SlideShare a Scribd company logo
1 of 22
A Subject Matter Expertise and evangelist focused on the introduction of leading edge technologies to support Identity, Authe ntication & Payments
A World of Connected Objects
Designed to Serve Us
Philip Andreae
Philip@Andreae.com
10 October 2017
Identity
12 October 2017 A World of Connected Objects ©2017 2
Authentication
12 October 2017 A World of Connected Objects ©2017 3
Identification
12 October 2017 A World of Connected Objects ©2017 4
Authorization
12 October 2017 A World of Connected Objects ©2017 5
Four Words
Independent and Inseparable
12 October 2017 A World of Connected Objects ©2017 6
Privacy
12 October 2017 A World of Connected Objects ©2017 7
Security
12 October 2017 A World of Connected Objects ©2017 8
Confidentiality
12 October 2017 A World of Connected Objects ©2017 9
Three Concerns
Lost as we engage and leave tracks
12 October 2017 A World of Connected Objects ©2017 10
We Live in a Age of Connected Things
12 October 2017 A World of Connected Objects ©2017 11
1976
1982
1990
2000
2012
With A Need To Enhanced Digital Security
To Protect Our Daily Life
12 October 2017 A World of Connected Objects
In 1993 six people from three payment schemes met at
Hotel at O’Hare airport and agreed to work together to
defined a common set of requirements and subsequently
published “The Integrated Circuit Card
Specifications for Payment Systems”
The goal Global Interoperability allowing each region and
nation to decide when to migrate from Magnetic Stripe to
the EMV Standard
EMVCo is owned & staffed by Visa, MasterCard, JCB, American Express, UnionPay and Discover
Lost and Stolen Fraud
Cardholder Verification
Revenue Creation
Value Added Services
Counterfeit Protection
Off/On-line Authentication
Offline Authorization
Cost Reduction
12 October 2017 A World of Connected Objects
Digital Identity in a Digital World is a Challenge
©2017 13
The Internet at the MOMA The New Yorker
• FIDO is the World’s Largest Ecosystem
for Standards-Based, Interoperable
Authentication
• Better security for online services
• Reduced cost for the enterprise
• Simpler and safer for consumers
• Deploy Your Online Authentication Using
Open and Scalable Standards
• The specifications and certifications from
the FIDO Alliance enable an interoperable
ecosystem of hardware-, mobile- and
biometrics-based authenticators that can be
used with many apps and websites.
• This ecosystem enables enterprises and
service providers to deploy strong
authentication solutions that reduce reliance
on passwords and protect against phishing,
man-in-the-middle and replay attacks using
stolen passwords.
A World of Connected Objects
Modern Authentication For A Connected World
• The mission of the FIDO Alliance is to
change the nature of online
authentication by:
• Developing technical specifications that
define an open, scalable, interoperable set
of mechanisms that reduce the reliance on
passwords to authenticate users.
• Operating industry programs to help
ensure successful worldwide adoption of
the Specifications.
• Submitting mature technical
Specification(s) to recognized standards
development organization(s) for formal
standardization.
1412 October 2017
The Key to Digital Security
12 October 2017 A World of Connected Objects
Multi-Factor Authentication
 Something You Have  The Token = Card/Phone
 Something You Know  The Secret = PIN/Password
 Something You Are  Biometric = You
EMV, PIV, ICAO, eID, FIDO … Exploit
The security of hardware
The flexibility of software
The power of cryptography
What Can We Do With IoT
12 October 2017 A World of Connected Objects ©2017 16
Measure
Meter
Collect
Control
Integrate into our Homes
Manage City Infrastructure
Enhance Healthcare
Automate Factories
Control Automobiles
Enhance the
Consumer Experience
Stimulate
Manipulate
Support
Connected
Commerce
Pay
The World of Objects and Things is Exploding
We must
Identify and Authenticate
these objects we are
being surrounded by
Or else, someone else will
Wired / Fixed Wireless / Mobile
132m
PCs sold in 2000
1.3Bn
smartphones shipped in 2014
10s of Billions
Of connected objects will exist
in the year 2025
12 October 2017
7
A World of Connected Objects
•Denial of Service
•Phishing
•Vishing
•Hacking
•Counterfeiting
•Stealing
•Terrorizing
• Google
• Sony
• Target
• Office of Personal Management
• Equifax
• Democratic National Committee
• And so many more
Wikipedia lists 244
A limited publicly acquired sample
https://en.wikipedia.org/wiki/List_of_data_breaches
To amplify the concern a head line
March 15, 2017 read
312 and counting data
breaches, in 2017, report
https://www.scmagazine.com/report-finds-more-
than-312-data-breaches-this-year/article/644421/
12 October 2017 A World of Connected Objects
The Good, The Bad and The Evil
National Defense, Criminals & State Actors and Terrorists
©2017 18
• Cryptography, be it symmetric or
asymmetric, requires a “secret”
• Local biometric matching please!
Assuring our security & privacy
• Securing these secrets is essential
• Yet the places they can be stored
differ in capabilities
• Embedded Secure Elements
• Trusted Execution Environments
• Trusted Processing Modules
• White Box Encryption
Only With
Standards & Certified Solutions
Can We Assure
Interoperability & Proliferation
12 October 2017 A World of Connected Objects
How Do We Get From Here to Tomorrow
Connect objects need to be
connected somehow
19
Source McKinsey
2008
2012
2018
2026
2036
A Future of Connected Things Driven By
12 October 2017 A World of Connected Objects ©2017 20
Machine learning
Natural Language Interfaces
Artificial Intelligence
12 October 2017 A World of Connected Objects ©2017 21
A World of Connected Objects12 October 2017 22
Philip Andreae
Principal
Philip@Andreae.com
www.andreae.com
+1 404 680 9640
www.linkedin.com/in/pandreae www.twitter.com/pandreae

