SlideShare a Scribd company logo
1 of 27
Download to read offline
A QUESTION OF
SCALE
Mapping Authentication to the
Modern Computing Ecosystem
1
Rajiv Dholakia
VP Products, Nok Nok Labs
THE HUMBLE IGNITION KEY
NOK NOK LABS 2
THINGS ARE CHANGING
NOK NOK LABS 3
First Steps Next Steps
Sony 77 M
Evernote 60 M
Rockyou 32 M
LinkedIn 6.5 M
Yahoo 450 K
Twitter 56 K
Attacks
Apple
Evernote
Facebook
Twitter
Google
?
Convenience, Security,
Personalization
AKEYINSIGHT– GATEWAYTO USER EXPERIENCE
ABOUTDESIGN, DELIGHT& DOLLARS (ALSORISK,REGULATION&REPUTATION)
NOK NOK LABS
Authentication
is the
“Ignition Key”
4
USERS
FRUSTRATED
•  25 ACCOUNTS
•  8 LOGINS / DAY
•  6.5 PASSWORDS
ORGANIZATIONS
OVERWHELMED
•  $7.2M / DATA BREACH
•  $15 / PASSWORD RESET
•  $50-120+ / TOKEN
ECOSYSTEMS
INHIBITED
•  FRAGMENTED
•  INFLEXIBLE
•  FRICTION EVERYWHERE
HOWARE WE DOING?
NOK NOK LABS 5
THEAUTHENTICATION TOWER OF BABEL
Silos, proprietary, privacy, reliance on 3rd party, tolls
NOK NOK LABS
?
6
IMPLEMENTATION CHALLENGE
APLUMBINGPROBLEM:SHADESOFRUBEGOLDBERG…
NOK NOK LABS
App 2
New
App
?	
  
RP 1
RP 1
App 1
?
Applications Authentication MethodsOrganizations
Silo 1
Silo 2
Silo N
Silo 3
7
THE RESULTING REALITY
“AUTHENTICATION IS … EXPENSIVE TO
IMPLEMENT,
IT'S HARD TO USE, IT'S TOO EASYTO SUBVERT
OR CIRCUMVENTAND IT FAILS MOREAND
MORE FREQUENTLY,AND MOREAND MORE
SPECTACULARLY IN TODAY'S INCREASINGLY
RISKY ELECTRONIC ENVIRONMENT.”
GARTNER:MAVERICKTECHNOLOGY
NOK NOK LABS 8
MENTALFLOSS–AUTOMATABYJOHNLUMBUS*
9
*Cabaret	
  Mechanical	
  Theater	
  –	
  UK	
  (h5p://cabaret.co.uk)	
  	
  	
  
DESIGN CONSIDERATIONS…
10NOK NOK LABS
TODAY’S WORLD:
DIVERSE, DISTRIBUTED, DYNAMIC
NOK NOK LABS
75% OF THE DIGITAL
UNIVERSE CREATED,
CAPTURED OR
REPLICATED
IN THE CLOUD
3.1 TRILLION HARD DRIVES
WORTH OF DATA CONSUMED
DAILY IN THE US
US ECOMMERCE
PROJECTED AT $325BN BY
2015
No single solution will work across all use cases
1.8 BN MOBILE PHONES/YEAR
200 MN TABLETS/YEAR
11
PONEMAN-NNL RESEARCH
NOK NOK LABS 12
•  New & exclusive research,
featuring 1,924 consumers:
•  US:
754
•  UK: 569
•  Germany: 601
•  Covers experiences, perceptions
& preferences for identity and
authentication technology
•  First annual report, covering
trends, perceptions and attitudes
to online authentication
•  Research undertaken by the
Ponemon Institute & sponsored
by Nok Nok Labs, Inc.
PONEMAN-NOK NOK STUDY
DIVERSITYRULESINEND-USERCOMMUNITIES–PROMISEINMOBILE
NOK NOK LABS
13
RETIRING PASSWORDS
Iden%ty	
  Services	
  
A SYSTEMS PROBLEM (not technology)
Physical-­‐to-­‐Digital	
  Iden%ty	
  	
  
User	
  Management	
  	
  
Authen%ca%on	
  
Federa%on	
  
	
  
