National Strategy for Trusted Identities in Cyberspace Jeremy Grant

Slides:



Advertisements
Similar presentations
Manatt manatt | phelps | phillips New York State Health Information Technology Summit Initiative Overview and Update Rachel Block, Project Director United.
Advertisements

A strategy for a Secure Information Society –
Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
1 National Strategy for Trusted Identities in Cyberspace National Strategy for Trusted Identities in Cyberspace Jeremy Grant NIST.
18/05/99 FAMO- MODELO /05/99 FAMO- MODELO REGIONAL HIGH-LEVEL WORKSHOP ON ELECTRONIC COMMERCE AND ICT FOR CENTRAL AMERICA AND THE CARIBBEAN.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
National Strategies for Digital Identity Management UNCITRAL Colloquium on Electronic Commerce February 2011, New York Laurent Bernat – OECD Secretariat.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust and Driving Business via Public- Private Partnerships.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant and Naomi.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
1 National Strategy for Trusted Identities in Cyberspace National Strategy for Trusted Identities in Cyberspace Jeremy Grant NIST April 6, 2011.
State Alliance for e-Health Conference Meeting January 26, 2007.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
Digital Agenda Unleashing the Potential of Cloud Computing in Europe Ken Ducatel Head of Unit DG Connect, Software and Services, Cloud 05 December 2012.
© Cloud Security Alliance, 2015 Jim Reavis CEO, Cloud Security Alliance.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
CAREER PATHWAYS THE NEW WAY OF DOING BUSINESS. Agenda for our Discussion Today we’ll discuss: Career Pathways Systems and Programs Where we’ve been and.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
Preparing to Implement HITECH A New Report from the State Alliance For E-Health Ree Sailors Kentucky e-Health Summit September 16, 2009.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
International Telecommunication Union ICT Security Role in National Trusted Identities Initiatives Abbie Barbir, PhD ITU-T Study Group 17 Identity Management.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Welcome and Introduction January 11, 2017
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Cyber Security – An Existential Threat? (IIC, Singapore)
Johannesburg, South Africa
Identity on the Internet
Update from the Faster Payments Task Force
Higher Education’s Role in the Identity Ecosystem
Online platforms Brussels, September 2016.
Technical Cooperation Section SEDI- Executive Office
Lessons and Experiences from Zambia National REDD+ Coordinator
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
President’s Administrative Innovation Fund: Connecting IT Subject Matter Expertise CIO Council Update
Standards for success in city IT and construction projects
Arizona Health-e Connection Leadership from Governor Napolitano
Blockchain Adrian Zaragoza.
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
I’m a Workforce Board Member. Now, What Do I Do?
An Industry Perspective Nicole Denjoy COCIR Secretary General
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Legal Framework for Civil Registration, Vital Statistics
E-Commerce for Developing Countries (EC-DC)
Protecting Yourself from Fraud including Identity Theft
Outline Background: development of the Commission’s position
A Framework for the Governance of Infrastructure - Getting Infrastructure Right - Jungmin Park, OECD Budgeting & Public Expenditures Division 2019 Annual.
National Strategy for Trusted Identities in Cyberspace
League of Advanced European Neutron Sources
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

National Strategy for Trusted Identities in Cyberspace Jeremy Grant NIST

What is NSTIC? Called for in President’s Cyberspace Policy Review (May 2009): a “cybersecurity focused identity management vision and strategy…that addresses privacy and civil-liberties interests, leveraging privacy-enhancing technologies for the nation.”” Guiding Principles Privacy-Enhancing and Voluntary Secure and Resilient Interoperable Cost-Effective and Easy To Use NSTIC calls for an Identity Ecosystem, “an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.”

The Problem Today Usernames and passwords are broken Most people have 25 different passwords, or use the same one over and over Even strong passwords are vulnerable…criminals can get the “keys to the kingdom” Rising costs of identity theft 123% increase in financial institution Suspicious Activity Reports in last 6 years (FINCEN) 11.7 million est. victims over 2 years (BJS, 2008) $17.3 billion est. cost to economy over 2 years (BJS, 2008) Cybercrime is also on the rise Incidents up 22% from 2009 to 2008 (IC3 report) Total loss from these incidents up 111%, to $560 million.

