run for a Leadership Position. Advocate. Tell your associates - Include IEDSG in your industry presentations, etc. Present Your Ideas. Submit an idea for group discussion. Share your own experience with your colleagues! Participate. Be a part of the solution!
  • 46. More Info • NSTIC Program Office – http://www.nist.gov/nstic/npo.html • NSTIC Blog – http://nstic.blogs.govdelivery.com/ • IDESG – https://www.idecosystem.org/
  • 49. IDESG Leadership Management Council Chair Peter Brown Management Council Vice Chair Jeremy Grant NSTIC NPO Director
  • 50. Management Council Delegates 1. Privacy & Civil Liberties Adrian Gropper 2. Usability & Human Factors Steve Bruck BruckEdwards, Inc.
  • 51. Management Council Delegates 3. Consumer Advocates Jim Barnett AARP 4. U.S. Federal Government Deborah Gallagher GSA
  • 52. Management Council Delegates 5. U.S. State, Local, Tribal, and Territorial Government Dave Burhop Commonwealth of Virginia Department of Motor Vehicles 6. Research, Development, Education & Innovation Jack Suess InCommon
  • 53. Management Council Delegates 7. Identity & Attribute Providers Matt Thompson ID.me 8. Interoperability Peter Alterman SAFE-BioPharma Association
  • 54. Management Council Delegates 9. Information Technology (IT) Infrastructure Paul Laurent Oracle Corporation 10. Regulated Industries Mark Coderre Aetna
  • 55. Management Council Delegates 11. Small Business & Entrepreneurs Kaliya Hamlin 12. Security Neville Pattinson Gemalto
  • 56. Management Council Delegates 13. Relying Parties Pete Pouridis The Neiman Marcus Group 14. Unaffiliated Individuals: James Zok
  • 57. Management Council Delegates Delegate at Large Ian Glazer Delegate at Large Adam Madlin Symantec
  • 58. IDESG Leadership Plenary Chair Kim Little Lexis Nexis Risk Solutions Plenary Vice Chair Andrew Hughes

Notas del editor

  1. With Point-to-Point, each connection: …takes weeks/months to establish …consumes agency resources and incurs significant costs …must be maintained perpetually Software maintenance Updates Security patches Version control …does not ensure interoperability of tokens accepted by different agencies – citizens have to get multiple credentials At LOA2+, agencies paying same entities to identity proof and credential the same citizens
  2. With Point-to-Point, each connection: …takes weeks/months to establish …consumes agency resources and incurs significant costs …must be maintained perpetually Software maintenance Updates Security patches Version control …does not ensure interoperability of tokens accepted by different agencies – citizens have to get multiple credentials At LOA2+, agencies paying same entities to identity proof and credential the same citizens
  3. Review committees from the slide.
  4. A true market includes rules of engagement, liability, clearly defined risks, etc
  5. If you haven’t already, to join the IDESG, first fill out the application on the IDESG website…
  6. Now to the most important part, how to engage and get involved.
  7. Management Council At Large Delegates: Ian Glazer (Individual Member) and Adam Madlin (Symantec)