SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
All Rights Reserved | FIDO Alliance | Copyright 20181
FIDO AND GOVERNMENT
FIDO’S ROLE IN THE GLOBAL
REGULATORY LANDSCAPE FOR STRONG
AUTHENTICATION
JEREMY GRANT, MANAGING DIRECTOR,
VENABLE LLP
2
AUTHENTICATION IS IMPORTANT TO GOVERNMENTS
All Rights Reserved | FIDO Alliance | Copyright 2018
1. Protects access to government assets
2. Enables more high-value citizen-facing services
3. Empowers private sector to provide a wider range of high value
services to consumers
4. Secures critical assets and infrastructure
Governments seek identity solutions that can deliver not just improved
Security – but also Privacy, Interoperability, and better Customer
Experiences
3
FIDO IS IMPACTING HOW GOVERNMENTS THINK
ABOUT AUTHENTICATION
All Rights Reserved | FIDO Alliance | Copyright 2018
Priorities:
• Ensuring that future online products and services
coming into use are “secure by default”
• Empowering consumers to “choose products and
services that have built-in security as a default
setting.”
“[We will] invest in technologies like Trusted Platform
Modules (TPM) and emerging industry standards such as
Fast IDentity Online (FIDO), which do not rely on
passwords for user authentication, but use the machine
and other devices in the user’s possession to authenticate.
The Government will test innovative authentication
mechanisms to demonstrate what they can offer, both in
terms of security and overall user experience.”
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/
national_cyber_security_strategy_2016.pdf
4 All Rights Reserved | FIDO Alliance | Copyright 2018
U.S. Commission on Enhancing
National Cybersecurity:
• Bipartisan commission established by
the White House in April – charged
with crafting recommendations for
the next President
• Major focus on Authentication
FIDO IS IMPACTING HOW GOVERNMENTS THINK
ABOUT AUTHENTICATION
5
US COMMISSION ON ENHANCING NATIONAL
CYBERSECURITY
All Rights Reserved | FIDO Alliance | Copyright 2018
“Other important work that must be undertaken to overcome
identity authentication challenges includes the development
of open-source standards and specifications like those
developed by the Fast IDentity Online (FIDO) Alliance. FIDO
specifications are focused largely on the mobile smartphone
platform to deliver multifactor authentication to the masses,
all based on industry standard public key cryptography.
Windows 10 has deployed FIDO specifications (known as
Windows Hello), and numerous financial institutions have
adopted FIDO for consumer banking. Today, organizations
complying with FIDO specifications are able to deliver secure
authentication technology on a wide range of devices,
including mobile phones, USB keys, and near-field
communications (NFC) and Bluetooth low energy (BLE)
devices and wearables.
This work, other standards activities, and new tools that
support continuous authentication provide a strong
foundation for opt-in identity management for the digital
infrastructure.”
https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-commission-report-final-post.pdf
6
US CONGRESS – GAO REPORT
All Rights Reserved | FIDO Alliance | Copyright 2018
7
HONG KONG eGOVERNMENT
All Rights Reserved | FIDO Alliance | Copyright 2018
• New proposal from Hong Kong CIO’s Office on “Digital
Transformation for Agile Delivery of eGovernment
Services”
• Calls out FIDO as a core component of their standards-
based approach to digital ID
IDEA:
AUTHENTICATION
AS REGTECH
8
WHAT IS
REGTECH?
9
RegTech : Tec hno lo gy tha t helps
bus i nes s es c o m ply wi th regula ti o ns
effi c i ently a nd i nex pens i vely.
-A ustrali an Securi ti es and Investments
Co m m i s s i o n (A SIC)
-O r -
RegTech : Tec hno lo gy tha t s eeks to
pro vi de “ ni m ble, c o nfi gura ble, ea s y to
i ntegra te, reli a ble, s ec ure a nd c o s t -
effec ti ve” c o m pli a nc e s o luti o ns
-Delo i tte
All Rights Reserved | FIDO Alliance | Copyright 2018
10
AUTHENTICATION IS REGTECH…RIGHT?
All Rights Reserved | FIDO Alliance | Copyright 2018
Nimble? Reliable?
Easy to
integrate?
Cost
effective?
Configurable? Secure?
11 All Rights Reserved | FIDO Alliance | Copyright 2018
OLD AUTHENTICATION - OTPs
Old strong authentication required a separate channel or device…
ONE-TIME PASSCODES
Improve security but aren’t easy enough to use
STILL
PHISHABLE
USER
CONFUSION
TOKEN
NECKLACE
SMS
RELIABILITY1
1NIST SP800-63-3: “Out-of-band authentication using the [public switched telephone network] (SMS or voice) is discouraged and is being considered for removal in future editions of this guideline.”
12 All Rights Reserved | FIDO Alliance | Copyright 2018
OLD AUTHENTICATION – SMART CARDS
INCONVENIENT
SMART CARDS OFFER STRONG CRYTOGRAPHIC SECURITY BUT…
SMART CARDS
Offer strong cryptographic security but are:
COSTLY
Old strong authentication required a separate channel or device…
POOR BYOD SUPPORT
13
THE AUTHN CHALLENGE
All Rights Reserved | FIDO Alliance | Copyright 2018
We need authentication solutions that can meet the “RegTech”
definition - allowing better business models and customer
experiences to flourish - without concerns about security, privacy
and other compliance requirements
Nimble Reliable
Easy to
integrate
Cost
effective
