Andrew Nash Senior Director of Identity Services Topics in Identity and Payments.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Economic Tussles in Federated Identity Management Tyler Moore joint work with Susan Landau WEIS 2011.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
Silo Compliance Risk vs. Enterprise Compliance Risk Presented to: ORIMS PD Day By: Joe Hardy & Tony Carlisle.
E-Commerce Technologies for Web Applications. Overview Introduction in E-Commerce - Numbers and Projections Engineering – Layers of E-Commerce - Credit.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
PROTECTION OF CONSUMER & PROPERTY RIGHTS CE.13E. Question What is the role of the United States government in protecting consumer rights and property.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
E-Business and E-Commerce
Private, Secure, Guaranteed ACH Credits – The Next Generation of Online Payments Samantha Carrier, Director, eCommerce, NACHA.
DSCI Framework- Pilot Implementation. Operational Locations Different project groups Different client Geographies Different services Exposes PI through.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Building User Trust Online Sarah Andrews International Conference on the Legal Aspects of an E-Commerce Transaction The Hague October 2004.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Key Bank - Enterprise Architecture Group 1 Mobile financial services “Barriers To Adoption” Sustainable Computing Consortium April 1 st, 2003 Andrew J.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Stuff, including interfederation stuff Dr Ken Klingenstein, Director, Middleware and Security, Internet2.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Manage Your Risk Utilizing Collaborative Partnerships to analyze, simplify, compare & strategize.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
E-Authentication in Higher Education April 23, 2007.
1 Fast, secure checkout across the Web. 2 Opportunities in E-Commerce * 2006 State of Retailing Online, Shop.org/Forrester 2006 Consumer Purchases by.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Pamela J. Johnson Managing Director, Global Head, AML & Sanctions Compliance Citigroup Inc.
Copyright © 2007 Microsoft Corporation. All Rights Reserved. Claims-based Identity Beyond Identity Silos 1st European Identity Conference 2007 Don Schmidt.
Introduction to Health Policy and Law Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
An Information Security Management System
Identity and Access Management
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Sandy Porter - Strategy Director Avoco Secure
EMV® 3-D Secure - High Level Overview
October 27, 2016 EMV 3DS Seizing the opportunity to enhance security and deliver a great consumer experience September 22, 2018.
Building A Community of Trust to Transform Medicines Development
Richard Purcell Corporate Privacy Officer Microsoft Corporation
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Legal Issues in Blockchain
Securitization Sample
E-Commerce and Economic Forces
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
Credit Card Convenience Fees Charged by 3rd Party
Reiniger LLC.
Making TA Work & Accessible for CS PRs
Presentation transcript:

Andrew Nash Senior Director of Identity Services Topics in Identity and Payments

Progress in Identity “Ownership” Enterprise Centric 12 Federated Partners 3 User Centric Social Networks Mashups Web 2.0 Tagging e-commerce Finance

Participants People Services Identity Services Attribute Providers

Credit Card Ecosystem Multiple Value Flows Merchant Consumer Acct IssuerAcquirer Card Network merchant discount usage fees/awards Switch fee /assessment Interchange fee

Service Transactional Opportunity identity service Consumer Claims Fraud/Risk Reduction Targeted Marketing Reduced Friction Increased Checkout Completion cookies historical data checkout- time identity

The Identity Trust Gradient Low Value High Value None Extreme Transaction “value” Regulatory / Compliance / Risk Blogs Social Networks Shopping Financial Health Intelligence Agency Shopping

Levels of Assurance Gaps Unlike NIST, risk based systems are not a one time identity proofing exercise Continual verification of identity “goodness” –Context, transaction history, behavior, … Enhancement to authentication –Triggers for step-up authentication

Brokerage Values Reduce # of identity sources service providers build business and legal relationships with Act as consumer advocate Create a simplified policy view across domains Simply integrate user attribute management Provide an integration point for multiple sources of information from attribute providers Amortize costs of higher value features including 2FA

Role of IDP? Consumer IDP “I am very privacy conscious” “All information should be free” “Help keep me safe” “Assurance Level 3” “Moderate levels of private information ” “Anonymous is ok” Consumer Agreements Relying Party Contracts Information Classification Attribute Providers

The Three Laws of Consumer ID Svcs 1.An ID Svc may not injure a consumer, or through inaction, allow a consumer to come to harm. 2.An ID Svc must obey orders given by consumers, except where such orders would conflict with the 1 st Law. 3.An ID Svc must protect its own existence as long as such protection does not conflict with the 1 st or 2 nd Law.