SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Bring Your Own Identity (BYOI)
strategies for organizations and their impact
Matthew Ulery
Director of Product Management
Agenda


What is BYOI?



Why do we care about BYOI?



When to allow BYOI?



What are others doing about BYOI?

2

© 2013 NetIQ Corporation. All rights reserved.
What is BYOI?


Bring your own Infrastructure



Bring your own Iron



Bring your own Identity



Bring your own Improv



Bring your own Intoxicant

3

© 2013 NetIQ Corporation. All rights reserved.
Early adopters and providers
BYOI Trends


Social, web resource and retail
─
─
─
─



Social identity providers investing in BYOI
─

4

Use LinkedIn account to access a whitepaper
Use Amazon ID rather than creating a new retail account
Apply to a new job using LinkedIn account
NYC adopting to support constituents
Seeking greater return on their identity validation investment

© 2013 NetIQ Corporation. All rights reserved.
BYOD accelerating BYOI
BYOI Trends


Identity Overload
─
─
─
─
─



Merging of personal device and identity
─
─

5

Average 25 accounts per person and growing
Social Networking
Financial Accounts (bank, payment, entertainment)
Loyalty programs
etc
Collection of business and personal identities
Expect seamless experience from personal device

© 2013 NetIQ Corporation. All rights reserved.
6

© 2013 NetIQ Corporation. All rights reserved.
Why do we care about BYOI?


Cost reduction / avoidance
─



Increase customer / constituent engagement
─
─



Reduce registration abandonment
Enable more personalized experience interactions

Emerging changes in risk
─
─
─

7

Management of identities is expensive

Risk shared with customer/constituent and identity provider
Responsibility to protect customer privacy remains
Privacy risk mitigated by reducing identifiable information

© 2013 NetIQ Corporation. All rights reserved.
Big Question?

Should we allow BYOI?
8

© 2013 NetIQ Corporation. All rights reserved.
Security Concerns
When to allow BYOI?


Strength of authentication
─
─



Strength of identity administration
─
─



How is identity validated for administration?
What is required to issue a password reset?

Compromised identity
─
─

9

Hurdles required to create the identity
Hurdles required to validate the identity

Who is responsible if identity is breached?
How can you revoke access?

© 2013 NetIQ Corporation. All rights reserved.
Different Identity Types
When to allow BYOI?


Customer and constituents
─
─



Privileged users
─
─
─



Employees, partners, contractors, etc.
Significant access to sensitive information & systems
Much greater level of personal identifiable information

Allow BYOI…?
─

10

Limited to no access to sensitive information & systems
Limited amount of personal identifiable information

Must balance risk and value

© 2013 NetIQ Corporation. All rights reserved.
NYC.GOV
BYOI Case Study
• Different

Goals / Desires / Requirements

– Residents
– NYC
– Site

Politicians
admins

Needed a Lightly secured, customer facing portal
11

© 2013 NetIQ Corporation. All rights reserved.
NYC Constituent Experience
BYOI Case Study
Access
Management
requirements

Secure Identity-enabled
Web Services to provide
account info

am.nyc.gov

Public
Resources

Non Identity-based
information and services,
optimized for speed

pub.nyc.gov

www.nyc.gov is a site
composed of information
from other webservices,
secure, public, and semipublic.
12

© 2013 NetIQ Corporation. All rights reserved.

Social
Access
requirements

cf.nyc.gov

Personalized Web
content, requires only
simple consumer
authentication or
NYC.ID
Management of public resources
BYOI Case Study


NYC Tennis Courts
─
─
─



Is this a candidate for BYOI?
─
─
─

13

60,000 permits and tickets, 500 courts
Annual permits ($100)
Scheduling courts a nightmare for NYC and permit holders

Low risk
Lower cost from web scheduling and external identity
Enables external payment collection (i.e. PayPal)

© 2013 NetIQ Corporation. All rights reserved.
Risk of Hacked Identity
Mat Honan, Wired Magazine


Linked many of his accounts
─
─

Social accounts: Twitter, LinkedIn
Personal: Amazon, Gmail



Hackers wanted Twitter handle



Hackers exploited weak link

14

© 2013 NetIQ Corporation. All rights reserved.
Risk of Hacked Identity
Mat Honan, Wired Magazine


“In the space of one hour, my entire digital
life was destroyed.”
─
─

─



15

“First my Google account was taken over, then deleted.”
“Next my Twitter account was compromised, and used as a
platform to broadcast racist and homophobic messages.”
“And worst of all, my AppleID account was broken into, and my
hackers used it to remotely erase all of the data on my iPhone,
iPad, and MacBook?”

“In many ways, this was all my fault. My
accounts were daisy-chained together.”

© 2013 NetIQ Corporation. All rights reserved.
Required no advanced skills
Mat Honan, Wired Magazine


Twitter linked to Gmail account
─
─
─



Resetting Apple account requires
─
─
─



Physical address & last four digits of credit card
Easy to get address
How could they get the credit card information?

