SlideShare ist ein Scribd-Unternehmen logo
1 von 34
All Rights Reserved | FIDO Alliance | 2016 1
THE VALUE OF MEMBERSHIP
Brett McDowell, Executive Director
brett@fidoalliance.org
All Rights Reserved | FIDO Alliance | 2016 2
WHY FIDO ALLIANCE?
All Rights Reserved | FIDO Alliance | 2016 3
Solving the Password Problem
63% of data breaches
in 2015 involved
weak, default, or
stolen passwords
-Verizon Data Breach
Report
Data breaches
expected to reach
1,000 in 2016
up 22% from 2015
-Identity Theft Resource
Center
Each data breach
costs $3.8 million
on average
up 23% from 2013
-Ponemon Institute
All Rights Reserved | FIDO Alliance | 2016 4
WHO IS FIDO ALLIANCE?
All Rights Reserved | FIDO Alliance | 2016 5
The FIDO Alliance is an open industry
association of over 250 organizations
with a focused mission:
authentication standards
Board Members
All Rights Reserved | FIDO Alliance | 2016 6
All Rights Reserved | FIDO Alliance | 2016 7
WHAT IS FIDO AUTHENTICATION?
All Rights Reserved | FIDO Alliance | 2016 8
HOW “Shared Secrets” WORK
ONLINE
The user authenticates
themselves online by presenting a
human-readable “shared secret”
All Rights Reserved | FIDO Alliance | 2016 9
HOW FIDO WORKS
AUTHENTICATOR
LOCAL ONLINE
The user authenticates
“locally” to their device
(by various means)
The device authenticates
the user online using
public key cryptography
All Rights Reserved | FIDO Alliance | 2016 10
Support for Two Authentication Experiences
ENABLES MANY AUTHENTICATION OPTIONS | EACH SERVICE PROVIDER REGISTERS UNIQUE FIDO CREDENTIALS
All Rights Reserved | FIDO Alliance | 2016 11
USABILITY, SECURITY, R.O.I.
and
PRIVACY
All Rights Reserved | FIDO Alliance | 2016 12
No 3rd Party in the Protocol
No Secrets on the Server Side
Biometric Data (if used) Never Leaves Device
No (*new*) Link-ability Between Services
No (*new*) Link-ability Between Accounts
All Rights Reserved | FIDO Alliance | 2016 13
MARKET ADOPTION
All Rights Reserved | FIDO Alliance | 2016 14
FIDO Development History
FIDO 1.0
FINALFirst
Deployments
UAF & U2FSpecification
Review Draft
FIDO Ready
Program
Alliance
Announced
FEB
2013
DEC
2013
FEB
2014
FEB-OCT
2014
DEC 9
2014
MAY
2015
FEB
2016
Formal
Standardization
JUNE
2015
Certification
Program
New U2F
Transports
DEC
2016
FIDO 1.1
Sample FIDO Adoption/Announcements
All Rights Reserved | FIDO Alliance | 2016 15
Certification Growth
All Rights Reserved | FIDO Alliance | 2016 16
 An open competitive market
 Ensures interoperability
 Sign of mature FIDO ecosystem
250+
FIDO® Certified
products available
today
152
64
32
62
74
108
162
216
253
Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 Aug-16
TOTAL
Leading OEMs Shipping FIDO Certified Devices
S5, Mini Alpha Note 4,5 Note Edge Tab S, Tab S2 S6, S6 Edge S7, S7 Edge Vernee Thor
Aquos Zeta Xperia Z5 Xperia Z5
Compact
Xperia Z5
Premium
Mate 8
V10 G5
Phab2
Pro
Phab2
Plus
Z2, Z2 ProArrows
NX
Arrows
Fit
Arrows
Tab
All Rights Reserved | FIDO Alliance | 2016 17
All Rights Reserved | FIDO Alliance | 2016 18
FIDO in Windows & Web Ecosystems
Windows Platforms
Yoga 910
Web
All Rights Reserved | FIDO Alliance | 2016 19
Summary: FIDO Authentication Delivers
Better security
for online services
Reduced cost
for the enterprise
Simpler and safer
for users
All Rights Reserved | FIDO Alliance | 2016 20
GETTING ENGAGED
All Rights Reserved | FIDO Alliance | 2016 21