Configurable Secure
14
AREAS OF INNOVATION + REGULATION
All Rights Reserved | FIDO Alliance | Copyright 2018
Digital
Government
National IDs
eIDAS
• GDPR
• Stop 81% of
breaches
• EHR
• Patient Access
• Doctor Access
• Payments +
FinTech
• Open Banking
• KYC
Financial
Services
Health
Care
eGov/
Citizen
Services
Privacy
&
Security
15
AREAS OF INNOVATION + REGULATION
All Rights Reserved | FIDO Alliance | Copyright 2018
•Digital
Government
•National IDs
•eIDAS
• GDPR
• Stop 81% of
breaches
• EHR
• Patient Access
• Doctor Access
• Payments +
FinTech
• Open Banking
• KYC
Financial
Services
Health
Care
eGov/
Citizen
Services
Privacy
&
Security
Compliance is driving a need for better
authentication
16
FIDO AS REGTECH
All Rights Reserved | FIDO Alliance | Copyright 2018
Privacy Interoperability Usability
FIDO delivers on key priorities
Security
17
FIDO IMPACT ON POLICY
All Rights Reserved | FIDO Alliance | Copyright 2018
FIDO specifications offer governments newer,
better options for strong authentication – but
governments may need to update some policies
to support the ways in which FIDO is different.
As technology evolves,
policy needs to evolve with it.
18
• While this statement was true of most “old” MFA
technology, FIDO specifically addresses these cost
and usability issues
• FIDO enables simpler, stronger authentication
capabilities that governments, businesses and
consumers can easily adopt at scale
As technology evolves,
policy needs to evolve with it.
1. Recognize that two-factor authentication no longer brings higher burdens or costs
19
As technology evolves,
policy needs to evolve with it.
2. Recognize technology is now mature enough to enable two secure,
distinct authn factors in a single device
• First recognized by the U.S. government (NIST) in 2014
• “OMB (White House) to update guidance on remote electronic
authentication” to remove requirements that one factor be
separate from the device accessing the resource
• The evolution of mobile devices – in particular, hardware
architectures that offer highly robust and isolated execution
environments (such as TEE, SE and TPM) – has allowed these
devices to achieve high-grade security without the need for a
physically distinct token
20
Technology is now mature enough to enable two
secure, distinct authentication factors in a single
device
Europe and Payment Services
Directive 2 (PSD2)
• Original guidance (December 2015)
from the European Banking Authority
(EBA) was heavily weighted toward
OTP, considered prohibition of two
authentication factors delivered on
the same device.
• The emergence of FIDO prompted
EBA to revise its guidance – the final
version (November 2017) references
FIDO’s architecture for protecting
the independence of authentication
factors on multi-purpose devices
such as smart phones.
http://ec.europa.eu/finance/docs/level-2-measures/psd2-rts-2017-
7782_en.pdf
21
Technology is now mature enough to enable two
secure, distinct authentication factors in a single
device
FIDO recognized at the highest Authenticator
Assurance Level (AAL3) by NIST
• NIST published a 2017 update to its digital
identity standards that reflects the
emergence of new standards like FIDO
• Both Universal 2 Factor (U2F) and
passwordless/UAF solutions were recognized
as being at the highest level of assurance for
authenticators.
https://pages.nist.gov/800-63-3/
22
As technology evolves,
policy needs to evolve with it.
3. As governments promote or require strong authentication,
make sure it is the “right” authentication
• The market is in the midst of a burst of innovation around authentication technology—some
solutions are better than others. Don’t build rules focused on old authentication technology
• Old authentication technologies impose significant costs and burdens on the user—which
decreases adoption
• Old authentication technologies have security (i.e., phishable) and privacy issues—putting
both users and online service providers at risk
23
As technology evolves,
policy needs to evolve with it.
3. As governments promote or require strong authentication,
make sure it is the “right” authentication
Example: Taiwan
• Taiwan’s Financial Supervisory Commission (FSC) in December 2016
changed its e-Banking Security Control regulations to make clear:
Client-side biometrics are appropriate to use for e-Banking
applications
• Previous version: Pointed only to server-side biometric match;
emergence of FIDO prompted a change
24
As technology evolves,
policy needs to evolve with it.
3. As governments promote or require strong authentication,
make sure it is the “right” authentication
Example: US
• US Department of Veterans Affairs (VA)
• First US government citizen-facing application (vets.gov)
to support FIDO (September 2017)
• US Department of Defense (DoD)
• DoD CIO declares that FIDO allowed as an alternative to
PKI – where PKI integration is not feasible (April 2017)
• US Senate
• Requests US Social Security Administration protect citizen
accounts with FIDO - instead of SMS or OTP
25All Rights Reserved | FIDO Alliance | Copyright 2018
Privacy Interoperability Usability
FIDO delivers on key policy priorities
Security
26 All Rights Reserved | FIDO Alliance | Copyright 2018
QUESTIONS?
THANK YOU!
jeremy.grant@venable.com

