SlideShare a Scribd company logo
1 of 20
1 © FIDO Alliance 2022
FIDO Authentication:
Unphishable MFA for All
Andrew Shikiar
Executive Director and CMO
FIDO Alliance
January 25, 2022
2 © FIDO Alliance 2022
Just last week…
3 © FIDO Alliance 2022
Some Predictions for 2022
 Phishing attacks will continue to succeed
 MFA bypass attacks will become mainstream
4 © FIDO Alliance 2022
Some (Happier) Predictions for 2022
 Enterprise passwordless
deployments will grow
rapidly
 Mobile platforms will provide
consumer-ready solutions at
scale
5 © FIDO Alliance 2022
PHISHING RESISTANT
A fundamental shift is required
• Stored on a server
• SMS OTP
• KBA
• Passwords
• On-device
(never on a server)
• Local Biometric / PIN
• DocAuth
• Passkeys
From legacy, knowledge-based credentialing
In your head (remembered)
To modern, possession-based credentialing
In your hand
5
SUSCEPTIBLE TO COMMON THREATS
6 © FIDO Alliance 2022
6
Security
Usability
Poor Easy
Weak
Strong
=
Single Gesture
Possession-based Authentication
Open standards for simpler,
stronger authentication using
public key cryptography
Industry imperative: Simpler and stronger
7 © FIDO Alliance 2022
Backed by global tech leaders
7
+ Sponsor members + Associate members + Liaison members + Government members
8 © FIDO Alliance 2022
2021
Devices Support
FIDO
5 Billion+
FIDO Certified
Products
850+
People are using
passwordless methods
each month*
150
million+
*Microsoft
8
9 © FIDO Alliance 2022
The path towards ubiquity
9
Hello
10 © FIDO Alliance 2022
10
11 © FIDO Alliance 2022
The FIDO imperative in government
Create Simpler Sign-in
Experiences
Enable Trust in the
Government Ecosystem
Protect Online
Accounts for Citizens and
Employees
12 © FIDO Alliance 2022
FIDO brings a new paradigm for user authentication
FIDO specifications offer governments
newer, better options for strong
authentication…
…but governments have had to update
some policies to support the ways in which
FIDO is different.
12
As technology
evolves, policy
needs to evolve
with it.
13 © FIDO Alliance 2022
Delineation is being drawn between legacy
MFA and phishing-resistant MFA.
FIDO Authentication is emerging as a preferred choice of governments around the world.
Most governments had not heard of FIDO.
Regulations focused largely on OTP or PKI.
2015
2022
14 © FIDO Alliance 2022
Growing trend of government recognition of FIDO
14
15 © FIDO Alliance 2022
15
Growing trend of government recognition of FIDO
16 © FIDO Alliance 2022
16
CISA: FIDO keys are the “Gold Standard” of MFA
“FIDO stands for "Fast IDentity Online" and is
considered the gold standard of multi-factor
authentication.
The FIDO protocol is built into all major browsers
and phones. It can use secure biometric
authentication mechanisms – like facial
recognition, a fingerprint, or voice recognition –
and is built on a foundation of strong
cryptography. Often it uses a physical device – a
key – essentially an encrypted version of a key to
your house.”
17 © FIDO Alliance 2022
OMB: Focus on phishing-resistance
Highlights
• For agency staff, contractors, and partners:
phishing-resistant MFA is required.
• For public users: phishing-resistant MFA must
be an option.
“Agencies’ highest priority should be to rapidly implement a requirement for phishing-resistant verifiers,
whether this is PIV or an alternative method, such as WebAuthn.”
18 © FIDO Alliance 2022
FIDO is becoming part of the web’s DNA
Industry standardization and collaboration
Shipping in devices and platforms at massive scale
Strong regulatory and government embrace
19 © FIDO Alliance 2022
Here’s how we get to a phishing-resistant future
Replace password logins with Biometrics or Keys
No knowledge-based authentication for ID proofing
Replace passwords with FIDO keypairs
20 © FIDO Alliance 2022
Thank you.

