SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Quality health plans & benefits
Healthier living
Financial well-being
Intelligent solutions
Abbie Barbir, Aetna Global Security
FIDO Opportunities in Healthcare
May 2017
© 2017 Aetna Inc.
Allow Aetna to establish a digital competitive
advantage by equipping Aetna web and mobile
applications with an unparalleled set of
behavioral and biometric authentication
technologies in a manner that empowers a
world-class user experience and assures the
integrity and confidentiality of member data.
Our Mission
Improved User Experience
Reduced Risk
Reduced Cost
2
© 2017 Aetna Inc.
What is Next Generation Authentication?
3
The Objective
Implement world-class capabilities to reduce risk and
enable a frictionless user experience.
Key Features
• Password elimination/reduced reliance
• Multimodal user authentication
• Context aware access control
• Real-time behavior analysis
• Continuous authentication
• Dynamic Authentication Assurance Levels (LOA)
• User across application and devices
NGA is driving a paradigm shift in mobile & web authentication
© 2017 Aetna Inc.
Key Drivers: Evolving user experience
4
Identity & Access
Management is Evolving
From: Providing the right
access to legitimate users
at the right time
To: Providing the best user
experience to legitimate
users and their things at
the right location & time
Binary Authentication
Creates a Poor User
Experience
• User frustration
• Forgotten passwords
interrupt interactions
• Reuse & abandonment
• Difficult to remember
• Provide a conduit to
member account
compromise
2FA and Other Mechanisms are
Imperfect, Provide Poor User
Experience and Suffer from Low
Consumer Adoption
© 2017 Aetna Inc.
Key Drivers: Member protection & fraud prevention
5
Phishing is Incredibly
Effective
• Phishing is a component of 95%
of incidents involving nation-
state threat actors
• 100 million phishing messages
distributed everyday
• Median time-to-first-click: 1
minute 22 seconds across all
campaigns
• $2B in business impact annually
Healthcare Organizations
& Consumers are an
Increasing Target for Fraud
• Sophisticated & targeted
attacks from nation-state &
crime syndicates
• Account takeover
• Fraudulent registration
• Payment Account Fraud
• Claims Fraud
PHI & PII Have Value on the
Dark Web
• 2016 – $.50->$1.00 per
record
• Readily available records
provide a conduit for
account takeover
• Increasing market value
drives threat actors to target
individual accounts for
PII/PHI harvesting
*Source: EY
© 2017 Aetna Inc.
Authentication is no longer an event…
it is integrated into the application
6
The way you use an application is
a better indicator of who you are
than knowledge of a password
Moving forward, authentication is continuous and
integrated natively into application interactions
Continuous
Behavioral
Authentication
Biometric
Authentication
Continuous
Contextual
AuthenticationIn the past, authentication has been a single event,
taking place only when an application is launched
© 2017 Aetna Inc.
Breaches that made the headlines
7
© 2017 Aetna Inc.
Backend
Analytics
&
Risk Engine
LOA
Real-Time (RT)
Authorization
ControlMonitor
Prevent @ Inception
Cognitive &
Device
Biometrics
Decentralized
Authentication
Aetna NGA’s core building blocks
11
Aetna Authentication Hub
Device stores
biometric and
validates it locally
(no central
database)
Examples:
Swipe speed,
geolocation,
typical application
usage patterns
Integrate
authentication
events into the
user experience
(not binary)
Big data analytics
create a risk score
for that
user/device
combination
• Adaptive
• Continuous
• Behavioral
• Analytics
© 2017 Aetna Inc.
NGA: Design principles
9
• Based on Open Specifications (i.e. FIDO)
• Easy SDK integration for web and mobile
• NGA’s centralized authentication hub
provides centralized analysis and decision
making across all NGA applications
• API-based architecture
• Lightweight and efficient
• Device and platform portability
• Flows and interactions designed to reduce
friction and improve user experience
• Eliminate fraud through increased friction
for threat actor interactions