Amazon and AppleID accounts linked
─

─
─

16

Google Account recovery page
Gave alternate email: m****n@me.com (hmmmm mhonan)…
Letting them know he had an AppleID

Name and email address needed to add a card to Amazon
Knowing card number allows resetting password
Now they have the credit card number for AppleID

© 2013 NetIQ Corporation. All rights reserved.
Key Take-aways
Balancing Risk and Value


BYOI benefits
─
─
─



BYOI risk assessment
─
─
─



Customers/constituents involved in identity selection
Security of identity beyond your control
Still must protect personal identifiable information

Must balance value against savings
─
─

17

Reduce cost of generating and managing identities
Reduce customer/constituent engagement
Enable more personalized experience interactions

What type of access does it fit?
May not be right for your organization…yet

© 2013 NetIQ Corporation. All rights reserved.
Q&A
matthew.ulery@netiq.com

Weitere ähnliche Inhalte

Was ist angesagt?

The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
nsangary
 

Was ist angesagt? (20)

Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
 
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' PoikolaSelf-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 

Andere mochten auch

CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
Vasu Surabhi
 

Andere mochten auch (11)

BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Enterprise & Web based Federated Identity Management & Data Access Controls
Enterprise & Web based Federated Identity Management & Data Access Controls Enterprise & Web based Federated Identity Management & Data Access Controls
Enterprise & Web based Federated Identity Management & Data Access Controls
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 

Ähnlich wie Bring Your Own Identity

CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
Visa
 
Digital assets ep article february 2015
Digital assets ep article february 2015Digital assets ep article february 2015
Digital assets ep article february 2015
robertpperry
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
eComm2008
 

Ähnlich wie Bring Your Own Identity (20)

Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
Introduction to payments
Introduction to paymentsIntroduction to payments
Introduction to payments
 
Single Sign On IDM Value
Single Sign On IDM ValueSingle Sign On IDM Value
Single Sign On IDM Value
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Topic 9 E entrepreneurship
Topic 9 E entrepreneurshipTopic 9 E entrepreneurship
Topic 9 E entrepreneurship
 
NET 303: Online Policy Primer
NET 303: Online Policy Primer NET 303: Online Policy Primer
NET 303: Online Policy Primer
 
Friendsvow executive summary
Friendsvow executive summaryFriendsvow executive summary
Friendsvow executive summary
 
15 companies you should copy: business models visualised by @boardofinno
15 companies you should copy: business models visualised by @boardofinno15 companies you should copy: business models visualised by @boardofinno
15 companies you should copy: business models visualised by @boardofinno
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Digital assets ep article february 2015
Digital assets ep article february 2015Digital assets ep article february 2015
Digital assets ep article february 2015
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
15 companies famous business models
15 companies famous business models15 companies famous business models
15 companies famous business models
 
Social Media: People First! Visible-Banking.com @ MEFTEC 2009
Social Media: People First! Visible-Banking.com @ MEFTEC 2009Social Media: People First! Visible-Banking.com @ MEFTEC 2009
Social Media: People First! Visible-Banking.com @ MEFTEC 2009
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Agencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital AccessibilityAgencies - Talking to Clients about Digital Accessibility
Agencies - Talking to Clients about Digital Accessibility
 

Mehr von NetIQ

Mehr von NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered Security
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Bring Your Own Identity