More Related Content

What's hot

DWS16 - Connected things forum - David Vasquez, Verizon Enterprise Solutions
DWS16 - Connected things forum - David Vasquez, Verizon Enterprise SolutionsDWS16 - Connected things forum - David Vasquez, Verizon Enterprise Solutions
DWS16 - Connected things forum - David Vasquez, Verizon Enterprise SolutionsIDATE DigiWorld
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018UNLOQ
 
Tom Loosemore 11.12.2015 - Muotoiluagentit ja Muutoksentekijät
Tom Loosemore 11.12.2015 - Muotoiluagentit ja MuutoksentekijätTom Loosemore 11.12.2015 - Muotoiluagentit ja Muutoksentekijät
Tom Loosemore 11.12.2015 - Muotoiluagentit ja MuutoksentekijätToimivakaupunki
 
Consensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructureConsensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructureBlockchain Council
 
Internet of Things - Disrupting Industries and Society
Internet of Things  - Disrupting Industries and SocietyInternet of Things  - Disrupting Industries and Society
Internet of Things - Disrupting Industries and SocietyCMS IT SERVICES (Admin)
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackAlex Ortiz
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
DWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsDWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsIDATE DigiWorld
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data scienceDinis Cruz
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyDinis Cruz
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossKristian Foss
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Block chain 2019
Block chain 2019 Block chain 2019
Block chain 2019 VikashJ3
 
Introduction to TechRiot - Innosphere
Introduction to TechRiot - InnosphereIntroduction to TechRiot - Innosphere
Introduction to TechRiot - InnosphereMatthew Bailey
 

What's hot (18)

DWS16 - Connected things forum - David Vasquez, Verizon Enterprise Solutions
DWS16 - Connected things forum - David Vasquez, Verizon Enterprise SolutionsDWS16 - Connected things forum - David Vasquez, Verizon Enterprise Solutions
DWS16 - Connected things forum - David Vasquez, Verizon Enterprise Solutions
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018
 