	
  Single
Sign-On
14
THE OTHER HALF OF THE EQUATION
NOK NOK LABS 15
STRONG AUTH
PASSWORDS
SSO/FEDERATION
Recreated PMS
First Mile Second Mile
SAML
OpenID
APEEK INTO MODERNAUTHENTICATION
PRIVATE & CONFIDENTIAL 16NOK NOK LABS
IMPLICIT
AUTHENTICATION
EXPLICIT
AUTHENTICATION
THE ONLY WAY TO WINAGAINST
MALWARE – SECURE HARDWARE
NOK NOK LABS
User Space
Secure
Hardware
Auth SDK
UX Layer
Input, Display
Crypto Layer
Auth SDK
UX Layer
Input, Display
Crypto Layer
Auth SDK
Crypto Layer
UX Layer
Input, Display
No Secure HW Secure Crypto
+
Storage
Secure
Execution
Environment
SOLUTIONPATTERNS–WHICHWILLPREVAIL?
18
User-Centric
“Trust-Me-Me-Me”
Relationship-Centric
Regulation-Centric
Towards	
  Solu%ons	
  &	
  	
  
Building	
  Blocks	
  
19
THE REALITY
AUTHENTICATION that’s...
NOK NOK LABS
SIMPLE
STRONG
20
Aspirational Goal
ADDRESS USABILITY & DIVERSITY
21NOK NOK LABS
Usability Usage
•  No passwords
•  Existing devices
•  Flexible authentication
•  Engagement
•  Completed transactions
•  Security compliance
Drives	
  
Aspirational Goal
UNIFIED STANDARDS &AUTHENTICATIONAGILITY
NOK NOK LABS
ANYDEVICE.ANYAPPLICATION.ANYAUTHENTICATOR.
App 2
Applications Authentication Methods
RP 1
RP 1
App 1
New
App
UNIFIED STANDARDS
Organizations
?
22
Aspirational Goal
EFFORTS UNDERWAY
• Platform specific efforts (Microsoft,Apple,Android…)
• Secure Silicon Efforts
- TCG-TPM(TrustedComputingGroup)
- IntelIPT(IdentityProtectionTechnology)
- SecureElement(GlobalPlatform)
- Others…
• New and Noteworthy:
- Trusted Execution Environment (Global Platform)
- The FIDO (Fast Identity Online)Alliance
23NOK NOK LABS
GOAL: SIMPLER, STRONGER AUTH
INTERNETSERVICES COMPONENT&DEVICEVENDORS SOFTWARE&STACKS
KEY IDEAS BEHIND FIDO
• Leverage simple but strong local authentication
- User authenticates locally to Client Device
- Device authenticates to the Server
• Focus of Standardization:
- “Pluggable” local authentication (USB, Biometrics,TPM/Pin…)
interfaces
- The online crypto protocols used to authenticate to the server
• Allow business appropriate and risk appropriate choice
http://www.fidoalliance.org
TAKEAWAYS FROM THIS TALK
1.  Authentication is the “Ignition Key” to design, delight, & dollars
2.  Passwords don’t scale up (to the cloud) or down (to mobile
devices) – a system solution is needed
3.  Diversity & heterogeneity will rule…no one size fits all
4.  Authentication is the “first mile”, Federation is the “second mile”
5.  ModernAuthentication = Explicit + Implicit
6.  Competing solution patterns – pick carefully
7.  Get involved:
•  Advocateforstandardsasbuildingblocks–thinkofwhatSSLdidforyou
•  Educateyourselfaboutemergingauthenticationtechnology
•  Re-thinkyourauthenticationstrategy
•  Pilotsomeoftheemergingtechnology
26
FOR MORE INFORMATION
NOK NOK LABS
•  FIDO	
  alliance	
  
•  	
  An	
  alliance	
  to	
  simplify	
  authen%ca%on	
  
•  hEp://www.fidoalliance.org	
  
•  Global	
  PlaLorm	
  
•  hEp://www.globalplaLorm.org	
  	
  
•  Nok	
  Nok	
  Labs	
  –	
  pioneering	
  FIDO	
  standards	
  implementa%ons	
  
•  Brainstorm,	
  Demonstra%on,	
  Evalua%on,	
  Webinar	
  
•  Poneman-­‐Nok	
  Nok	
  Labs	
  Report	
  
•  rajiv@noknok.com	
  or	
  info@noknok.com	
  	
  
•  hEp://www.noknok.com	
  
	
  
27

More Related Content

Similar to CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem

AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...
AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...
AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...Lucas Jellema
 
Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...
Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...
Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...Lucas Jellema
 
C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...
C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...
C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...DataStax Academy
 
Cloud Native Application Development-build fast, low TCO, scalable & agile so...
Cloud Native Application Development-build fast, low TCO, scalable & agile so...Cloud Native Application Development-build fast, low TCO, scalable & agile so...
Cloud Native Application Development-build fast, low TCO, scalable & agile so...Lucas Jellema
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
Take an Analytics-driven Approach to Container Performance with Splunk for Co...
Take an Analytics-driven Approach to Container Performance with Splunk for Co...Take an Analytics-driven Approach to Container Performance with Splunk for Co...
Take an Analytics-driven Approach to Container Performance with Splunk for Co...Docker, Inc.
 