• Support for dynamic authentication
through LOA
© 2017 Aetna Inc.
NGA: Mobile offering
10
NGA’s mobile integration capabilities provide a mechanism for implementing
consumer accepted and expected authentication capabilities in a manner that:
• Transparently and continuously authenticates the device and user
• Improves security and reduces the risk of fraud
• Removes barriers to application access
…while improving the user experience
Reduced reliance
on passwords
through enhanced
user & device
authentication
Continuous
Behavioral
Authentication
(i.e. swipe
attributes)
Continuous
Contextual
Authentication
(i.e. geolocation)
Biometric
Integration
Designed in
alignment with
FIDO Standards
© 2017 Aetna Inc.
NGA: Mobile user experience example
11
Enrollment
Subsequent
App Usage
• Behavioral & contextual
attributes collected
continuously
• Centralized
authentication hub
makes ongoing
authentication decisions
© 2017 Aetna Inc.
NGA: Web offering
12
Reduced reliance
on passwords
through enhanced
user & device
authentication
Browser & System
Fingerprinting for
each session
improves security
& usability
Associate members &
their devices through
Device Binding to
improve user
experience & security
Eliminates risk of
impersonation,
account takeover,
and registration
fraud
NGA’s web integration capabilities provide a mechanism for implementing
consumer accepted and expected authentication capabilities in a manner that:
• Improves member data security
• Reduces the risk of fraud
…while improving the user experience
© 2017 Aetna Inc.
NGA: Web user experience example
13
Let’s follow Aetna Member Pam as she uses an Aetna web application with NGA
Pam accesses her
online Aetna account
for the first time Pam is using this system for the first time, so she completes an easy
verification processes via SMS or email
Following validation, the NGA Authentication Hub adds her computer
is to her profile, along with the other devices she uses. She will not be
prompted again from this computer
Hacker Harold later
tries to gain access to
Pam’s account
Hacker Harold is unable to gain access to
the account, as the NGA Authentication
Hub identified that his system is not part
of Pam’s profile he does not have access
to Pam’s email or cell phone
Pam is comfortable with this process, as it is similar to what she is used to for the Financial Services
organizations she has accounts with, and aligns with her data protection expectations
© 2017 Aetna Inc.
FIDO modern authentication
14
IMPLICIT
AUTHENTICATION
EXPLICIT
AUTHENTICATION
• MUST eliminate symmetric shared secrets
• Address poor user experiences and friction
• FIDO is a building block
− complements federation solutions
Impact
• Identity binding is essential
• Strong identity proofing a must
Source FIDO
© 2017 Aetna Inc.
Federation
15
Second Mile
FEDERATION
SAML
OAuth
OpenID
Connect
Complicated
Authentication
NO
PASSWORDS
First Mile
• Standards are catching up on mile one
• Mile two is getting more mature
• Federation need improvement
• No prior relationship
• SAML: Dynamic AuthN/Z
• OAuth, OIC dynamic end point
• Blockchain Opportunity
• How about identity assurance?
− Poorly deploying strong authentication
is the same as weak authentication
• FIDO solves the PW problem but mandates
better identity binding at the relaying part
• Proper Identity vetting/proofing becomes
essential
© 2017 Aetna Inc.
Issue to consider
16
Identity proofing and account recovery
Account Login Current Pain Points
• I forgot my password
• I cannot find/lost my phone
• I am locked out of my account
Account Recovery Options
• KBA (static and/or dynamic)
• Email account (compromised)
− Password reset link
− Or a new password
− Enrolling back in FIDO
Identity Proofing
• Binding a FIDO authenticator to a user
account on relying party requires
performing an Identity vetting step
− Trust anchor (aka Bootstrapping
problem)
• Currently pre-established
Authenticators are used as anchors of
Trust (such as passwords)
Online identity proofing is challenging and still relies on something “you know”
© 2017 Aetna Inc.
Questions
Thank you

