SlideShare a Scribd company logo
1 of 36
The Importance of
Identity Management
Darryll Robinson
Manager: Fraud and Identity Solutions
@DarryllRobinson
Darryll Robinson
What is Identity Management?
• Wikipedia
“…identity management (IdM) describes the
management of individual principals, their
authentication, authorization,[1] and privileges
within or across system and enterprise
boundaries[2] with the goal of increasing
security and productivity while decreasing cost,
downtime and repetitive tasks”
What is Identity Management?
• CIO
“Identity management is a term that refers
broadly to the administration of individual
identities within a system, such as a company, a
network or even a country.”
We know what it is!
And we know what it isn’t
Identity Management
back when
Humans evolved to classify things
Safe Dangerous
Humans evolved to classify things
Safe Dangerous
Humans evolved to classify things
Safe Dangerous
Humans evolved to classify things
Safe Dangerous
What is Identity Management now?
Real world has moved online
How do we tell avatars apart?
This guy…
… was pretending to be this gal
Why is Identity Management
important?
It’s a huge risk throughout the customer
lifecycle
Manage
RetainCollect
Acquire
What can be done?
Multi-Factor Authentication (MFA)
• Knowledge – something only the user
knows
• Possession – something only the user has
• Inherence – something only the user is
Knowledge
• something only the user knows
• PIN Code
• Password
• Questions
Possession
• Something only the user has
• Cell phone
• Token
• Smart card
Inherence
• Something only the user is
• Fingerprint
• Voice print
• Facial print
Time and location
• Somewhere only the user is
• More than 1 location at the same time
• More than 1 access request at the same
time
Benefits of knowing
your customer
The obvious ones
• Reduce third party fraud
The obvious ones
• Reduce third party fraud
• Improve customer relationship
management (KYC)
The obvious ones
• Reduce third party fraud
• Improve customer relationship
management (KYC)
• Open up account management
A bit more about
Account Management
• Password reset
• Password reset
• Address update
• Password reset
• Address update
• Paperless account opening
The less obvious ones
• Ticket sales
• In-store purchases
• Check-in
Recap
• We know what Identity Management is
• We know why it’s important
• We know what can be done
– Multi-Factor Authentication
• The possibilities are endless
Questions

More Related Content

Similar to The Importance of Identity Management and Security

McKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But WhenMcKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But WhenMcKonly & Asbury, LLP
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"Sameh Hassan
 
Technology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketingTechnology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketingSarah Pooley
 
Technology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketingTechnology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketingSarah Pooley
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionTimetogrowup
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Facundo Mauricio
 
LegalShield_ID_Shield_presentation_October_6_2015
LegalShield_ID_Shield_presentation_October_6_2015LegalShield_ID_Shield_presentation_October_6_2015
LegalShield_ID_Shield_presentation_October_6_2015Angela C Valentino
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCBesart Qerimi
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 

Similar to The Importance of Identity Management and Security (20)

58th ICCA Congress | Cyber Security
58th ICCA Congress | Cyber Security58th ICCA Congress | Cyber Security
58th ICCA Congress | Cyber Security
 
McKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But WhenMcKonly & Asbury Webinar - Fraud Not If, But When
McKonly & Asbury Webinar - Fraud Not If, But When
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Fraud prevention
Fraud preventionFraud prevention
Fraud prevention
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"
 
Technology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketingTechnology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketing
 
Technology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketingTechnology Talks - mapping the user journey and buyer persona marketing
Technology Talks - mapping the user journey and buyer persona marketing
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
LegalShield_ID_Shield_presentation_October_6_2015
LegalShield_ID_Shield_presentation_October_6_2015LegalShield_ID_Shield_presentation_October_6_2015
LegalShield_ID_Shield_presentation_October_6_2015
 
5 emma aa 24 may13
5 emma aa 24 may13 5 emma aa 24 may13
5 emma aa 24 may13
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Bill Spruill | BoS USA 2022
Bill Spruill | BoS USA 2022Bill Spruill | BoS USA 2022
Bill Spruill | BoS USA 2022
 

The Importance of Identity Management and Security