Weitere ähnliche Inhalte

Was ist angesagt?

FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO Alliance
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO Alliance
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar FIDO Alliance
 
FIDO Support for the GDPR
FIDO Support for the GDPRFIDO Support for the GDPR
FIDO Support for the GDPRFIDO Alliance
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business ConsiderationsFIDO Alliance
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowellFIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Alliance
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO Alliance
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without PasswordsFIDO Alliance
 
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! JapanDeployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! JapanFIDO Alliance
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
Shopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice AuthenticationShopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice AuthenticationFIDO Alliance
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond PasswordsFIDO Alliance
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationFIDO Alliance
 

Was ist angesagt? (20)

FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and Recommendations
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
FIDO Support for the GDPR
FIDO Support for the GDPRFIDO Support for the GDPR
FIDO Support for the GDPR
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government Requirements
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! JapanDeployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Shopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice AuthenticationShopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice Authentication
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer Authentication
 

Ähnlich wie FIDO's Role in the Global Regulatory Landscape for Strong Authentication

Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in GovernmentFIDO Alliance
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressFIDO Alliance
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationFIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategyfEngel
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Alliance
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptxFIDO Alliance
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptxssuserc1c6091
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsFIDO Alliance
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
How Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond KairouzHow Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond Kairouzsigortatatbikatcilari
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 

Ähnlich wie FIDO's Role in the Global Regulatory Landscape for Strong Authentication (20)

Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
FIDO in Government
FIDO in GovernmentFIDO in Government
FIDO in Government
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
News letter oct 12
News letter oct 12News letter oct 12
News letter oct 12
 
How Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond KairouzHow Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond Kairouz
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 

Mehr von FIDO Alliance

IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 

Mehr von FIDO Alliance (20)

IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 

Kürzlich hochgeladen

The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024ARCResearch
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...SUHANI PANDEY
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...tanu pandey
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCNAP Global Network
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.Christina Parmionova
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Kürzlich hochgeladen (20)