More Related Content

What's hot

What's hot (20)

Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
Azure ADとIdentity管理
Azure ADとIdentity管理Azure ADとIdentity管理
Azure ADとIdentity管理
 
U2F/FIDO2 implementation of YubiKey
U2F/FIDO2 implementation of YubiKeyU2F/FIDO2 implementation of YubiKey
U2F/FIDO2 implementation of YubiKey
 
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
 
User Management Life Cycle with Keycloak
User Management Life Cycle with KeycloakUser Management Life Cycle with Keycloak
User Management Life Cycle with Keycloak
 

Similar to FIDO Authentication: Unphishable MFA for All

Similar to FIDO Authentication: Unphishable MFA for All (20)

Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
FIDO2 - The Easiest Path to Strong Authentication
FIDO2 - The Easiest Path to Strong AuthenticationFIDO2 - The Easiest Path to Strong Authentication
FIDO2 - The Easiest Path to Strong Authentication
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 

More from FIDO Alliance

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

More from FIDO Alliance (20)

OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
 
Tokyo press 2019 slides presentations
Tokyo press 2019 slides presentationsTokyo press 2019 slides presentations
Tokyo press 2019 slides presentations
 

Recently uploaded

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

FIDO Authentication: Unphishable MFA for All

  • 1. 1 © FIDO Alliance 2022 FIDO Authentication: Unphishable MFA for All Andrew Shikiar Executive Director and CMO FIDO Alliance January 25, 2022
  • 2. 2 © FIDO Alliance 2022 Just last week…
  • 3. 3 © FIDO Alliance 2022 Some Predictions for 2022  Phishing attacks will continue to succeed  MFA bypass attacks will become mainstream
  • 4. 4 © FIDO Alliance 2022 Some (Happier) Predictions for 2022  Enterprise passwordless deployments will grow rapidly  Mobile platforms will provide consumer-ready solutions at scale
  • 5. 5 © FIDO Alliance 2022 PHISHING RESISTANT A fundamental shift is required • Stored on a server • SMS OTP • KBA • Passwords • On-device (never on a server) • Local Biometric / PIN • DocAuth • Passkeys From legacy, knowledge-based credentialing In your head (remembered) To modern, possession-based credentialing In your hand 5 SUSCEPTIBLE TO COMMON THREATS
  • 6. 6 © FIDO Alliance 2022 6 Security Usability Poor Easy Weak Strong = Single Gesture Possession-based Authentication Open standards for simpler, stronger authentication using public key cryptography Industry imperative: Simpler and stronger
  • 7. 7 © FIDO Alliance 2022 Backed by global tech leaders 7 + Sponsor members + Associate members + Liaison members + Government members
  • 8. 8 © FIDO Alliance 2022 2021 Devices Support FIDO 5 Billion+ FIDO Certified Products 850+ People are using passwordless methods each month* 150 million+ *Microsoft 8
  • 9. 9 © FIDO Alliance 2022 The path towards ubiquity 9 Hello
  • 10. 10 © FIDO Alliance 2022 10
  • 11. 11 © FIDO Alliance 2022 The FIDO imperative in government Create Simpler Sign-in Experiences Enable Trust in the Government Ecosystem Protect Online Accounts for Citizens and Employees
  • 12. 12 © FIDO Alliance 2022 FIDO brings a new paradigm for user authentication FIDO specifications offer governments newer, better options for strong authentication… …but governments have had to update some policies to support the ways in which FIDO is different. 12 As technology evolves, policy needs to evolve with it.
  • 13. 13 © FIDO Alliance 2022 Delineation is being drawn between legacy MFA and phishing-resistant MFA. FIDO Authentication is emerging as a preferred choice of governments around the world. Most governments had not heard of FIDO. Regulations focused largely on OTP or PKI. 2015 2022
  • 14. 14 © FIDO Alliance 2022 Growing trend of government recognition of FIDO 14
  • 15. 15 © FIDO Alliance 2022 15 Growing trend of government recognition of FIDO
  • 16. 16 © FIDO Alliance 2022 16 CISA: FIDO keys are the “Gold Standard” of MFA “FIDO stands for "Fast IDentity Online" and is considered the gold standard of multi-factor authentication. The FIDO protocol is built into all major browsers and phones. It can use secure biometric authentication mechanisms – like facial recognition, a fingerprint, or voice recognition – and is built on a foundation of strong cryptography. Often it uses a physical device – a key – essentially an encrypted version of a key to your house.”
  • 17. 17 © FIDO Alliance 2022 OMB: Focus on phishing-resistance Highlights • For agency staff, contractors, and partners: phishing-resistant MFA is required. • For public users: phishing-resistant MFA must be an option. “Agencies’ highest priority should be to rapidly implement a requirement for phishing-resistant verifiers, whether this is PIV or an alternative method, such as WebAuthn.”
  • 18. 18 © FIDO Alliance 2022 FIDO is becoming part of the web’s DNA Industry standardization and collaboration Shipping in devices and platforms at massive scale Strong regulatory and government embrace
  • 19. 19 © FIDO Alliance 2022 Here’s how we get to a phishing-resistant future Replace password logins with Biometrics or Keys No knowledge-based authentication for ID proofing Replace passwords with FIDO keypairs
  • 20. 20 © FIDO Alliance 2022 Thank you.

