SlideShare a Scribd company logo
Karl Martin, CEO
@KarlTheMartian
Thank You
2
Consumer Authentication Today
Things You Know
-  Passwords
-  PINs
-  Passphrases
-  Inane security
questions
Things You Have
-  Keys
-  Cards
-  Electronic tokens
Who you are
-  Fingerprint
-  Face
-  Voice
-  Iris
Thank You
3
Biometrics are the Silver Bullet?
The security world has been looking to biometrics to solve
its security vs. convenience problem
But, fundamental technological limitations are quickly
reached
The problem is further exacerbated by fickle consumers and
uncontrolled operating environments
Thank You
4
Reframing the Problem
We cannot completely eliminate the friction associated with
fundamental human authentication processes
The problem lies not just in the friction, but in the frequency:
burden = friction x frequency
How can we instead reduce the frequency?
Thank You
5
Changing the Authentication Paradigm
The fundamental problem is now with the forced
synchronicity: authentication at the point of transaction
How can we decouple action required for authentication
from the transaction that uses it?
Redesign the system to achieve asynchronicity
Thank You
6
Seamless, persistent
sensing
Wearable Technology – Distilled
Low power, wireless
communication
Fitness and health?
Asynchronicity of: signals – insight – action
Thank You
The Redesigned Authentication System
Establish a high level of trust using multiple factors
Leverage persistent sensing to maintain that trust without
further user interaction
Use a trusted device to seamlessly serve credentials
without requiring any user interaction
Thank You
8
Identity Is Now Easy – So Now What?
Authentication is not just a security problem, it’s a general
identity problem
By making identity easy, the scope of identity-focused
applications significantly broadens
Smart devices have a new context in which to operate
Thank You
9
New Context for Internet of Things
The Internet of Things is about persistent connectivity and
sensing
Sensing can provide situational context to make smart
things smarter
But, where user interaction is involved, identity is the
ultimate context
Thank You
10
Privacy Must Be At the Forefront
Privacy is not about secrecy:
Privacy = Control
By decoupling human action from authentication, greater
trust us placed upon the system
Privacy by Design (www.privacybydesign.ca)
Thank You
11
The Context for Internet of Things
Identity has been the missing context for IoT devices
The prospect is profound: if every device, environment, and
service provider knew the identities of those nearby, how
would they behave differently
We are entering the era of hyper-personalization
Thank You
12
getnymi.com

More Related Content

DOCX
IoT Design Principles
PPTX
WHAT IS IoT
PDF
An Insight on Testing the IoT Applications
PPTX
Ict technology and its applications in professional life
PPTX
Designing the Internet of Things
PPTX
IOT - Design Principles of Connected Devices
PPTX
A brief history of how internet of things become a thing
IoT Design Principles
WHAT IS IoT
An Insight on Testing the IoT Applications
Ict technology and its applications in professional life
Designing the Internet of Things
IOT - Design Principles of Connected Devices
A brief history of how internet of things become a thing

What's hot (20)

PDF
Internet of things
PPTX
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
PPT
Internet Of Things
PPTX
IoT (Internet Of Things)
PDF
Internet+of+things+iot+learn+faster+the+io t+
PPTX
Internet of Things -Indoor Environmental Monitoring And Control System
PPTX
IOT and Characteristics of IOT
PDF
Smart cities applications using IOT and cloud-based
PPTX
Internet of things (IoT)
PDF
تعلم الانترنيت
PPTX
Internet of Things (IoT)
PPTX
Basics of internet of things
PDF
The internet of things.pptx
PPTX
Internet of Things (IoT)
PDF
Internet of Things
PPTX
Internet of Things
PPTX
IoT - What is it ?
PDF
IoT Networking
ODP
Internet Of Things
Internet of things
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
Internet Of Things
IoT (Internet Of Things)
Internet+of+things+iot+learn+faster+the+io t+
Internet of Things -Indoor Environmental Monitoring And Control System
IOT and Characteristics of IOT
Smart cities applications using IOT and cloud-based
Internet of things (IoT)
تعلم الانترنيت
Internet of Things (IoT)
Basics of internet of things
The internet of things.pptx
Internet of Things (IoT)
Internet of Things
Internet of Things
IoT - What is it ?
IoT Networking
Internet Of Things
Ad

Viewers also liked (19)

PDF
CIS14: Protecting Your APIs from Threats and Hacks
PDF
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
PDF
CIS14: Lean In: Enterprise Cloud Identity
PDF
CIS14: Kantara Open Stand Overview
PDF
CIS14: Identity in OpenStack Icehouse
PDF
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
PDF
CIS14: OAuth and OpenID Connect in Action
PDF
CIS 2015- Building IAM for OpenStack- Steve Martinelli
PDF
CIS14: Kantara Briefing on ID.me
PDF
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
PDF
CIS14: Identity at Scale: Next Gen Federation Architectures
PDF
CIS14: OAuth and OpenID Connect in Action
PDF
CIS14: Enterprise Identity APIs
PDF
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
PDF
CIS14: API Security for the Cloud: Tales from the Trenches
PDF
CIS14: Human Identity and the IoT “Jungle”
PDF
CIS14: NIST and NSTIC (New Directions in Identity)
PDF
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
CIS14: Protecting Your APIs from Threats and Hacks
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Kantara Open Stand Overview
CIS14: Identity in OpenStack Icehouse
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
CIS14: OAuth and OpenID Connect in Action
CIS 2015- Building IAM for OpenStack- Steve Martinelli
CIS14: Kantara Briefing on ID.me
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Identity at Scale: Next Gen Federation Architectures
CIS14: OAuth and OpenID Connect in Action
CIS14: Enterprise Identity APIs
CIS14: Providing Business with NextGen Identity Solutions in a Legacy World
CIS14: API Security for the Cloud: Tales from the Trenches
CIS14: Human Identity and the IoT “Jungle”
CIS14: NIST and NSTIC (New Directions in Identity)
CIS14: Identity at Scale: Bridging Gaps between Physical and Logical, Token a...
Ad

Similar to CIS14: Persistent Trusted Identity (20)

PPTX
Securing the digital front door
PDF
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
PPTX
iPads on your network? Take Control with Unified Policy and Management
PPTX
What are Pros and Cons of Internet of Things?
PDF
PSFK Presents the Future of Digital Safety & Security
PPTX
Cloud Security - Idealware
PDF
The Cloud Beckons, But is it Safe?
PDF
Evanta 2018 msp big 3 tech
PDF
Mobile Ad Hoc Networks ( Manets )
PDF
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
PDF
Driving secureiot innovation
DOCX
Security and Privacy considerations in Internet of Things
PDF
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
PDF
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
PDF
Shift Toward Dynamic Cyber Resilience
PDF
What’s the Future of Digital Security.pdf
PPTX
Trust in the age of blockchain
PPTX
BYOD, BYOA and Consumerization
PDF
Point-of-View_Demand-for-on-demand-support
Securing the digital front door
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
iPads on your network? Take Control with Unified Policy and Management
What are Pros and Cons of Internet of Things?
PSFK Presents the Future of Digital Safety & Security
Cloud Security - Idealware
The Cloud Beckons, But is it Safe?
Evanta 2018 msp big 3 tech
Mobile Ad Hoc Networks ( Manets )
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Driving secureiot innovation
Security and Privacy considerations in Internet of Things
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
Shift Toward Dynamic Cyber Resilience
What’s the Future of Digital Security.pdf
Trust in the age of blockchain
BYOD, BYOA and Consumerization
Point-of-View_Demand-for-on-demand-support

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
Unlocking AI with Model Context Protocol (MCP)
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
A comparative analysis of optical character recognition models for extracting...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”

CIS14: Persistent Trusted Identity

  • 2. Thank You 2 Consumer Authentication Today Things You Know -  Passwords -  PINs -  Passphrases -  Inane security questions Things You Have -  Keys -  Cards -  Electronic tokens Who you are -  Fingerprint -  Face -  Voice -  Iris
  • 3. Thank You 3 Biometrics are the Silver Bullet? The security world has been looking to biometrics to solve its security vs. convenience problem But, fundamental technological limitations are quickly reached The problem is further exacerbated by fickle consumers and uncontrolled operating environments
  • 4. Thank You 4 Reframing the Problem We cannot completely eliminate the friction associated with fundamental human authentication processes The problem lies not just in the friction, but in the frequency: burden = friction x frequency How can we instead reduce the frequency?
  • 5. Thank You 5 Changing the Authentication Paradigm The fundamental problem is now with the forced synchronicity: authentication at the point of transaction How can we decouple action required for authentication from the transaction that uses it? Redesign the system to achieve asynchronicity
  • 6. Thank You 6 Seamless, persistent sensing Wearable Technology – Distilled Low power, wireless communication Fitness and health? Asynchronicity of: signals – insight – action
  • 7. Thank You The Redesigned Authentication System Establish a high level of trust using multiple factors Leverage persistent sensing to maintain that trust without further user interaction Use a trusted device to seamlessly serve credentials without requiring any user interaction
  • 8. Thank You 8 Identity Is Now Easy – So Now What? Authentication is not just a security problem, it’s a general identity problem By making identity easy, the scope of identity-focused applications significantly broadens Smart devices have a new context in which to operate
  • 9. Thank You 9 New Context for Internet of Things The Internet of Things is about persistent connectivity and sensing Sensing can provide situational context to make smart things smarter But, where user interaction is involved, identity is the ultimate context
  • 10. Thank You 10 Privacy Must Be At the Forefront Privacy is not about secrecy: Privacy = Control By decoupling human action from authentication, greater trust us placed upon the system Privacy by Design (www.privacybydesign.ca)
  • 11. Thank You 11 The Context for Internet of Things Identity has been the missing context for IoT devices The prospect is profound: if every device, environment, and service provider knew the identities of those nearby, how would they behave differently We are entering the era of hyper-personalization