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Becoming Unphishable
Becoming UnphishableBecoming Unphishable
Becoming Unphishable
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital Services
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User Experience
 

Destacado

Destacado (12)

Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
FIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Certified Program: Status & Futures
FIDO Certified Program: Status & Futures
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & Blockchain
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
FIDO, Federation & Facebook Social Login
FIDO, Federation & Facebook Social LoginFIDO, Federation & Facebook Social Login
FIDO, Federation & Facebook Social Login
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 

Similar a FIDO Authentication Opportunities in Healthcare

Similar a FIDO Authentication Opportunities in Healthcare (20)

FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer Authentication
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SV
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...Webinar - How to choose the Right Compliance Management Software for your Org...
Webinar - How to choose the Right Compliance Management Software for your Org...
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
[APIdays INTERFACE 2021] Authentication and Authorization Best Practices for ...
[APIdays INTERFACE 2021] Authentication and Authorization Best Practices for ...[APIdays INTERFACE 2021] Authentication and Authorization Best Practices for ...
[APIdays INTERFACE 2021] Authentication and Authorization Best Practices for ...
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 

Más de FIDO Alliance

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

Más de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 

Último

Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
Sheetaleventcompany
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
gragmanisha42
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
russian goa call girl and escorts service
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreBest Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Deny Daniel
 
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetcoimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
russian goa call girl and escorts service
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
palanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
palanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetpalanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
palanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
mriyagarg453
 

Último (20)

Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreBest Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
 
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetcoimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
 
palanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
palanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetpalanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
palanpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
 