  • 1. Bring Your Own Identity (BYOI) strategies for organizations and their impact Matthew Ulery Director of Product Management
  • 2. Agenda  What is BYOI?  Why do we care about BYOI?  When to allow BYOI?  What are others doing about BYOI? 2 © 2013 NetIQ Corporation. All rights reserved.
  • 3. What is BYOI?  Bring your own Infrastructure  Bring your own Iron  Bring your own Identity  Bring your own Improv  Bring your own Intoxicant 3 © 2013 NetIQ Corporation. All rights reserved.
  • 4. Early adopters and providers BYOI Trends  Social, web resource and retail ─ ─ ─ ─  Social identity providers investing in BYOI ─ 4 Use LinkedIn account to access a whitepaper Use Amazon ID rather than creating a new retail account Apply to a new job using LinkedIn account NYC adopting to support constituents Seeking greater return on their identity validation investment © 2013 NetIQ Corporation. All rights reserved.
  • 5. BYOD accelerating BYOI BYOI Trends  Identity Overload ─ ─ ─ ─ ─  Merging of personal device and identity ─ ─ 5 Average 25 accounts per person and growing Social Networking Financial Accounts (bank, payment, entertainment) Loyalty programs etc Collection of business and personal identities Expect seamless experience from personal device © 2013 NetIQ Corporation. All rights reserved.
  • 6. 6 © 2013 NetIQ Corporation. All rights reserved.
  • 7. Why do we care about BYOI?  Cost reduction / avoidance ─  Increase customer / constituent engagement ─ ─  Reduce registration abandonment Enable more personalized experience interactions Emerging changes in risk ─ ─ ─ 7 Management of identities is expensive Risk shared with customer/constituent and identity provider Responsibility to protect customer privacy remains Privacy risk mitigated by reducing identifiable information © 2013 NetIQ Corporation. All rights reserved.
  • 8. Big Question? Should we allow BYOI? 8 © 2013 NetIQ Corporation. All rights reserved.
  • 9. Security Concerns When to allow BYOI?  Strength of authentication ─ ─  Strength of identity administration ─ ─  How is identity validated for administration? What is required to issue a password reset? Compromised identity ─ ─ 9 Hurdles required to create the identity Hurdles required to validate the identity Who is responsible if identity is breached? How can you revoke access? © 2013 NetIQ Corporation. All rights reserved.
  • 10. Different Identity Types When to allow BYOI?  Customer and constituents ─ ─  Privileged users ─ ─ ─  Employees, partners, contractors, etc. Significant access to sensitive information & systems Much greater level of personal identifiable information Allow BYOI…? ─ 10 Limited to no access to sensitive information & systems Limited amount of personal identifiable information Must balance risk and value © 2013 NetIQ Corporation. All rights reserved.
  • 11. NYC.GOV BYOI Case Study • Different Goals / Desires / Requirements – Residents – NYC – Site Politicians admins Needed a Lightly secured, customer facing portal 11 © 2013 NetIQ Corporation. All rights reserved.
  • 12. NYC Constituent Experience BYOI Case Study Access Management requirements Secure Identity-enabled Web Services to provide account info am.nyc.gov Public Resources Non Identity-based information and services, optimized for speed pub.nyc.gov www.nyc.gov is a site composed of information from other webservices, secure, public, and semipublic. 12 © 2013 NetIQ Corporation. All rights reserved. Social Access requirements cf.nyc.gov Personalized Web content, requires only simple consumer authentication or NYC.ID
  • 13. Management of public resources BYOI Case Study  NYC Tennis Courts ─ ─ ─  Is this a candidate for BYOI? ─ ─ ─ 13 60,000 permits and tickets, 500 courts Annual permits ($100) Scheduling courts a nightmare for NYC and permit holders Low risk Lower cost from web scheduling and external identity Enables external payment collection (i.e. PayPal) © 2013 NetIQ Corporation. All rights reserved.
  • 14. Risk of Hacked Identity Mat Honan, Wired Magazine  Linked many of his accounts ─ ─ Social accounts: Twitter, LinkedIn Personal: Amazon, Gmail  Hackers wanted Twitter handle  Hackers exploited weak link 14 © 2013 NetIQ Corporation. All rights reserved.
  • 15. Risk of Hacked Identity Mat Honan, Wired Magazine  “In the space of one hour, my entire digital life was destroyed.” ─ ─ ─  15 “First my Google account was taken over, then deleted.” “Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages.” “And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook?” “In many ways, this was all my fault. My accounts were daisy-chained together.” © 2013 NetIQ Corporation. All rights reserved.
  • 16. Required no advanced skills Mat Honan, Wired Magazine  Twitter linked to Gmail account ─ ─ ─  Resetting Apple account requires ─ ─ ─  Physical address & last four digits of credit card Easy to get address How could they get the credit card information? Amazon and AppleID accounts linked ─ ─ ─ 16 Google Account recovery page Gave alternate email: m****n@me.com (hmmmm mhonan)… Letting them know he had an AppleID Name and email address needed to add a card to Amazon Knowing card number allows resetting password Now they have the credit card number for AppleID © 2013 NetIQ Corporation. All rights reserved.
  • 17. Key Take-aways Balancing Risk and Value  BYOI benefits ─ ─ ─  BYOI risk assessment ─ ─ ─  Customers/constituents involved in identity selection Security of identity beyond your control Still must protect personal identifiable information Must balance value against savings ─ ─ 17 Reduce cost of generating and managing identities Reduce customer/constituent engagement Enable more personalized experience interactions What type of access does it fit? May not be right for your organization…yet © 2013 NetIQ Corporation. All rights reserved.

Hinweis der Redaktion

  1. Identity provisioning really breaks down into two classes. The first class is that of people you provide a service to – constituents, customers , etc . The second class are employees. People who require access to provide a service for you.We collect different identity information from both of these groups. The mechanisms for collection and storage are different, as are the purposes for collection. While some of this identity information is equivalent in sensitivity, it is often handled differently.Depending on what identity class you lost the data from, it will probably have different mitigation requirements and even impact on your organization.
  2. Residents : Another #$%^$#**** account and password?Not more paperwork…NYC Politicianseasy to use and reduce work (admins)merge disparate accessprovide graded access for customers / constituents and employeeshandle high volume accessneed a drop in solutionneeds to be personalizedcheap (comptroller)Not going to get me in trouble ( compliance)Site admins – need to: work with staff they have
  3. Always appear to be openSecure identity be available, but did not want to mint a new identity for all constituents. Optimize the consituent experience on the web site to improve customer experience – what have they done before, highlight services based on who, what they have done in the pastAM – SecurityPR – Group of users to sort and filter informationSA – Tailoring it for them