JP Morgan spends $500 million per year on cyber security

Slides:



Advertisements
Similar presentations
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Advertisements

Basic Banking Services - Activity 1
Anti-Money Laundering (AML)
FDIC Money Smart for Young Adults
FIT3105 Smart card based authentication and identity management Lecture 4.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
HIGH INTENSITY DRUG TRAFFICKING AREA FINANCIAL MANAGEMENT DATABASE PROJECT.
Efficiency and Compliance Voice Documentation for Financial Services.
Identification Verification. Verification Required Election Day Registration Mail-in Only if Driver’s License # or Social Security # does not validate.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
1 Development of Cash Benefits Management Information System-CBMIS Sanja Andovska, Conditional Cash Transfers Project.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Jan 2017 Single.
“Every human will have a secure access to the Blockchain.”
When BPM meets Blockchain
Smart Data infrastructure
LIZ MOODY OPEN UNIVERSITY. LIZ MOODY OPEN UNIVERSITY.
Sandy Porter - Strategy Director Avoco Secure
BLOCKCHAIN APPLICATION IN CORE BANKING
Raihana Ferdous, Vallipuram Muthukkumarasamy
Chapter 5: The Art of Ensuring Integrity
Unique Identification Number Project
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Document verification and identity management
KrypC Technologies Accelerated Blockchain Adoption.
Inter operability of e-GP System
OUTLINE Generalization - Types of Smart Card Technology
Biometric Security Fujitsu Palm Vein Technology
THE STEPS TO MANAGE THE GRID
Blockchain initiatives
Own Your Identity.
Blockchain beyond cryptocurrencies
Digital Signature.
FinTech
Blockchain Adrian Zaragoza.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Global Smart Card Market 2018: Analysis, Opportunities and Forecast To 2025
SOLUTION LAND TITLES.
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Biometric Security Palm Vein Technology
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Red Flags Rule An Introduction County College of Morris
Privacy and Information
Emma Pham, Anna Cottone, Tailai Zhang, Scott Covington
Blockchain technology at Change Healthcare
Own Your Identity.
Legal Framework for Civil Registration, Vital Statistics
Securitization Sample
Other Sources of Information
Distributed Ledger Technology (DLT) and Blockchain
SOLUTION ID CARDS AND DRIVER’S LICENSES
A New Technology for Video Surveillance Cameron Serles
IT Audit Capacity Building
Protecting Yourself from Fraud including Identity Theft
Banking What is a bank? Banks are financial institutions that accept deposits from customers and lend money. These entities are for profit. What is a.
The Italian Academic Community’s Electronic Voting System
Global megatrends (relevant for our business)
“Every human will have a secure access to the Blockchain.”
Adroit Market Research +1 (214) Single Use License: US$ 4800 Request Sample Global.
E-identities (and e-signatures)
Presentation transcript:

JP Morgan spends $500 million per year on cyber security JP Morgan spends $500 million per year on cyber security! Your idea is highly feasible. The next step is to figure out the specifics of how this blockchain works. You refer to “the blockchain” but need to be more specific. Overall very nice. 87/100

Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang

$65.5 Billion 6.2% CAGR $11 Billion Cybersecurity Market Cumulative market value (2015-2020) 6.2% CAGR http://www.csoonline.com/article/3016035/government/what-does-federal-spending-in-2016-mean-for-the-cybersecurity-sector.html U.S. Federal Cybersecurity market  $11 Billion Estimated US Federal spending by 2020

US Social Security Administration Federal government regulated 1935, as part of the New Deal Social Security Program de facto national ID number Originally intended for one purpose: tracking a worker’s lifetime earnings Card issued 1946-1972 discouraged using SSN for ID purposes SSN is required for many legitimate activities including healthcare and financial services Widely shared, printed, and stored

Current State Inefficiencies Inconvenient: Many forms of ID issued by various entities SSN was created to track a worker’s lifetime earnings NOT to be a national identity card Insecure: Widely shared, printed, and stored (therefore, Identity theft is a risk) Carnegie Mellon researchers published an algorithm that can reconstruct SSN based on publicly available personal info

Identity Card – Public Key About Our Company What is ? What does do? Security technology company Software developer Contractor to the U.S. government Manages transfer of personal identity onto the blockchain Maintains identity records on blockchain Facilitates verification of identity From many identity cards.. To one Public Key… 8181 3268 159E 51D1 Identity Card – Public Key

transfers personal identity verification of identity How it works transfers personal identity onto the blockchain 1 facilitates verification of identity 2 2018 2019 2020 2036 Babies born Adults Adults Turn 18 yrs old Birth record and biometric data are created Identity is encrypted with private key and added to Blockchain Parents can access private key, if needed Identity is put on Blockchain due to: Marriage license Passport issuance Criminal record Drivers license Adults can use keys to prove identity and institutions can verify identity using interface Private key is transferred from parents to child Biometric data is updated Identify can now be verified via interface

transfers personal identity verification of identity How We make Money transfers personal identity onto the blockchain 1 facilitates verification of identity 2 2018 2019 2020 2036 Babies born Adults Adults Turn 18 yrs old Activities: Blockchain birth tech Database – public/private keys Software Key Generator Biometric data Training Mining Blocks Software for city county officers Training on key issues Call center Biometric data infrastructure API releases Network effect Consulting services Financial Services Mortgages Loans Cars Bank Accts API releases Network effect Consulting services Financial Services Mortgages Loans Cars Bank Accts

Solution to Current State Inefficiencies Inconvenient: Many forms of ID issued by various entities SSN was created to track a worker’s lifetime earnings NOT to be a national identity card One single identity verification tool – public key Insecure: Widely shared, printed, and stored Carnegie Mellon researchers published an algorithm that can reconstruct SSN based on publicly available personal info Secure ecosystem using blockchain technology Biometrics and passcode for verification

Technical Feasibility Software Customized blockchain interfaces for: hospitals/clinics (birth) county clerk (marriage) USPS/Dept of State (Passport) DMV (Drivers license) Law Enforcement Agency (Criminal record) API for Institutions Hardware Hardware security modules (stores private keys) Mining Machines Data Centers Integrated biometric machines Biometric Collection tools/technologies Analysis of human biometrics into code Biometrics to authorize private key

Gov’t / Societal Feasibility Strengths Efficiency & Secured: blockchain is immutable and avoid identity fraud Cost Reduction: reduce the repetitive work of different departments Easy to access: the system has the potential to offer service for other commercial purpose Government General Public Challenges Lobbying for the government investment Common standards across all government agencies General public flat learning curve Solutions Estonia and Singapore already introduced the concepts of e-residents Customized interfaces/systems for different agencies Create communication and implementation plan – different phases (baby, adult)

Future Potential Applications Digital signature can be more secured and efficient, avoid fraud Identity and payment records on blockchain E-voting: speed up, simplify and reduce the cost of elections Open APIs for other application (e.g. Education, Financial Institutions, etc.) Potential application of this technology can be expand passport, marriage record, criminal record, driver licenses, etc.