How FIDO Works
Membership
Levels
Technical
Workstreams
Marketing & Adoption
Workstreams
All Rights Reserved | FIDO Alliance | 2016 22
Membership Levels
Board
Sets strategy and overall direction for Alliance
Sponsor
Leads development through FIDO working groups & in marketplace
Associate
Annual networking opportunity, participate in broader ecosystem
All Rights Reserved | FIDO Alliance | 2016 23
Technical Working Groups
Security
Requirements
“FIDO 2.0”
Technology
Universal
Authentication
Framework
Technology
Universal 2nd
Factor
Technology
All Rights Reserved | FIDO Alliance | 2016 24
Membership Value: Technology
• Influence FIDO’s specifications and technical
output
• Gain early visibility into specs to help guide your
product development and/or deployments
• Benefit from the “IPR Promise”
• Network with technical peers across industry
segments
All Rights Reserved | FIDO Alliance | 2016 25
“The IPR Promise” Process - 6.2.1.1
“For each Working Group in which one or more Bound Entities
participates, Signatory, on behalf of itself, all its Related Entities and its
and their successors in interest and assigns, promises not to assert its or
its Related Entity’s Granted Claims against any Participant in such
Working Group for its Public Permitted Uses or Working Group Permitted
Uses, subject to the terms and conditions of this Agreement. [...]”
• A reciprocal promise to not assert patents against the
normative requirements in FIDO specification
• Enables unencumbered growth of FIDO ecosystem
http://fidoalliance.org/membership/details
All Rights Reserved | FIDO Alliance | 2016 26
Technical Working Groups
Security
Requirements
FIDO 2.0
Technology
Universal
Authentication
Framework
Technology
Universal 2nd
Factor
Technology
Influence
Early
Visibility
Peer-based
Networking
All Rights Reserved | FIDO Alliance | 2016 27
Adoption Working Groups
Certification Marketing
Deployment-
at-Scale
Regional
(China,
India, etc.)
Privacy &
Public Policy
All Rights Reserved | FIDO Alliance | 2016 28
Membership Value: Marketing & Adoption
• Tap into FIDO’s ecosystem marketing activities
• Reduced fees for certification testing & logo usage
• Take part in FIDO Pavilions at leading industry events
(turnkey, discounted presence)
• Gain insights from Market Research programs
• Engage with experts to drive regional adoption
• Understand and establish deployment best
practices (benefit from early adopter experience)
• Influence, understand and engage on emerging
policy issues
All Rights Reserved | FIDO Alliance | 2016 29
The Road Ahead
Web Authentication
Specification Brings
FIDO to the
Platform
Standards Effort
with EMVCo
Client-to-
Authenticator
Protocol (CTAP)
FIDO Gold Server +
New Certification
Programs
All Rights Reserved | FIDO Alliance | 2016 30
What Our Members Say
All Rights Reserved | FIDO Alliance | 2016 31
NEXT STEPS
All Rights Reserved | FIDO Alliance | 2016 32
Membership Application Procedures
• Ready to join?
• Visit https://fidoalliance.org/membership/
• Have more questions (even after our Q&A)?
• Email info@fidoalliance.org
• Follow us @fidoalliance
• Meet us at upcoming Industry events
• https://fidoalliance.org/upcoming-events/
All Rights Reserved | FIDO Alliance | 2016 33
JOIN THE
FIDO ALLIANCE
All Rights Reserved | FIDO Alliance | 2016 34
THANK YOU!
QUESTIONS?
brett@fidoalliance.org | info@fidoalliance.org