Tom Loosemore 11.12.2015 - Muotoiluagentit ja Muutoksentekijät
Tom Loosemore 11.12.2015 - Muotoiluagentit ja MuutoksentekijätTom Loosemore 11.12.2015 - Muotoiluagentit ja Muutoksentekijät
Tom Loosemore 11.12.2015 - Muotoiluagentit ja Muutoksentekijät
 
Consensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructureConsensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructure
 
Internet of Things - Disrupting Industries and Society
Internet of Things  - Disrupting Industries and SocietyInternet of Things  - Disrupting Industries and Society
Internet of Things - Disrupting Industries and Society
 
BIS BUCHHOLZ
BIS BUCHHOLZBIS BUCHHOLZ
BIS BUCHHOLZ
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
DWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsDWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung Electronics
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data science
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and Strategy
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian Foss
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Block chain 2019
Block chain 2019 Block chain 2019
Block chain 2019
 
Introduction to TechRiot - Innosphere
Introduction to TechRiot - InnosphereIntroduction to TechRiot - Innosphere
Introduction to TechRiot - Innosphere
 

Similar to A world of connected object Designed to Serve Us

CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...
CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...
CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...Capgemini
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4rAVe [PUBS]
 
#Blockchain - ISG Digital Business Summit 2017 - AP Manders
#Blockchain - ISG Digital Business Summit 2017 - AP Manders#Blockchain - ISG Digital Business Summit 2017 - AP Manders
#Blockchain - ISG Digital Business Summit 2017 - AP MandersAlex Manders
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain3G4G
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
Data, Chinese Ants and how Alibaba Became the World’s Largest Retailer
Data, Chinese Ants and how Alibaba Became the World’s Largest RetailerData, Chinese Ants and how Alibaba Became the World’s Largest Retailer
Data, Chinese Ants and how Alibaba Became the World’s Largest RetailerNick Smith
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation CenterForgeRock
 
Interconnect with Ecosystems and Things- AWS Summit SG 2017
Interconnect with Ecosystems and Things- AWS Summit SG 2017Interconnect with Ecosystems and Things- AWS Summit SG 2017
Interconnect with Ecosystems and Things- AWS Summit SG 2017Amazon Web Services
 
Data & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customersData & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customersNick Smith
 
E magazine january 2017
E  magazine january 2017E  magazine january 2017
E magazine january 2017VARINDIA
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsDelphix
 
Identity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike EllisIdentity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike EllisForgeRock
 
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Denodo
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainMatteo Masi
 

Similar to A world of connected object Designed to Serve Us (20)

CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...
CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...
CWIN17 san francisco-sf couchbase accelerate innovation and revolutionize cus...
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4
 
#Blockchain - ISG Digital Business Summit 2017 - AP Manders
#Blockchain - ISG Digital Business Summit 2017 - AP Manders#Blockchain - ISG Digital Business Summit 2017 - AP Manders
#Blockchain - ISG Digital Business Summit 2017 - AP Manders
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
Data, Chinese Ants and how Alibaba Became the World’s Largest Retailer
Data, Chinese Ants and how Alibaba Became the World’s Largest RetailerData, Chinese Ants and how Alibaba Became the World’s Largest Retailer
Data, Chinese Ants and how Alibaba Became the World’s Largest Retailer
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Interconnect with Ecosystems and Things- AWS Summit SG 2017
Interconnect with Ecosystems and Things- AWS Summit SG 2017Interconnect with Ecosystems and Things- AWS Summit SG 2017
Interconnect with Ecosystems and Things- AWS Summit SG 2017
 
Data & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customersData & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customers
 
E magazine january 2017
E  magazine january 2017E  magazine january 2017
E magazine january 2017
 
Australian Payments Network - Digital Identity
Australian Payments Network  - Digital Identity Australian Payments Network  - Digital Identity
Australian Payments Network - Digital Identity
 