The Problem Today Source: 2011 Data Breach Investigations Report, Verizon and USSS

No Seriously, There’s a Problem Today

There’s a Problem Today, Travel Edition

The Problem Today Identities are difficult to verify over the internet Numerous government services still must be conducted in person or by mail, leading to continual rising costs for state, local and federal governments Electronic health records could save billions, but can’t move forward without solving authentication challenge for providers and individuals Many transactions, such as signing an auto loan or a mortgage, are still considered too risky to conduct online due to liability risks Rob Cottingham, June 23, 2007 New Yorker, September 12, 2005 New Yorker, July 5, 1993

The Problem Today Privacy remains a challenge Individuals often must provide more personally identifiable information (PII) than necessary for a particular transaction This data is often stored, creating “honey pots” of information for cybercriminals to pursue Individuals have few practical means to control use of their information

Personal Data is Abundant…and Growing

Improved privacy standards Trusted Identities provide a foundation Economic benefits Improved privacy standards Enhanced security TRUSTED IDENTITIES Enable new types of transactions online Reduce costs for sensitive transactions Offer citizens more control over when and how data is revealed Share minimal amount of information Fight cybercrime and identity theft Increased consumer confidence

January 1, 2016 Privacy-enhancing Secure Interoperable The Identity Ecosystem: Individuals can choose among multiple identity providers and digital credentials for convenient, secure, and privacy-enhancing transactions anywhere, anytime. Privacy-enhancing Secure Interoperable Cost-effective and easy to use Apply for mortgage online with e-signature Online shopping with minimal sharing of PII Trustworthy critical service delivery Secure Sign-On to state website Security ‘built-into’ system to reduce user error Privately post location to her friends

We've proven that Trusted Identities matter DoD Led the Way DoD network intrusions fell 46% after it banned passwords for log-on and instead mandated use of the CAC with PKI. But Barriers Exist High assurance credentials come with higher costs and burdens They’ve been impractical for many organizations, and most single-use applications. Metcalfe’s Law applies – but there are barriers (standards, liability, usability) today that the market has struggled to overcome.

What does NSTIC call for? Private sector will lead the effort Federal government will provide support Not a government-run identity program Industry is in the best position to drive technologies and solutions Can identify what barriers need to be overcome Help develop a private-sector led governance model Facilitate and lead development of interoperable standards Provide clarity on national policy and legal framework around liability and privacy Act as an early adopter to stimulate demand

Privacy and Civil Liberties are Fundamental Increase privacy Minimize sharing of unnecessary information Minimum standards for organizations - such as adherence to Fair Information Practice Principles (FIPPs) Voluntary and private-sector led Individuals can choose not to participate Individuals who participate can choose from public or private-sector identity providers No central database is created Preserves anonymity Digital anonymity and pseudonymity supports free speech and freedom of association

Other countries are moving forward NSTIC is unique in that it is led by the private sector. Europe Norway and Sweden (Bank ID); Austria, Belgium, Estonia, Italy and Germany (general ID); France (health) North America Canada (issued strategy) Asia Taiwan (health); Hong Kong (transit, financial payments); Singapore (gov’t services); Malaysia (general ID, e-payment); India (general ID) Middle East Afghanistan (strategy); Oman (pending e-payment) Africa Rwanda (general ID) Latin America Brazil (banking)

Industry and Privacy Support Key members of the U.S. technology industry, the privacy community, and the security industry have expressed support for NSTIC “NSTIC has the opportunity to tip the balance of the conversation and focus on identity to socio-economic benefit from what is often today one of identity fraud and identity theft. In doing so trusted identities can improve the delivery and lower the cost to the public of financial services, health care, e-commerce and reduce the federal budget.” Salvatore D'Agostino, CEO, Idmachines LLC “Our industry strongly supports the goals outlined in the Strategy, and we see a vital role for a National Program office to work with industry and government in its finalization and implementation.” Letter to Sec. Locke, White House Cybersecurity Coordinator Howard Locke, and Patrick Gallagher from TechAmerica, Business Software Alliance, and Information Technology Industry Council; additional signatures included leadership from Microsoft, Symantec, PayPal, CA, CSC, RSA/EMC, Infineon , Unisys, Verisign and Gemalto and other technology firms “The Administration to my view has, has conducted a very open process here….I think that there's a model here perhaps for the broader question of cybersecurity.” Jim Dempsey, Vice President for Public Policy at the Center for Democracy & Technology

The Time is Now NSTIC vision is clear Technology is now mature Organizations and individuals want these solutions Market exists, but nascent NSTIC vision is clear Needs a nudge towards interoperability & standardization Needs clarity on national policy/legal framework (e.g. liability and privacy) Needs an early adopter to stimulate demand Government can meet these needs to facilitate private sector

Next Steps Workshops on governance, privacy and technology NOI published in June 2011 seeking input on governance; 57 responses Convene the Private Sector Governance: Establish NSTIC Steering Group in early 2012 Private sector led; focus on multi-stakeholder collaboration Enable expedited focus on consensus standards, policies and operating rules NIST grant to catalyze its formation Pilots: Establish new NSTIC Pilot Grant Program FY12 funding ~$10M Develop criteria for selection; assess potential programs Prepare for formal pilot launches in Summer 2012 Immediate Focus Ensure government-wide alignment with the Federal Identity, Credential, and Access Management (FICAM) Roadmap Increased adoption of Trust Framework Providers (TFP) Government as an early adopter to stimulate demand

Questions? Jeremy Grant jgrant@nist.gov 202.482.3050