The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 

FIDO's Role in the Global Regulatory Landscape for Strong Authentication

  • 1. All Rights Reserved | FIDO Alliance | Copyright 20181 FIDO AND GOVERNMENT FIDO’S ROLE IN THE GLOBAL REGULATORY LANDSCAPE FOR STRONG AUTHENTICATION JEREMY GRANT, MANAGING DIRECTOR, VENABLE LLP
  • 2. 2 AUTHENTICATION IS IMPORTANT TO GOVERNMENTS All Rights Reserved | FIDO Alliance | Copyright 2018 1. Protects access to government assets 2. Enables more high-value citizen-facing services 3. Empowers private sector to provide a wider range of high value services to consumers 4. Secures critical assets and infrastructure Governments seek identity solutions that can deliver not just improved Security – but also Privacy, Interoperability, and better Customer Experiences
  • 3. 3 FIDO IS IMPACTING HOW GOVERNMENTS THINK ABOUT AUTHENTICATION All Rights Reserved | FIDO Alliance | Copyright 2018 Priorities: • Ensuring that future online products and services coming into use are “secure by default” • Empowering consumers to “choose products and services that have built-in security as a default setting.” “[We will] invest in technologies like Trusted Platform Modules (TPM) and emerging industry standards such as Fast IDentity Online (FIDO), which do not rely on passwords for user authentication, but use the machine and other devices in the user’s possession to authenticate. The Government will test innovative authentication mechanisms to demonstrate what they can offer, both in terms of security and overall user experience.” https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/ national_cyber_security_strategy_2016.pdf
  • 4. 4 All Rights Reserved | FIDO Alliance | Copyright 2018 U.S. Commission on Enhancing National Cybersecurity: • Bipartisan commission established by the White House in April – charged with crafting recommendations for the next President • Major focus on Authentication FIDO IS IMPACTING HOW GOVERNMENTS THINK ABOUT AUTHENTICATION
  • 5. 5 US COMMISSION ON ENHANCING NATIONAL CYBERSECURITY All Rights Reserved | FIDO Alliance | Copyright 2018 “Other important work that must be undertaken to overcome identity authentication challenges includes the development of open-source standards and specifications like those developed by the Fast IDentity Online (FIDO) Alliance. FIDO specifications are focused largely on the mobile smartphone platform to deliver multifactor authentication to the masses, all based on industry standard public key cryptography. Windows 10 has deployed FIDO specifications (known as Windows Hello), and numerous financial institutions have adopted FIDO for consumer banking. Today, organizations complying with FIDO specifications are able to deliver secure authentication technology on a wide range of devices, including mobile phones, USB keys, and near-field communications (NFC) and Bluetooth low energy (BLE) devices and wearables. This work, other standards activities, and new tools that support continuous authentication provide a strong foundation for opt-in identity management for the digital infrastructure.” https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-commission-report-final-post.pdf
  • 6. 6 US CONGRESS – GAO REPORT All Rights Reserved | FIDO Alliance | Copyright 2018
  • 7. 7 HONG KONG eGOVERNMENT All Rights Reserved | FIDO Alliance | Copyright 2018 • New proposal from Hong Kong CIO’s Office on “Digital Transformation for Agile Delivery of eGovernment Services” • Calls out FIDO as a core component of their standards- based approach to digital ID
  • 9. WHAT IS REGTECH? 9 RegTech : Tec hno lo gy tha t helps bus i nes s es c o m ply wi th regula ti o ns effi c i ently a nd i nex pens i vely. -A ustrali an Securi ti es and Investments Co m m i s s i o n (A SIC) -O r - RegTech : Tec hno lo gy tha t s eeks to pro vi de “ ni m ble, c o nfi gura ble, ea s y to i ntegra te, reli a ble, s ec ure a nd c o s t - effec ti ve” c o m pli a nc e s o luti o ns -Delo i tte All Rights Reserved | FIDO Alliance | Copyright 2018
  • 10. 10 AUTHENTICATION IS REGTECH…RIGHT? All Rights Reserved | FIDO Alliance | Copyright 2018 Nimble? Reliable? Easy to integrate? Cost effective? Configurable? Secure?
  • 11. 11 All Rights Reserved | FIDO Alliance | Copyright 2018 OLD AUTHENTICATION - OTPs Old strong authentication required a separate channel or device… ONE-TIME PASSCODES Improve security but aren’t easy enough to use STILL PHISHABLE USER CONFUSION TOKEN NECKLACE SMS RELIABILITY1 1NIST SP800-63-3: “Out-of-band authentication using the [public switched telephone network] (SMS or voice) is discouraged and is being considered for removal in future editions of this guideline.”
  • 12. 12 All Rights Reserved | FIDO Alliance | Copyright 2018 OLD AUTHENTICATION – SMART CARDS INCONVENIENT SMART CARDS OFFER STRONG CRYTOGRAPHIC SECURITY BUT… SMART CARDS Offer strong cryptographic security but are: COSTLY Old strong authentication required a separate channel or device… POOR BYOD SUPPORT
  • 13. 13 THE AUTHN CHALLENGE All Rights Reserved | FIDO Alliance | Copyright 2018 We need authentication solutions that can meet the “RegTech” definition - allowing better business models and customer experiences to flourish - without concerns about security, privacy and other compliance requirements Nimble Reliable Easy to integrate Cost effective Configurable Secure