Brainstorm:KC 2016
Brainstorm:KC 2016Brainstorm:KC 2016
Brainstorm:KC 2016
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
 
Identity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike EllisIdentity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike Ellis
 
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & Blockchain
 

More from Philip Andreae

Payment and Telecommunications
Payment and TelecommunicationsPayment and Telecommunications
Payment and TelecommunicationsPhilip Andreae
 
Day two - An in-depth review of European Card Payments circa 1998
Day two - An in-depth review of European Card Payments circa 1998 Day two - An in-depth review of European Card Payments circa 1998
Day two - An in-depth review of European Card Payments circa 1998 Philip Andreae
 
Day one - An in-depth review or European Card Payments circa 1998
Day one - An in-depth review or European Card Payments circa 1998Day one - An in-depth review or European Card Payments circa 1998
Day one - An in-depth review or European Card Payments circa 1998Philip Andreae
 
Toronto was looking at Fare collection circa 2004
Toronto was looking at Fare collection circa 2004Toronto was looking at Fare collection circa 2004
Toronto was looking at Fare collection circa 2004Philip Andreae
 

More from Philip Andreae (6)

What is A Smart Card
What is A Smart CardWhat is A Smart Card
What is A Smart Card
 
Payment and Telecommunications
Payment and TelecommunicationsPayment and Telecommunications
Payment and Telecommunications
 
Day two - An in-depth review of European Card Payments circa 1998
Day two - An in-depth review of European Card Payments circa 1998 Day two - An in-depth review of European Card Payments circa 1998
Day two - An in-depth review of European Card Payments circa 1998
 
Day one - An in-depth review or European Card Payments circa 1998
Day one - An in-depth review or European Card Payments circa 1998Day one - An in-depth review or European Card Payments circa 1998
Day one - An in-depth review or European Card Payments circa 1998
 
Toronto was looking at Fare collection circa 2004
Toronto was looking at Fare collection circa 2004Toronto was looking at Fare collection circa 2004
Toronto was looking at Fare collection circa 2004
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 

Recently uploaded

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (11)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

