© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010.

Slides:



Advertisements
Similar presentations
Metropolitan Transportation Authority New Fare Payment Systems Update Presentation to Capital Program Oversight Committee May 23, 2011.
Advertisements

© 2012, Region One Education Service Center P-CARD BEST PRACTICES AND COMMON PITFALLS Frances Guzman Deputy Director for Business Operations and Finance.
Credit and Credit Cards
Mobile payment and Sonera. Finland as a Mobile Commerce Lab Mobile penetration 84% - no handset subsidy Hardly at all prepayment subscribers Premium rate.
Financial Education Jr. Chapter 2013 SHPE Foundation.
Building Bucks Basic Financial Services. Financial Institutions 3 Main Types – Banks – Credit Unions – Savings and Loan Associations (S&L) Advantages.
Guest Charges, Payment, and Check-out
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Final Exam Review.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Managing Your Credit 2014/2015 Office of Student Financial Assistance.
1 Identity Theft and Phishing: What You Need to Know.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Sample Check Register. Sample Blank Check Register.
 How to Manage Your Cash › Daily Cash Needs  Lunch, movies, gas, or paying for other activities  Carry cash  Go to an ATM  Credit Card  Know pros.
ATM with Biometric Technology
The Rental Exchange Julie Alexander Income Collection Policy.
By: Monika Achury and Shuchita Singh
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Component-Based Software Engineering Introducing the Bank Example Paul Krause.
The Journal and Source Documents
4.01 Accounting and Finance. What is Accounting? Method of reporting financial activity of a business Financial transactions recorded in an orderly fashion.
President Vice President Accounts Asst. VP Savings Asst. VP Checking Asst. VP Mktg Vice President Commercial Accounts Asst. VP Loans Asst. VP Services.
Unit 5 BANKING –Banking Basics
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Internal Control and Cash Chapter 8 Define internal control. Objective 1.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
. VISA The Payments Ecosystem VISA Barriers to Scale Interoperability Infrastructure KYC.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
17-2 Financial Services and Electronic Banking. Types of financial services Savings services Financial institutions accept money for safekeeping. A broad.
Financial Institutions, Checking Accounts, and Credit Lesson 3.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
CHAPTER 8: ACCOUNTING DECISION MAKING BY THE NUMBERS.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Money Management Strategy
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
 How to Manage Your Cash › Daily Cash Needs  Lunch, movies, gas, or paying for other activities  Carry cash  Go to an ATM  Credit Card  Know pros.
Transaction Processing System  Business Transactions are certain events that occur routinely in a business firm.  A transaction is a set of activities.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
PIV 1 Ketan Mehta May 5, 2005.
Warm Up – Pick which bank you would like to deposit your money in. Give 2 reasons for picking the bank. CriteriaWells FargoA Plus FCUBank of America Savings.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
WEEK 1 INTRODUCTION Interpret Financial Information.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Information Security Sharon Welna Information Security Officer.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Tara Backes – Project Manager Troy Wilson – Chief Technology Officer Susan Pommier – Project Executive.
You. are at risk for the fastest growing crimes crime.
SABRE VIRTUAL PAYMENTS Karen Frayer Sabre Virtual Payments Manager.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Protecting Your Assets By Preventing Identity Theft 1.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Protecting Your Assets By Preventing Identity Theft
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Own Your Identity.
Own Your Identity.
Automated Fare Collection 2.0 Next Generation MBTA Fare System
Citi Commercial Cards – Fraud Early Warning
Presentation transcript:

© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010

© 2010 IBM Corporation Governments leverage many forms of information… …to establish ones identity footprint Public Records Commercial Information Biometrics Other Government IDs

© 2010 IBM Corporation But each step of the identity process can be exploited… Proofing documents can be fraudulent or fraudulently obtained Commercial evidence of identity – utility bills, credit cards, bank statements – speak to ability to pay, not identity Biometrics dont work for every person/application and some can be spoofed … resulting in identities that cannot be trusted Knowledge-based authentication: possession of a key or correct information may be problematic More secure identity documents may decrease vigilance and increase risk

© 2010 IBM Corporation A strategy for establishing greater trust in identities Start with solutions that consider the importance/value/risk of each identity and transaction Implement identity as a brokered service – tap into ID data where it resides rather than assembling a massive database of sensitive personal data Better use what already exists: clean up and leverage existing data Constantly monitor, assess and risk score the accuracy/integrity of data sources Conduct thorough and continuous vetting of every enrollee & user Obtain, manage and regularly update user consent Exceptions will occur! Solutions must handle them expeditiously to avoid security vulnerabilities

© 2010 IBM Corporation Sally checks in at airport using her government ID A Day in the Life of a Trusted Identity User Sally is off to a business meeting with a client in another city Sally stops at an ATM to reload her bank card Sally zips thru airport security via the fast-path lane At destination Sally takes subway using her bank card Sally has lunch at a local deli, pays with her employee ID Sally uses her bank card to access her hotel room Sally stops by a local office after client meeting Sally unlocks and starts the car with her fingerprint key fob Sally checks in for her return flight using her government ID Sally auto-registers in the clients visitor system with her employee ID Sally checks into hotel using her bank card and government ID After work Sally buys dinner with her bank card Sally leaves her house, locking up with a swipe of her finger Sally authorizes stock sale with her mobile device Sally checks her eBay account using her mobile phone to pay via PayPal Sally accesses her corporate network using her employee ID Sally buys from a vending machine with her mobile phone

© 2010 IBM Corporation Questions/Comments? Denny Carlton: