SlideShare a Scribd company logo
Bring Your Own Identity (BYOI)
strategies for organizations and their impact
Matthew Ulery
Director of Product Management
Agenda


What is BYOI?



Why do we care about BYOI?



When to allow BYOI?



What are others doing about BYOI?

2

© 2013 NetIQ Corporation. All rights reserved.
What is BYOI?


Bring your own Infrastructure



Bring your own Iron



Bring your own Identity



Bring your own Improv



Bring your own Intoxicant

3

© 2013 NetIQ Corporation. All rights reserved.
Early adopters and providers
BYOI Trends


Social, web resource and retail
─
─
─
─



Social identity providers investing in BYOI
─

4

Use LinkedIn account to access a whitepaper
Use Amazon ID rather than creating a new retail account
Apply to a new job using LinkedIn account
NYC adopting to support constituents
Seeking greater return on their identity validation investment

© 2013 NetIQ Corporation. All rights reserved.
BYOD accelerating BYOI
BYOI Trends


Identity Overload
─
─
─
─
─



Merging of personal device and identity
─
─

5

Average 25 accounts per person and growing
Social Networking
Financial Accounts (bank, payment, entertainment)
Loyalty programs
etc
Collection of business and personal identities
Expect seamless experience from personal device

© 2013 NetIQ Corporation. All rights reserved.
6

© 2013 NetIQ Corporation. All rights reserved.
Why do we care about BYOI?


Cost reduction / avoidance
─



Increase customer / constituent engagement
─
─



Reduce registration abandonment
Enable more personalized experience interactions

Emerging changes in risk
─
─
─

7

Management of identities is expensive

Risk shared with customer/constituent and identity provider
Responsibility to protect customer privacy remains
Privacy risk mitigated by reducing identifiable information

© 2013 NetIQ Corporation. All rights reserved.
Big Question?

Should we allow BYOI?
8

© 2013 NetIQ Corporation. All rights reserved.
Security Concerns
When to allow BYOI?


Strength of authentication
─
─



Strength of identity administration
─
─



How is identity validated for administration?
What is required to issue a password reset?

Compromised identity
─
─

9

Hurdles required to create the identity
Hurdles required to validate the identity

Who is responsible if identity is breached?
How can you revoke access?

© 2013 NetIQ Corporation. All rights reserved.
Different Identity Types
When to allow BYOI?


Customer and constituents
─
─



Privileged users
─
─
─



Employees, partners, contractors, etc.
Significant access to sensitive information & systems
Much greater level of personal identifiable information

Allow BYOI…?
─

10

Limited to no access to sensitive information & systems
Limited amount of personal identifiable information

Must balance risk and value

© 2013 NetIQ Corporation. All rights reserved.
NYC.GOV
BYOI Case Study
• Different

Goals / Desires / Requirements

– Residents
– NYC
– Site

Politicians
admins

Needed a Lightly secured, customer facing portal
11

© 2013 NetIQ Corporation. All rights reserved.
NYC Constituent Experience
BYOI Case Study
Access
Management
requirements

Secure Identity-enabled
Web Services to provide
account info

am.nyc.gov

Public
Resources

Non Identity-based
information and services,
optimized for speed

pub.nyc.gov

www.nyc.gov is a site
composed of information
from other webservices,
secure, public, and semipublic.
12

© 2013 NetIQ Corporation. All rights reserved.

Social
Access
requirements

cf.nyc.gov

Personalized Web
content, requires only
simple consumer
authentication or
NYC.ID
Management of public resources
BYOI Case Study


NYC Tennis Courts
─
─
─



Is this a candidate for BYOI?
─
─
─

13

60,000 permits and tickets, 500 courts
Annual permits ($100)
Scheduling courts a nightmare for NYC and permit holders

Low risk
Lower cost from web scheduling and external identity
Enables external payment collection (i.e. PayPal)

© 2013 NetIQ Corporation. All rights reserved.
Risk of Hacked Identity
Mat Honan, Wired Magazine


Linked many of his accounts
─
─

Social accounts: Twitter, LinkedIn
Personal: Amazon, Gmail



Hackers wanted Twitter handle



Hackers exploited weak link

14

© 2013 NetIQ Corporation. All rights reserved.
Risk of Hacked Identity
Mat Honan, Wired Magazine


“In the space of one hour, my entire digital
life was destroyed.”
─
─

─



15

“First my Google account was taken over, then deleted.”
“Next my Twitter account was compromised, and used as a
platform to broadcast racist and homophobic messages.”
“And worst of all, my AppleID account was broken into, and my
hackers used it to remotely erase all of the data on my iPhone,
iPad, and MacBook?”

“In many ways, this was all my fault. My
accounts were daisy-chained together.”

© 2013 NetIQ Corporation. All rights reserved.
Required no advanced skills
Mat Honan, Wired Magazine


Twitter linked to Gmail account
─
─
─



Resetting Apple account requires
─
─
─



Physical address & last four digits of credit card
Easy to get address
How could they get the credit card information?

Amazon and AppleID accounts linked
─

─
─

16

Google Account recovery page
Gave alternate email: m****n@me.com (hmmmm mhonan)…
Letting them know he had an AppleID

Name and email address needed to add a card to Amazon
Knowing card number allows resetting password
Now they have the credit card number for AppleID

© 2013 NetIQ Corporation. All rights reserved.
Key Take-aways
Balancing Risk and Value


BYOI benefits
─
─
─



BYOI risk assessment
─
─
─



Customers/constituents involved in identity selection
Security of identity beyond your control
Still must protect personal identifiable information

Must balance value against savings
─
─

17

Reduce cost of generating and managing identities
Reduce customer/constituent engagement
Enable more personalized experience interactions

What type of access does it fit?
May not be right for your organization…yet

© 2013 NetIQ Corporation. All rights reserved.
Q&A
matthew.ulery@netiq.com

More Related Content

PPTX
Are You Being Anti-Social
PPT
Identity, Security and Healthcare
PDF
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
PDF
SecureMAG Volume 6 - 2014
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PPTX
IAM for the Masses: Managing Consumer Identities
PDF
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
PDF
SecureMAG Vol 3
Are You Being Anti-Social
Identity, Security and Healthcare
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
SecureMAG Volume 6 - 2014
Extending the Power of Consent with User-Managed Access & OpenUMA
IAM for the Masses: Managing Consumer Identities
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
SecureMAG Vol 3

What's hot (20)

PPTX
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PPTX
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
PPTX
Trust Frameworks Explained
PPTX
India'a Proposed Privacy & Personal Data Protection Law
PDF
GDPR, User Data, Privacy, and Your Apps
PDF
Fintech & Blockchain
PPTX
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
PDF
The Weakest Point of Security in IoT
PDF
Blockchain for Accounting & Assurance
PPTX
Kantara Workshop at CIS
PPT
Kantara a Global Context 2011
PPT
Federated Futures (Nicole Harris)
PPTX
Second line of defense for cybersecurity : Blockchain
PDF
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
PDF
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
PPTX
The Blockchain Wave in 2019 and Beyond
PPTX
New trends of IoT in 2018 and beyond (SJSU Conference )
PPTX
Secure and Smart IoT
PDF
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Trust Frameworks Explained
India'a Proposed Privacy & Personal Data Protection Law
GDPR, User Data, Privacy, and Your Apps
Fintech & Blockchain
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
The Weakest Point of Security in IoT
Blockchain for Accounting & Assurance
Kantara Workshop at CIS
Kantara a Global Context 2011
Federated Futures (Nicole Harris)
Second line of defense for cybersecurity : Blockchain
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
The Blockchain Wave in 2019 and Beyond
New trends of IoT in 2018 and beyond (SJSU Conference )
Secure and Smart IoT
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Ad

Viewers also liked (11)

PPTX
BrainShare 2014
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
A Smarter, More Secure Internet of Things
PPTX
CA CloudMinder Vasu Surabhi
PPTX
Building A Cloud-Ready Security Program
PPTX
Scrubbing Your Active Directory Squeaky Clean
PPTX
Enterprise & Web based Federated Identity Management & Data Access Controls
PDF
Mobile Apps in Your Business
PDF
Big Payoffs With BYOD and Mobility
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPT
Building an Effective Identity Management Strategy
BrainShare 2014
Advanced Persistent Threat - Evaluating Effective Responses
A Smarter, More Secure Internet of Things
CA CloudMinder Vasu Surabhi
Building A Cloud-Ready Security Program
Scrubbing Your Active Directory Squeaky Clean
Enterprise & Web based Federated Identity Management & Data Access Controls
Mobile Apps in Your Business
Big Payoffs With BYOD and Mobility
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Building an Effective Identity Management Strategy
Ad

Similar to Bring Your Own Identity (20)

DOCX
Future of bring your own identity
PDF
Identity - The Cornerstone of Information Security
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Digital Identities
PDF
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
PPTX
Identity Managment
PDF
Australian Payments Network - Digital Identity
PPTX
Iot privacy vs convenience
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PDF
Compliance & Identity access management
PDF
Simon Willison @ FOWA Feb 07
PPT
Identity Management: Risk Across The Enterprise
PPTX
Understanding Your Digital Identity
PPTX
Special report on security
PPTX
Next gen idm webinar 271214
PDF
SmartCard Forum 2008 - Securing digital identity
PDF
Identity Management Terminology
PPTX
The Loss of Intellectual Property in the Digital Age: What Companies can d…
PDF
Centrify rethink security brochure
Future of bring your own identity
Identity - The Cornerstone of Information Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Digital Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
Identity Managment
Australian Payments Network - Digital Identity
Iot privacy vs convenience
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Compliance & Identity access management
Simon Willison @ FOWA Feb 07
Identity Management: Risk Across The Enterprise
Understanding Your Digital Identity
Special report on security
Next gen idm webinar 271214
SmartCard Forum 2008 - Securing digital identity
Identity Management Terminology
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Centrify rethink security brochure

More from NetIQ (20)

PDF
Open Enterprise Server With Windows
PDF
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
PDF
Paraca Inc.
PDF
The University of Westminster Saves Time and Money with Identity Manager
PDF
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
PDF
Swisscard Saves Time and Effort in Managing User Access
PDF
Vodacom Tightens Security with Identity Manager from NetIQ
PDF
University of Dayton Ensures Compliance with Sentinel Log Manager
PDF
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
PDF
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
PDF
Netiq css huntington_bank
PDF
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
PDF
NetIQ Identity Manager Unites Hanshan Normal University
PDF
Handelsbanken Takes Control of Identity Management with NetIQ
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
PDF
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
PDF
Central Denmark Region Strengthens Administrative Security with Identity Mana...
PDF
Cloud Identity
PDF
2014 Cyberthreat Defense Report
PDF
Identity-Powered Security
Open Enterprise Server With Windows
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
Paraca Inc.
The University of Westminster Saves Time and Money with Identity Manager
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
Swisscard Saves Time and Effort in Managing User Access
Vodacom Tightens Security with Identity Manager from NetIQ
University of Dayton Ensures Compliance with Sentinel Log Manager
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Netiq css huntington_bank
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ Identity Manager Unites Hanshan Normal University
Handelsbanken Takes Control of Identity Management with NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Cloud Identity
2014 Cyberthreat Defense Report
Identity-Powered Security

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx

Bring Your Own Identity

  • 1. Bring Your Own Identity (BYOI) strategies for organizations and their impact Matthew Ulery Director of Product Management
  • 2. Agenda  What is BYOI?  Why do we care about BYOI?  When to allow BYOI?  What are others doing about BYOI? 2 © 2013 NetIQ Corporation. All rights reserved.
  • 3. What is BYOI?  Bring your own Infrastructure  Bring your own Iron  Bring your own Identity  Bring your own Improv  Bring your own Intoxicant 3 © 2013 NetIQ Corporation. All rights reserved.
  • 4. Early adopters and providers BYOI Trends  Social, web resource and retail ─ ─ ─ ─  Social identity providers investing in BYOI ─ 4 Use LinkedIn account to access a whitepaper Use Amazon ID rather than creating a new retail account Apply to a new job using LinkedIn account NYC adopting to support constituents Seeking greater return on their identity validation investment © 2013 NetIQ Corporation. All rights reserved.
  • 5. BYOD accelerating BYOI BYOI Trends  Identity Overload ─ ─ ─ ─ ─  Merging of personal device and identity ─ ─ 5 Average 25 accounts per person and growing Social Networking Financial Accounts (bank, payment, entertainment) Loyalty programs etc Collection of business and personal identities Expect seamless experience from personal device © 2013 NetIQ Corporation. All rights reserved.
  • 6. 6 © 2013 NetIQ Corporation. All rights reserved.
  • 7. Why do we care about BYOI?  Cost reduction / avoidance ─  Increase customer / constituent engagement ─ ─  Reduce registration abandonment Enable more personalized experience interactions Emerging changes in risk ─ ─ ─ 7 Management of identities is expensive Risk shared with customer/constituent and identity provider Responsibility to protect customer privacy remains Privacy risk mitigated by reducing identifiable information © 2013 NetIQ Corporation. All rights reserved.
  • 8. Big Question? Should we allow BYOI? 8 © 2013 NetIQ Corporation. All rights reserved.
  • 9. Security Concerns When to allow BYOI?  Strength of authentication ─ ─  Strength of identity administration ─ ─  How is identity validated for administration? What is required to issue a password reset? Compromised identity ─ ─ 9 Hurdles required to create the identity Hurdles required to validate the identity Who is responsible if identity is breached? How can you revoke access? © 2013 NetIQ Corporation. All rights reserved.
  • 10. Different Identity Types When to allow BYOI?  Customer and constituents ─ ─  Privileged users ─ ─ ─  Employees, partners, contractors, etc. Significant access to sensitive information & systems Much greater level of personal identifiable information Allow BYOI…? ─ 10 Limited to no access to sensitive information & systems Limited amount of personal identifiable information Must balance risk and value © 2013 NetIQ Corporation. All rights reserved.
  • 11. NYC.GOV BYOI Case Study • Different Goals / Desires / Requirements – Residents – NYC – Site Politicians admins Needed a Lightly secured, customer facing portal 11 © 2013 NetIQ Corporation. All rights reserved.
  • 12. NYC Constituent Experience BYOI Case Study Access Management requirements Secure Identity-enabled Web Services to provide account info am.nyc.gov Public Resources Non Identity-based information and services, optimized for speed pub.nyc.gov www.nyc.gov is a site composed of information from other webservices, secure, public, and semipublic. 12 © 2013 NetIQ Corporation. All rights reserved. Social Access requirements cf.nyc.gov Personalized Web content, requires only simple consumer authentication or NYC.ID
  • 13. Management of public resources BYOI Case Study  NYC Tennis Courts ─ ─ ─  Is this a candidate for BYOI? ─ ─ ─ 13 60,000 permits and tickets, 500 courts Annual permits ($100) Scheduling courts a nightmare for NYC and permit holders Low risk Lower cost from web scheduling and external identity Enables external payment collection (i.e. PayPal) © 2013 NetIQ Corporation. All rights reserved.
  • 14. Risk of Hacked Identity Mat Honan, Wired Magazine  Linked many of his accounts ─ ─ Social accounts: Twitter, LinkedIn Personal: Amazon, Gmail  Hackers wanted Twitter handle  Hackers exploited weak link 14 © 2013 NetIQ Corporation. All rights reserved.
  • 15. Risk of Hacked Identity Mat Honan, Wired Magazine  “In the space of one hour, my entire digital life was destroyed.” ─ ─ ─  15 “First my Google account was taken over, then deleted.” “Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages.” “And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook?” “In many ways, this was all my fault. My accounts were daisy-chained together.” © 2013 NetIQ Corporation. All rights reserved.
  • 16. Required no advanced skills Mat Honan, Wired Magazine  Twitter linked to Gmail account ─ ─ ─  Resetting Apple account requires ─ ─ ─  Physical address & last four digits of credit card Easy to get address How could they get the credit card information? Amazon and AppleID accounts linked ─ ─ ─ 16 Google Account recovery page Gave alternate email: m****n@me.com (hmmmm mhonan)… Letting them know he had an AppleID Name and email address needed to add a card to Amazon Knowing card number allows resetting password Now they have the credit card number for AppleID © 2013 NetIQ Corporation. All rights reserved.
  • 17. Key Take-aways Balancing Risk and Value  BYOI benefits ─ ─ ─  BYOI risk assessment ─ ─ ─  Customers/constituents involved in identity selection Security of identity beyond your control Still must protect personal identifiable information Must balance value against savings ─ ─ 17 Reduce cost of generating and managing identities Reduce customer/constituent engagement Enable more personalized experience interactions What type of access does it fit? May not be right for your organization…yet © 2013 NetIQ Corporation. All rights reserved.

Editor's Notes

  • #11: Identity provisioning really breaks down into two classes. The first class is that of people you provide a service to – constituents, customers , etc . The second class are employees. People who require access to provide a service for you.We collect different identity information from both of these groups. The mechanisms for collection and storage are different, as are the purposes for collection. While some of this identity information is equivalent in sensitivity, it is often handled differently.Depending on what identity class you lost the data from, it will probably have different mitigation requirements and even impact on your organization.
  • #12: Residents : Another #$%^$#**** account and password?Not more paperwork…NYC Politicianseasy to use and reduce work (admins)merge disparate accessprovide graded access for customers / constituents and employeeshandle high volume accessneed a drop in solutionneeds to be personalizedcheap (comptroller)Not going to get me in trouble ( compliance)Site admins – need to: work with staff they have
  • #13: Always appear to be openSecure identity be available, but did not want to mint a new identity for all constituents. Optimize the consituent experience on the web site to improve customer experience – what have they done before, highlight services based on who, what they have done in the pastAM – SecurityPR – Group of users to sort and filter informationSA – Tailoring it for them