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Overview: Status and Future
FIDO Overview: Status and Future
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
FIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User Authentication
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & Blockchain
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
GDPR(一般データ保護規則)とFIDO標準について
GDPR(一般データ保護規則)とFIDO標準についてGDPR(一般データ保護規則)とFIDO標準について
GDPR(一般データ保護規則)とFIDO標準について
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in Korea
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 

Andere mochten auch

Andere mochten auch (11)

FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital Services
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 

Ähnlich wie FIDO - The Value of Membership

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

Ähnlich wie FIDO - The Value of Membership (20)

Introduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and StatusIntroduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and Status
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 
FIDO Certification
FIDO CertificationFIDO Certification
FIDO Certification
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and Updates
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & Status
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
FIDO, Federation & Facebook Social Login
FIDO, Federation & Facebook Social LoginFIDO, Federation & Facebook Social Login
FIDO, Federation & Facebook Social Login
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 

Mehr von FIDO Alliance

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Mehr von FIDO Alliance (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 

Kürzlich hochgeladen

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Kürzlich hochgeladen (20)

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 

FIDO - The Value of Membership

  • 1. All Rights Reserved | FIDO Alliance | 2016 1 THE VALUE OF MEMBERSHIP Brett McDowell, Executive Director brett@fidoalliance.org
  • 2. All Rights Reserved | FIDO Alliance | 2016 2 WHY FIDO ALLIANCE?
  • 3. All Rights Reserved | FIDO Alliance | 2016 3 Solving the Password Problem 63% of data breaches in 2015 involved weak, default, or stolen passwords -Verizon Data Breach Report Data breaches expected to reach 1,000 in 2016 up 22% from 2015 -Identity Theft Resource Center Each data breach costs $3.8 million on average up 23% from 2013 -Ponemon Institute
  • 4. All Rights Reserved | FIDO Alliance | 2016 4 WHO IS FIDO ALLIANCE?
  • 5. All Rights Reserved | FIDO Alliance | 2016 5 The FIDO Alliance is an open industry association of over 250 organizations with a focused mission: authentication standards
  • 6. Board Members All Rights Reserved | FIDO Alliance | 2016 6
  • 7. All Rights Reserved | FIDO Alliance | 2016 7 WHAT IS FIDO AUTHENTICATION?
  • 8. All Rights Reserved | FIDO Alliance | 2016 8 HOW “Shared Secrets” WORK ONLINE The user authenticates themselves online by presenting a human-readable “shared secret”
  • 9. All Rights Reserved | FIDO Alliance | 2016 9 HOW FIDO WORKS AUTHENTICATOR LOCAL ONLINE The user authenticates “locally” to their device (by various means) The device authenticates the user online using public key cryptography
  • 10. All Rights Reserved | FIDO Alliance | 2016 10 Support for Two Authentication Experiences ENABLES MANY AUTHENTICATION OPTIONS | EACH SERVICE PROVIDER REGISTERS UNIQUE FIDO CREDENTIALS
  • 11. All Rights Reserved | FIDO Alliance | 2016 11 USABILITY, SECURITY, R.O.I. and PRIVACY
  • 12. All Rights Reserved | FIDO Alliance | 2016 12 No 3rd Party in the Protocol No Secrets on the Server Side Biometric Data (if used) Never Leaves Device No (*new*) Link-ability Between Services No (*new*) Link-ability Between Accounts
  • 13. All Rights Reserved | FIDO Alliance | 2016 13 MARKET ADOPTION
  • 14. All Rights Reserved | FIDO Alliance | 2016 14 FIDO Development History FIDO 1.0 FINALFirst Deployments UAF & U2FSpecification Review Draft FIDO Ready Program Alliance Announced FEB 2013 DEC 2013 FEB 2014 FEB-OCT 2014 DEC 9 2014 MAY 2015 FEB 2016 Formal Standardization JUNE 2015 Certification Program New U2F Transports DEC 2016 FIDO 1.1
  • 15. Sample FIDO Adoption/Announcements All Rights Reserved | FIDO Alliance | 2016 15