FIDO Authentication Opportunities in Healthcare

  • 1. Quality health plans & benefits Healthier living Financial well-being Intelligent solutions Abbie Barbir, Aetna Global Security FIDO Opportunities in Healthcare May 2017
  • 2. © 2017 Aetna Inc. Allow Aetna to establish a digital competitive advantage by equipping Aetna web and mobile applications with an unparalleled set of behavioral and biometric authentication technologies in a manner that empowers a world-class user experience and assures the integrity and confidentiality of member data. Our Mission Improved User Experience Reduced Risk Reduced Cost 2
  • 3. © 2017 Aetna Inc. What is Next Generation Authentication? 3 The Objective Implement world-class capabilities to reduce risk and enable a frictionless user experience. Key Features • Password elimination/reduced reliance • Multimodal user authentication • Context aware access control • Real-time behavior analysis • Continuous authentication • Dynamic Authentication Assurance Levels (LOA) • User across application and devices NGA is driving a paradigm shift in mobile & web authentication
  • 4. © 2017 Aetna Inc. Key Drivers: Evolving user experience 4 Identity & Access Management is Evolving From: Providing the right access to legitimate users at the right time To: Providing the best user experience to legitimate users and their things at the right location & time Binary Authentication Creates a Poor User Experience • User frustration • Forgotten passwords interrupt interactions • Reuse & abandonment • Difficult to remember • Provide a conduit to member account compromise 2FA and Other Mechanisms are Imperfect, Provide Poor User Experience and Suffer from Low Consumer Adoption
  • 5. © 2017 Aetna Inc. Key Drivers: Member protection & fraud prevention 5 Phishing is Incredibly Effective • Phishing is a component of 95% of incidents involving nation- state threat actors • 100 million phishing messages distributed everyday • Median time-to-first-click: 1 minute 22 seconds across all campaigns • $2B in business impact annually Healthcare Organizations & Consumers are an Increasing Target for Fraud • Sophisticated & targeted attacks from nation-state & crime syndicates • Account takeover • Fraudulent registration • Payment Account Fraud • Claims Fraud PHI & PII Have Value on the Dark Web • 2016 – $.50->$1.00 per record • Readily available records provide a conduit for account takeover • Increasing market value drives threat actors to target individual accounts for PII/PHI harvesting *Source: EY
  • 6. © 2017 Aetna Inc. Authentication is no longer an event… it is integrated into the application 6 The way you use an application is a better indicator of who you are than knowledge of a password Moving forward, authentication is continuous and integrated natively into application interactions Continuous Behavioral Authentication Biometric Authentication Continuous Contextual AuthenticationIn the past, authentication has been a single event, taking place only when an application is launched
  • 7. © 2017 Aetna Inc. Breaches that made the headlines 7
  • 8. © 2017 Aetna Inc. Backend Analytics & Risk Engine LOA Real-Time (RT) Authorization ControlMonitor Prevent @ Inception Cognitive & Device Biometrics Decentralized Authentication Aetna NGA’s core building blocks 11 Aetna Authentication Hub Device stores biometric and validates it locally (no central database) Examples: Swipe speed, geolocation, typical application usage patterns Integrate authentication events into the user experience (not binary) Big data analytics create a risk score for that user/device combination • Adaptive • Continuous • Behavioral • Analytics
  • 9. © 2017 Aetna Inc. NGA: Design principles 9 • Based on Open Specifications (i.e. FIDO) • Easy SDK integration for web and mobile • NGA’s centralized authentication hub provides centralized analysis and decision making across all NGA applications • API-based architecture • Lightweight and efficient • Device and platform portability • Flows and interactions designed to reduce friction and improve user experience • Eliminate fraud through increased friction for threat actor interactions • Support for dynamic authentication through LOA
  • 10. © 2017 Aetna Inc. NGA: Mobile offering 10 NGA’s mobile integration capabilities provide a mechanism for implementing consumer accepted and expected authentication capabilities in a manner that: • Transparently and continuously authenticates the device and user • Improves security and reduces the risk of fraud • Removes barriers to application access …while improving the user experience Reduced reliance on passwords through enhanced user & device authentication Continuous Behavioral Authentication (i.e. swipe attributes) Continuous Contextual Authentication (i.e. geolocation) Biometric Integration Designed in alignment with FIDO Standards
  • 11. © 2017 Aetna Inc. NGA: Mobile user experience example 11 Enrollment Subsequent App Usage • Behavioral & contextual attributes collected continuously • Centralized authentication hub makes ongoing authentication decisions
  • 12. © 2017 Aetna Inc. NGA: Web offering 12 Reduced reliance on passwords through enhanced user & device authentication Browser & System Fingerprinting for each session improves security & usability Associate members & their devices through Device Binding to improve user experience & security Eliminates risk of impersonation, account takeover, and registration fraud NGA’s web integration capabilities provide a mechanism for implementing consumer accepted and expected authentication capabilities in a manner that: • Improves member data security • Reduces the risk of fraud …while improving the user experience
  • 13. © 2017 Aetna Inc. NGA: Web user experience example 13 Let’s follow Aetna Member Pam as she uses an Aetna web application with NGA Pam accesses her online Aetna account for the first time Pam is using this system for the first time, so she completes an easy verification processes via SMS or email Following validation, the NGA Authentication Hub adds her computer is to her profile, along with the other devices she uses. She will not be prompted again from this computer Hacker Harold later tries to gain access to Pam’s account Hacker Harold is unable to gain access to the account, as the NGA Authentication Hub identified that his system is not part of Pam’s profile he does not have access to Pam’s email or cell phone Pam is comfortable with this process, as it is similar to what she is used to for the Financial Services organizations she has accounts with, and aligns with her data protection expectations
  • 14. © 2017 Aetna Inc. FIDO modern authentication 14 IMPLICIT AUTHENTICATION EXPLICIT AUTHENTICATION • MUST eliminate symmetric shared secrets • Address poor user experiences and friction • FIDO is a building block − complements federation solutions Impact • Identity binding is essential • Strong identity proofing a must Source FIDO
  • 15. © 2017 Aetna Inc. Federation 15 Second Mile FEDERATION SAML OAuth OpenID Connect Complicated Authentication NO PASSWORDS First Mile • Standards are catching up on mile one • Mile two is getting more mature • Federation need improvement • No prior relationship • SAML: Dynamic AuthN/Z • OAuth, OIC dynamic end point • Blockchain Opportunity • How about identity assurance? − Poorly deploying strong authentication is the same as weak authentication • FIDO solves the PW problem but mandates better identity binding at the relaying part • Proper Identity vetting/proofing becomes essential
  • 16. © 2017 Aetna Inc. Issue to consider 16 Identity proofing and account recovery Account Login Current Pain Points • I forgot my password • I cannot find/lost my phone • I am locked out of my account Account Recovery Options • KBA (static and/or dynamic) • Email account (compromised) − Password reset link − Or a new password − Enrolling back in FIDO Identity Proofing • Binding a FIDO authenticator to a user account on relying party requires performing an Identity vetting step − Trust anchor (aka Bootstrapping problem) • Currently pre-established Authenticators are used as anchors of Trust (such as passwords) Online identity proofing is challenging and still relies on something “you know”
  • 17. © 2017 Aetna Inc. Questions Thank you