A world of connected object Designed to Serve Us

  • 1. A Subject Matter Expertise and evangelist focused on the introduction of leading edge technologies to support Identity, Authe ntication & Payments A World of Connected Objects Designed to Serve Us Philip Andreae Philip@Andreae.com 10 October 2017
  • 2. Identity 12 October 2017 A World of Connected Objects ©2017 2
  • 3. Authentication 12 October 2017 A World of Connected Objects ©2017 3
  • 4. Identification 12 October 2017 A World of Connected Objects ©2017 4
  • 5. Authorization 12 October 2017 A World of Connected Objects ©2017 5
  • 6. Four Words Independent and Inseparable 12 October 2017 A World of Connected Objects ©2017 6
  • 7. Privacy 12 October 2017 A World of Connected Objects ©2017 7
  • 8. Security 12 October 2017 A World of Connected Objects ©2017 8
  • 9. Confidentiality 12 October 2017 A World of Connected Objects ©2017 9
  • 10. Three Concerns Lost as we engage and leave tracks 12 October 2017 A World of Connected Objects ©2017 10
  • 11. We Live in a Age of Connected Things 12 October 2017 A World of Connected Objects ©2017 11 1976 1982 1990 2000 2012
  • 12. With A Need To Enhanced Digital Security To Protect Our Daily Life 12 October 2017 A World of Connected Objects In 1993 six people from three payment schemes met at Hotel at O’Hare airport and agreed to work together to defined a common set of requirements and subsequently published “The Integrated Circuit Card Specifications for Payment Systems” The goal Global Interoperability allowing each region and nation to decide when to migrate from Magnetic Stripe to the EMV Standard EMVCo is owned & staffed by Visa, MasterCard, JCB, American Express, UnionPay and Discover Lost and Stolen Fraud Cardholder Verification Revenue Creation Value Added Services Counterfeit Protection Off/On-line Authentication Offline Authorization Cost Reduction
  • 13. 12 October 2017 A World of Connected Objects Digital Identity in a Digital World is a Challenge ©2017 13 The Internet at the MOMA The New Yorker
  • 14. • FIDO is the World’s Largest Ecosystem for Standards-Based, Interoperable Authentication • Better security for online services • Reduced cost for the enterprise • Simpler and safer for consumers • Deploy Your Online Authentication Using Open and Scalable Standards • The specifications and certifications from the FIDO Alliance enable an interoperable ecosystem of hardware-, mobile- and biometrics-based authenticators that can be used with many apps and websites. • This ecosystem enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle and replay attacks using stolen passwords. A World of Connected Objects Modern Authentication For A Connected World • The mission of the FIDO Alliance is to change the nature of online authentication by: • Developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users. • Operating industry programs to help ensure successful worldwide adoption of the Specifications. • Submitting mature technical Specification(s) to recognized standards development organization(s) for formal standardization. 1412 October 2017
  • 15. The Key to Digital Security 12 October 2017 A World of Connected Objects Multi-Factor Authentication  Something You Have  The Token = Card/Phone  Something You Know  The Secret = PIN/Password  Something You Are  Biometric = You EMV, PIV, ICAO, eID, FIDO … Exploit The security of hardware The flexibility of software The power of cryptography
  • 16. What Can We Do With IoT 12 October 2017 A World of Connected Objects ©2017 16 Measure Meter Collect Control Integrate into our Homes Manage City Infrastructure Enhance Healthcare Automate Factories Control Automobiles Enhance the Consumer Experience Stimulate Manipulate Support Connected Commerce Pay
  • 17. The World of Objects and Things is Exploding We must Identify and Authenticate these objects we are being surrounded by Or else, someone else will Wired / Fixed Wireless / Mobile 132m PCs sold in 2000 1.3Bn smartphones shipped in 2014 10s of Billions Of connected objects will exist in the year 2025 12 October 2017 7 A World of Connected Objects
  • 18. •Denial of Service •Phishing •Vishing •Hacking •Counterfeiting •Stealing •Terrorizing • Google • Sony • Target • Office of Personal Management • Equifax • Democratic National Committee • And so many more Wikipedia lists 244 A limited publicly acquired sample https://en.wikipedia.org/wiki/List_of_data_breaches To amplify the concern a head line March 15, 2017 read 312 and counting data breaches, in 2017, report https://www.scmagazine.com/report-finds-more- than-312-data-breaches-this-year/article/644421/ 12 October 2017 A World of Connected Objects The Good, The Bad and The Evil National Defense, Criminals & State Actors and Terrorists ©2017 18
  • 19. • Cryptography, be it symmetric or asymmetric, requires a “secret” • Local biometric matching please! Assuring our security & privacy • Securing these secrets is essential • Yet the places they can be stored differ in capabilities • Embedded Secure Elements • Trusted Execution Environments • Trusted Processing Modules • White Box Encryption Only With Standards & Certified Solutions Can We Assure Interoperability & Proliferation 12 October 2017 A World of Connected Objects How Do We Get From Here to Tomorrow Connect objects need to be connected somehow 19 Source McKinsey
  • 20. 2008 2012 2018 2026 2036 A Future of Connected Things Driven By 12 October 2017 A World of Connected Objects ©2017 20 Machine learning Natural Language Interfaces Artificial Intelligence
  • 21. 12 October 2017 A World of Connected Objects ©2017 21
  • 22. A World of Connected Objects12 October 2017 22 Philip Andreae Principal Philip@Andreae.com www.andreae.com +1 404 680 9640 www.linkedin.com/in/pandreae www.twitter.com/pandreae

Editor's Notes

  1. 2017-10-12