  • 16. Certification Growth All Rights Reserved | FIDO Alliance | 2016 16  An open competitive market  Ensures interoperability  Sign of mature FIDO ecosystem 250+ FIDO® Certified products available today 152 64 32 62 74 108 162 216 253 Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 Aug-16 TOTAL
  • 17. Leading OEMs Shipping FIDO Certified Devices S5, Mini Alpha Note 4,5 Note Edge Tab S, Tab S2 S6, S6 Edge S7, S7 Edge Vernee Thor Aquos Zeta Xperia Z5 Xperia Z5 Compact Xperia Z5 Premium Mate 8 V10 G5 Phab2 Pro Phab2 Plus Z2, Z2 ProArrows NX Arrows Fit Arrows Tab All Rights Reserved | FIDO Alliance | 2016 17
  • 18. All Rights Reserved | FIDO Alliance | 2016 18 FIDO in Windows & Web Ecosystems Windows Platforms Yoga 910 Web
  • 19. All Rights Reserved | FIDO Alliance | 2016 19 Summary: FIDO Authentication Delivers Better security for online services Reduced cost for the enterprise Simpler and safer for users
  • 20. All Rights Reserved | FIDO Alliance | 2016 20 GETTING ENGAGED
  • 21. All Rights Reserved | FIDO Alliance | 2016 21 How FIDO Works Membership Levels Technical Workstreams Marketing & Adoption Workstreams
  • 22. All Rights Reserved | FIDO Alliance | 2016 22 Membership Levels Board Sets strategy and overall direction for Alliance Sponsor Leads development through FIDO working groups & in marketplace Associate Annual networking opportunity, participate in broader ecosystem
  • 23. All Rights Reserved | FIDO Alliance | 2016 23 Technical Working Groups Security Requirements “FIDO 2.0” Technology Universal Authentication Framework Technology Universal 2nd Factor Technology
  • 24. All Rights Reserved | FIDO Alliance | 2016 24 Membership Value: Technology • Influence FIDO’s specifications and technical output • Gain early visibility into specs to help guide your product development and/or deployments • Benefit from the “IPR Promise” • Network with technical peers across industry segments
  • 25. All Rights Reserved | FIDO Alliance | 2016 25 “The IPR Promise” Process - 6.2.1.1 “For each Working Group in which one or more Bound Entities participates, Signatory, on behalf of itself, all its Related Entities and its and their successors in interest and assigns, promises not to assert its or its Related Entity’s Granted Claims against any Participant in such Working Group for its Public Permitted Uses or Working Group Permitted Uses, subject to the terms and conditions of this Agreement. [...]” • A reciprocal promise to not assert patents against the normative requirements in FIDO specification • Enables unencumbered growth of FIDO ecosystem http://fidoalliance.org/membership/details
  • 26. All Rights Reserved | FIDO Alliance | 2016 26 Technical Working Groups Security Requirements FIDO 2.0 Technology Universal Authentication Framework Technology Universal 2nd Factor Technology Influence Early Visibility Peer-based Networking
  • 27. All Rights Reserved | FIDO Alliance | 2016 27 Adoption Working Groups Certification Marketing Deployment- at-Scale Regional (China, India, etc.) Privacy & Public Policy
  • 28. All Rights Reserved | FIDO Alliance | 2016 28 Membership Value: Marketing & Adoption • Tap into FIDO’s ecosystem marketing activities • Reduced fees for certification testing & logo usage • Take part in FIDO Pavilions at leading industry events (turnkey, discounted presence) • Gain insights from Market Research programs • Engage with experts to drive regional adoption • Understand and establish deployment best practices (benefit from early adopter experience) • Influence, understand and engage on emerging policy issues
  • 29. All Rights Reserved | FIDO Alliance | 2016 29 The Road Ahead Web Authentication Specification Brings FIDO to the Platform Standards Effort with EMVCo Client-to- Authenticator Protocol (CTAP) FIDO Gold Server + New Certification Programs
  • 30. All Rights Reserved | FIDO Alliance | 2016 30 What Our Members Say
  • 31. All Rights Reserved | FIDO Alliance | 2016 31 NEXT STEPS
  • 32. All Rights Reserved | FIDO Alliance | 2016 32 Membership Application Procedures • Ready to join? • Visit https://fidoalliance.org/membership/ • Have more questions (even after our Q&A)? • Email info@fidoalliance.org • Follow us @fidoalliance • Meet us at upcoming Industry events • https://fidoalliance.org/upcoming-events/
  • 33. All Rights Reserved | FIDO Alliance | 2016 33 JOIN THE FIDO ALLIANCE
  • 34. All Rights Reserved | FIDO Alliance | 2016 34 THANK YOU! QUESTIONS? brett@fidoalliance.org | info@fidoalliance.org