  • 14. 14 AREAS OF INNOVATION + REGULATION All Rights Reserved | FIDO Alliance | Copyright 2018 Digital Government National IDs eIDAS • GDPR • Stop 81% of breaches • EHR • Patient Access • Doctor Access • Payments + FinTech • Open Banking • KYC Financial Services Health Care eGov/ Citizen Services Privacy & Security
  • 15. 15 AREAS OF INNOVATION + REGULATION All Rights Reserved | FIDO Alliance | Copyright 2018 •Digital Government •National IDs •eIDAS • GDPR • Stop 81% of breaches • EHR • Patient Access • Doctor Access • Payments + FinTech • Open Banking • KYC Financial Services Health Care eGov/ Citizen Services Privacy & Security Compliance is driving a need for better authentication
  • 16. 16 FIDO AS REGTECH All Rights Reserved | FIDO Alliance | Copyright 2018 Privacy Interoperability Usability FIDO delivers on key priorities Security
  • 17. 17 FIDO IMPACT ON POLICY All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO specifications offer governments newer, better options for strong authentication – but governments may need to update some policies to support the ways in which FIDO is different. As technology evolves, policy needs to evolve with it.
  • 18. 18 • While this statement was true of most “old” MFA technology, FIDO specifically addresses these cost and usability issues • FIDO enables simpler, stronger authentication capabilities that governments, businesses and consumers can easily adopt at scale As technology evolves, policy needs to evolve with it. 1. Recognize that two-factor authentication no longer brings higher burdens or costs
  • 19. 19 As technology evolves, policy needs to evolve with it. 2. Recognize technology is now mature enough to enable two secure, distinct authn factors in a single device • First recognized by the U.S. government (NIST) in 2014 • “OMB (White House) to update guidance on remote electronic authentication” to remove requirements that one factor be separate from the device accessing the resource • The evolution of mobile devices – in particular, hardware architectures that offer highly robust and isolated execution environments (such as TEE, SE and TPM) – has allowed these devices to achieve high-grade security without the need for a physically distinct token
  • 20. 20 Technology is now mature enough to enable two secure, distinct authentication factors in a single device Europe and Payment Services Directive 2 (PSD2) • Original guidance (December 2015) from the European Banking Authority (EBA) was heavily weighted toward OTP, considered prohibition of two authentication factors delivered on the same device. • The emergence of FIDO prompted EBA to revise its guidance – the final version (November 2017) references FIDO’s architecture for protecting the independence of authentication factors on multi-purpose devices such as smart phones. http://ec.europa.eu/finance/docs/level-2-measures/psd2-rts-2017- 7782_en.pdf
  • 21. 21 Technology is now mature enough to enable two secure, distinct authentication factors in a single device FIDO recognized at the highest Authenticator Assurance Level (AAL3) by NIST • NIST published a 2017 update to its digital identity standards that reflects the emergence of new standards like FIDO • Both Universal 2 Factor (U2F) and passwordless/UAF solutions were recognized as being at the highest level of assurance for authenticators. https://pages.nist.gov/800-63-3/
  • 22. 22 As technology evolves, policy needs to evolve with it. 3. As governments promote or require strong authentication, make sure it is the “right” authentication • The market is in the midst of a burst of innovation around authentication technology—some solutions are better than others. Don’t build rules focused on old authentication technology • Old authentication technologies impose significant costs and burdens on the user—which decreases adoption • Old authentication technologies have security (i.e., phishable) and privacy issues—putting both users and online service providers at risk
  • 23. 23 As technology evolves, policy needs to evolve with it. 3. As governments promote or require strong authentication, make sure it is the “right” authentication Example: Taiwan • Taiwan’s Financial Supervisory Commission (FSC) in December 2016 changed its e-Banking Security Control regulations to make clear: Client-side biometrics are appropriate to use for e-Banking applications • Previous version: Pointed only to server-side biometric match; emergence of FIDO prompted a change
  • 24. 24 As technology evolves, policy needs to evolve with it. 3. As governments promote or require strong authentication, make sure it is the “right” authentication Example: US • US Department of Veterans Affairs (VA) • First US government citizen-facing application (vets.gov) to support FIDO (September 2017) • US Department of Defense (DoD) • DoD CIO declares that FIDO allowed as an alternative to PKI – where PKI integration is not feasible (April 2017) • US Senate • Requests US Social Security Administration protect citizen accounts with FIDO - instead of SMS or OTP
  • 25. 25All Rights Reserved | FIDO Alliance | Copyright 2018 Privacy Interoperability Usability FIDO delivers on key policy priorities Security
  • 26. 26 All Rights Reserved | FIDO Alliance | Copyright 2018 QUESTIONS? THANK YOU! jeremy.grant@venable.com