The Next Generation Identity Verification and Assured Rights Management Preventing Cybercrime and Protecting Privacy.

Slides:



Advertisements
Similar presentations
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Advertisements

Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
August, Company History Founded in 1993, public since 1997 Headquartered in Wall, NJ with a development office in Eagan, MN Fast and highly discriminating.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
1 Data Strategy Overview Keith Wilson Session 15.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
PIV 1 Ketan Mehta May 5, 2005.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
Settling the Frontier: The Convergence and Impact of Privacy and Security Practices Chris Israel Deputy Assistant Secretary for Technology Policy U.S.
Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
STATE OF GEORGIA OFFICE OF INSPECTOR GENERAL Fraud Risk Within State Government.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Department of Industrial Engineering Sharif University of Technology Session # 12.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security Mindset Lesson Introduction Why is cyber security important?
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Information Security Program
Space Hellas Corporate Presentation
Journey to Microsoft Secure Cloud
Today’s Risk. Today’s Solutions. Cyber security and
Data Security Team 1.
8 Building Blocks of National Cyber Strategies
Company Overview & Strategy
MICROSOFT AZURE ISV PROFILE: ONEBE
Protecting your data with Azure AD
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Web Information Systems Engineering (WISE)
Presentation transcript:

The Next Generation Identity Verification and Assured Rights Management Preventing Cybercrime and Protecting Privacy

Company Profile Founded in 2011 Founder and CEO – John Napoli President – Rich Wilcox Headquartered in Centennial, CO with offices worldwide serving the public and private sectors Privately-owned LLC Mission: Develop and implement the next generation of identity management and assured rights management for enterprises of all sizes, establishing ourselves as the ultimate response to the worldwide escalation of cyber fraud.

How much is cybercrime costing? A report by McAfee and think tank CSIS puts the annual hit to the global economy at more than $400 billion. The report characterizes this estimate as conservative.report The Question: If industry is spending hundreds of millions on cyber security efforts, then why are we continuing to lose billions of dollars? Many of the current solutions are not addressing the causes. There is more emphasis on detection and response and not prevention. The Cost

Primary Cause Impersonation of a valid user enables most data breaches (the person is not the person) There are two primary reasons: 1.Identity verification is inadequate in many enterprises 2.Effective rights management and access controls are lacking in most enterprises User ID’s and passwords offer little protection

Example 1 Commercial breaches in the news every week – “Saudi ARAMCO clearly points to administrative and privileged accounts as the priority target….” – “Data breach at home improvement retailer Home Depot” – “JP Morgan Chase hack impacted more than 80 million accounts” – “eBay announced it is aware of unauthorized access….” – Sony hack – Intellectual property and privacy lost – Subcontractor credential compromised – Weak rights management – Poor auditing and alerts

Example 2 Government Homeland Security Presidential Directive 12 (HSPD-12): Policy for a Common Identification Standard for Federal Employees and Contractors – Directed development and use of interoperable smart ID cards for all US federal government employees and contractors for physical and logical access Approximately 10 years later – 96% of employees have been issued cards – Unfortunately, many are used for physical access only; many as flash passes Where credentials are used for logical access – Rights management systems are weak and; – Credentials are not integrated with existing systems – They are not used enterprise wide

Assured Rights Management

Chain of Trust The SolPass Value Proposition: Prevents fraud and cyber crime Saves money Creates a competitive advantage

The Pass Biometrics held here – not on the server One-to one relationship between the Pass and the user; One-to-one relationship between the Pass and the Gatekeeper through the SolPass Platform for each session; Therefore, one-to-one relationship between the user and the server for each session Data storage moves to the Pass Form factor does not matter

The Platform Affordable (less expensive than the standard platform) Efficient migration on a rollout basis Flexible configuration Online or offline use Forensic wipe after each transaction (no local storage on the Platform ) No retraining required A single Pass can be used through any SolPass Platform Can be used in open environments

The GateKeeper Works with all current or future platforms Works with existing rights management (if desired) SolPass GateKeeperPlus provides granular rights management Serves as the trust broker and rights manager (if desired) Easily configured to fully implement enterprise security policy Enterprise user data never stored outside the enterprise Facilitates migration

You can make any device a SolPass device with three external components: Terminal drive-to-go certified Biometric sensor Pass

Partner Opportunities The SolPass solution will be implemented through a number of partners: Consulting : To establish a baseline, review and advise on the security policies, and review and advise on the rights management scheme. Implementation and Integration: SolPass will license our solution to companies with the necessary skills to implement our solution. Managed Service: Partners would build our solution under license as their own infrastructure and offer managed services to their customers. Manufacturing and Engineering Services: To modify and manufacture existing devices (computers, tablets, smart phones, ancillary devices) to make them more secure. Sustaining Support Services : Companies that provide support services and have a proven track record in this area.

The Managed Service Solution

What Will SolPass Do For You? Assured identity verification – Biometrics based (only on the pass) – Individual, role or group member Rights assigned on the GateKeeper ; stored only on the GateKeeper and the Pass – Access control through the existing rights management system, or –GateKeeperPlus - executed granular rights management Enforces enterprise security policies (imposes no additional processes) Access as granular as needed – Internal users IAW enterprise security policy – Subcontractors and partners IAW enterprise security policy – Specialized controls – Transaction-based access Implementation at your own pace – Migration assistance with GateKeeperPlus Migration – Measured investment Platform independent

What Is Needed? Commitment Education and Cultural Shift – Many, including senior leaders, do not understand the threat – Anonymity and privacy are not the same, nor are they mutually exclusive The next generation of solutions: – Biometrically enabled – Consistent and secure chain of trust from the user to the enterprise – Human out of the loop – Protection against malware – Assured rights management/access control – Standards compliance/interoperability – Auditing