Ruben rodriguez best practices implementing oracle mobile cloud service
Ruben rodriguez   best practices implementing oracle mobile cloud serviceRuben rodriguez   best practices implementing oracle mobile cloud service
Ruben rodriguez best practices implementing oracle mobile cloud serviceRuben Rodriguez
 
Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...James DeLuccia IV
 
[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...
[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...
[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...Insight Technology, Inc.
 
SAP (in)security: New and best
SAP (in)security: New and bestSAP (in)security: New and best
SAP (in)security: New and bestERPScan
 
Blockchain, Integration, Serverless, Microservices - OOW / Code One 2018 Review
Blockchain, Integration, Serverless, Microservices - OOW / Code One 2018 ReviewBlockchain, Integration, Serverless, Microservices - OOW / Code One 2018 Review
Blockchain, Integration, Serverless, Microservices - OOW / Code One 2018 ReviewRobert van Mölken
 
What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...
What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...
What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...Lucas Jellema
 
KoprowskiT_SQLAzureLandingInBelfast
KoprowskiT_SQLAzureLandingInBelfastKoprowskiT_SQLAzureLandingInBelfast
KoprowskiT_SQLAzureLandingInBelfastTobias Koprowski
 
8base Hyperledger Miami Meetup Presentation
8base Hyperledger Miami Meetup Presentation8base Hyperledger Miami Meetup Presentation
8base Hyperledger Miami Meetup Presentation8base
 
8base Hyperledger Miami Meetup 20180719
8base Hyperledger Miami Meetup 201807198base Hyperledger Miami Meetup 20180719
8base Hyperledger Miami Meetup 20180719Oscar Perez
 
What's new in Elasticsearch v5
What's new in Elasticsearch v5What's new in Elasticsearch v5
What's new in Elasticsearch v5Idan Tohami
 
Live Coding a KSQL Application
Live Coding a KSQL ApplicationLive Coding a KSQL Application
Live Coding a KSQL Applicationconfluent
 

Similar to CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem (20)

AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
 
AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...
AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...
AMIS Oracle OpenWorld & CodeOne Review - Pillar 1 - Cloud Infrastructure (5 n...
 
Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...
Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...
Implementing Microservices on Oracle Cloud: Open, Manageable, Polyglot, and S...
 
C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...
C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...
C* Summit 2013: Real-time Analytics using Cassandra, Spark and Shark by Evan ...
 
Cloud Native Application Development-build fast, low TCO, scalable & agile so...
Cloud Native Application Development-build fast, low TCO, scalable & agile so...Cloud Native Application Development-build fast, low TCO, scalable & agile so...
Cloud Native Application Development-build fast, low TCO, scalable & agile so...
 
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
Take an Analytics-driven Approach to Container Performance with Splunk for Co...
Take an Analytics-driven Approach to Container Performance with Splunk for Co...Take an Analytics-driven Approach to Container Performance with Splunk for Co...
Take an Analytics-driven Approach to Container Performance with Splunk for Co...
 
Ruben rodriguez best practices implementing oracle mobile cloud service
Ruben rodriguez   best practices implementing oracle mobile cloud serviceRuben rodriguez   best practices implementing oracle mobile cloud service
Ruben rodriguez best practices implementing oracle mobile cloud service
 
Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...
 
[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...
[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...
[db tech showcase Tokyo 2018] #dbts2018 #B23 『Python, Oracle Cloud, Blockchai...
 
SAP (in)security: New and best
SAP (in)security: New and bestSAP (in)security: New and best
SAP (in)security: New and best
 
Blockchain, Integration, Serverless, Microservices - OOW / Code One 2018 Review
Blockchain, Integration, Serverless, Microservices - OOW / Code One 2018 ReviewBlockchain, Integration, Serverless, Microservices - OOW / Code One 2018 Review
Blockchain, Integration, Serverless, Microservices - OOW / Code One 2018 Review
 
What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...
What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...
What is the Oracle PaaS Cloud for Developers (Oracle Cloud Day, The Netherlan...
 
KoprowskiT_SQLAzureLandingInBelfast
KoprowskiT_SQLAzureLandingInBelfastKoprowskiT_SQLAzureLandingInBelfast
KoprowskiT_SQLAzureLandingInBelfast
 
8base Hyperledger Miami Meetup Presentation
8base Hyperledger Miami Meetup Presentation8base Hyperledger Miami Meetup Presentation
8base Hyperledger Miami Meetup Presentation
 
8base Hyperledger Miami Meetup 20180719
8base Hyperledger Miami Meetup 201807198base Hyperledger Miami Meetup 20180719
8base Hyperledger Miami Meetup 20180719
 
OpenStack Summit Austin 2016 v1.3
OpenStack Summit Austin 2016 v1.3 OpenStack Summit Austin 2016 v1.3
OpenStack Summit Austin 2016 v1.3
 
What's new in Elasticsearch v5
What's new in Elasticsearch v5What's new in Elasticsearch v5
What's new in Elasticsearch v5
 
Live Coding a KSQL Application
Live Coding a KSQL ApplicationLive Coding a KSQL Application
Live Coding a KSQL Application
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem

  • 1. A QUESTION OF SCALE Mapping Authentication to the Modern Computing Ecosystem 1 Rajiv Dholakia VP Products, Nok Nok Labs
  • 2. THE HUMBLE IGNITION KEY NOK NOK LABS 2
  • 3. THINGS ARE CHANGING NOK NOK LABS 3 First Steps Next Steps Sony 77 M Evernote 60 M Rockyou 32 M LinkedIn 6.5 M Yahoo 450 K Twitter 56 K Attacks Apple Evernote Facebook Twitter Google ? Convenience, Security, Personalization
  • 4. AKEYINSIGHT– GATEWAYTO USER EXPERIENCE ABOUTDESIGN, DELIGHT& DOLLARS (ALSORISK,REGULATION&REPUTATION) NOK NOK LABS Authentication is the “Ignition Key” 4
  • 5. USERS FRUSTRATED •  25 ACCOUNTS •  8 LOGINS / DAY •  6.5 PASSWORDS ORGANIZATIONS OVERWHELMED •  $7.2M / DATA BREACH •  $15 / PASSWORD RESET •  $50-120+ / TOKEN ECOSYSTEMS INHIBITED •  FRAGMENTED •  INFLEXIBLE •  FRICTION EVERYWHERE HOWARE WE DOING? NOK NOK LABS 5
  • 6. THEAUTHENTICATION TOWER OF BABEL Silos, proprietary, privacy, reliance on 3rd party, tolls NOK NOK LABS ? 6
  • 7. IMPLEMENTATION CHALLENGE APLUMBINGPROBLEM:SHADESOFRUBEGOLDBERG… NOK NOK LABS App 2 New App ?   RP 1 RP 1 App 1 ? Applications Authentication MethodsOrganizations Silo 1 Silo 2 Silo N Silo 3 7
  • 8. THE RESULTING REALITY “AUTHENTICATION IS … EXPENSIVE TO IMPLEMENT, IT'S HARD TO USE, IT'S TOO EASYTO SUBVERT OR CIRCUMVENTAND IT FAILS MOREAND MORE FREQUENTLY,AND MOREAND MORE SPECTACULARLY IN TODAY'S INCREASINGLY RISKY ELECTRONIC ENVIRONMENT.” GARTNER:MAVERICKTECHNOLOGY NOK NOK LABS 8
  • 9. MENTALFLOSS–AUTOMATABYJOHNLUMBUS* 9 *Cabaret  Mechanical  Theater  –  UK  (h5p://cabaret.co.uk)      
  • 11. TODAY’S WORLD: DIVERSE, DISTRIBUTED, DYNAMIC NOK NOK LABS 75% OF THE DIGITAL UNIVERSE CREATED, CAPTURED OR REPLICATED IN THE CLOUD 3.1 TRILLION HARD DRIVES WORTH OF DATA CONSUMED DAILY IN THE US US ECOMMERCE PROJECTED AT $325BN BY 2015 No single solution will work across all use cases 1.8 BN MOBILE PHONES/YEAR 200 MN TABLETS/YEAR 11
  • 12. PONEMAN-NNL RESEARCH NOK NOK LABS 12 •  New & exclusive research, featuring 1,924 consumers: •  US: 754 •  UK: 569 •  Germany: 601 •  Covers experiences, perceptions & preferences for identity and authentication technology •  First annual report, covering trends, perceptions and attitudes to online authentication •  Research undertaken by the Ponemon Institute & sponsored by Nok Nok Labs, Inc.
  • 14. RETIRING PASSWORDS Iden%ty  Services   A SYSTEMS PROBLEM (not technology) Physical-­‐to-­‐Digital  Iden%ty     User  Management     Authen%ca%on   Federa%on      Single Sign-On 14
  • 15. THE OTHER HALF OF THE EQUATION NOK NOK LABS 15 STRONG AUTH PASSWORDS SSO/FEDERATION Recreated PMS First Mile Second Mile SAML OpenID
  • 16. APEEK INTO MODERNAUTHENTICATION PRIVATE & CONFIDENTIAL 16NOK NOK LABS IMPLICIT AUTHENTICATION EXPLICIT AUTHENTICATION
  • 17. THE ONLY WAY TO WINAGAINST MALWARE – SECURE HARDWARE NOK NOK LABS User Space Secure Hardware Auth SDK UX Layer Input, Display Crypto Layer Auth SDK UX Layer Input, Display Crypto Layer Auth SDK Crypto Layer UX Layer Input, Display No Secure HW Secure Crypto + Storage Secure Execution Environment
  • 19. Towards  Solu%ons  &     Building  Blocks   19
  • 20. THE REALITY AUTHENTICATION that’s... NOK NOK LABS SIMPLE STRONG 20 Aspirational Goal
  • 21. ADDRESS USABILITY & DIVERSITY 21NOK NOK LABS Usability Usage •  No passwords •  Existing devices •  Flexible authentication •  Engagement •  Completed transactions •  Security compliance Drives   Aspirational Goal
  • 22. UNIFIED STANDARDS &AUTHENTICATIONAGILITY NOK NOK LABS ANYDEVICE.ANYAPPLICATION.ANYAUTHENTICATOR. App 2 Applications Authentication Methods RP 1 RP 1 App 1 New App UNIFIED STANDARDS Organizations ? 22 Aspirational Goal
  • 23. EFFORTS UNDERWAY • Platform specific efforts (Microsoft,Apple,Android…) • Secure Silicon Efforts - TCG-TPM(TrustedComputingGroup) - IntelIPT(IdentityProtectionTechnology) - SecureElement(GlobalPlatform) - Others… • New and Noteworthy: - Trusted Execution Environment (Global Platform) - The FIDO (Fast Identity Online)Alliance 23NOK NOK LABS
  • 24. GOAL: SIMPLER, STRONGER AUTH INTERNETSERVICES COMPONENT&DEVICEVENDORS SOFTWARE&STACKS
  • 25. KEY IDEAS BEHIND FIDO • Leverage simple but strong local authentication - User authenticates locally to Client Device - Device authenticates to the Server • Focus of Standardization: - “Pluggable” local authentication (USB, Biometrics,TPM/Pin…) interfaces - The online crypto protocols used to authenticate to the server • Allow business appropriate and risk appropriate choice http://www.fidoalliance.org
  • 26. TAKEAWAYS FROM THIS TALK 1.  Authentication is the “Ignition Key” to design, delight, & dollars 2.  Passwords don’t scale up (to the cloud) or down (to mobile devices) – a system solution is needed 3.  Diversity & heterogeneity will rule…no one size fits all 4.  Authentication is the “first mile”, Federation is the “second mile” 5.  ModernAuthentication = Explicit + Implicit 6.  Competing solution patterns – pick carefully 7.  Get involved: •  Advocateforstandardsasbuildingblocks–thinkofwhatSSLdidforyou •  Educateyourselfaboutemergingauthenticationtechnology •  Re-thinkyourauthenticationstrategy •  Pilotsomeoftheemergingtechnology 26
  • 27. FOR MORE INFORMATION NOK NOK LABS •  FIDO  alliance   •   An  alliance  to  simplify  authen%ca%on   •  hEp://www.fidoalliance.org   •  Global  PlaLorm   •  hEp://www.globalplaLorm.org     •  Nok  Nok  Labs  –  pioneering  FIDO  standards  implementa%ons   •  Brainstorm,  Demonstra%on,  Evalua%on,  Webinar   •  Poneman-­‐Nok  Nok  Labs  Report   •  rajiv@noknok.com  or  info@noknok.com     •  hEp://www.noknok.com     27