Editor's Notes

  1. Pleasure to be here today, and flattered to follow Eric’s opening comments Have been here the past few years – for those of you who have attended this will provide you with updates on the substantial progress we’ve made in 2021 For those who are newer to FIDO, I hope that this talk gives you a good feel for the imperative that FIDO is seeking to address – which is the need not just for ‘check the box’ MFA, but a truly unphishable foundation to secure for a variety of connected services that are critical to today’s networked society
  2. Sadly, one thing I can always count on when giving this sort of presentation is a relevant and recent example of a remote attack on sensitive resources [click] Indeed, just last week we saw a phishing attack on the Dept of Labor. Elsewhere in the world, Singapore has been rocked by an SMS phishing scheme where hackers sent SMS messages that actually had phishing links, including for OTP codes. The Singpoare Monetary Authority is now scrambling to implement new regulations on SMS-oriented banking communications while thousands of customers are trying to recover tens of millions of dollars.
  3. Phishing attacks will grow because hackers like making money, in addition to causing chaos. They’re relatively cheap to execute and have a staggering success rate.. 50% + But that’s not really new – I could have made the same prediction in each of the past several years and have been 100% correct. My headline prediction for 2022 is that MFA bypass attacks will become mainstream. Here are two examples from just this year – attacks on two hugely valuable brands
  4. But it’s not all doom and gloom.. There’s plenty of good news too. In general, there’s more awareness of the inherent risk of passwords – and Gartner has cited passwordless authentication as a technology to deploy NOW, with FIDO and FIDO security keys cited as the preferred method. This is one reason why we’re seeing so much VC investment in the digital identity landscape – our vendor community is struggling to keep up with all of the demand, which certainly is a good ‘problem’ to have [click] Beyond the enterprise, I’m confident that we’ll see solutions emerge from mobile platforms emerge this year that can bring truly passwordless login alternatives to the masses
  5. Coming back to my prediction from a few slides ago -- *this* is the delineation that we need to see industry and regulators make – the distinction between legacy and modern authentication. Between knowledge-based and possession-based. “Check the box” MFA simply won’t cut it for much longer, and frankly isn’t needed as the availability and scalability of unphishable FIDO authentication continues to grow.
  6. FIDO’s goal from day one was to transform the market away from dependence on centrally stored shared secrets to a model that uses public key cryptography and allows consumers to authenticate through devices that they literally have in their fingertips every day. It’s simpler and stronger authentication. This vision has been realized through several sets of specifications since 2015, and also has seen rapid deployment – which we’ll touch on in a few
  7. In case you’re not familiar with who is driving FIDO’s efforts, this is our Board of Directors…
  8. Look at the numbers – 5 billion devices support built-in cryptographic strong authentication, the products are in market to help service providers move beyond passwords  and 150 million people are using passwordless methods each month – and that’s just from Microsoft. In practice we’re looking at many more than that.
  9. For FIDO to achieve our audacious goal of providing simpler, stronger authn for all, we need to have endpoint support. This has been a huge focus of the Alliance since our inception and we’ve attacked this through collaboration with groups like W3C, which has led to broad FIDO support in every major web browser. Additionally, all of the major OS vendors are core FIDO stakeholders and have built native FIDO support into their devices. Virtually every device being unboxed today has built-in support for FIDO Authn. This sets the stage for industry to move beyond passwords.
  10. Which has only helped accelerate the growing number of service providers that are leveraging FIDO
  11. As we look at government, the FIDO imperative is similar to that of industry in several ways, but there are also distinct requirements. click Trust is overlooked sometimes when it comes to authentication – but it’s a core element for all constituents (employees, citizens, agencies, partners/suppliers)..
  12. You’ve already heard from Eric and you’ll hear other perspectives shortly – but FIDO’s blend of security, usability and deployability have forced new thinking from governments – which is ongoing. Simply put, as technology evolved, policy needs to evolve with it.
  13. To wit, when FIDO started engaging with governments back in 2015, most had not heard of FIDO – and in fact, most were just implementing or finalizing regulations that were largely focused on OTP or PKI. Fast forwarding to 2022, not only are more governments aware of FIDO, but they’re actively driving conversation on the delineation between legacy and phishing-resistant MFA. Thanks Venable!
  14. And FIDO is also often cited in government guidance documents – as Eric talked about earlier, and as others will speak to later today. Outside of the US we see groups like the Australian Cyber Security Centre and the UK Govt Digital Serivce and Cabinet Office explicitly recommending utililzation of FIDO Security keys to help secure govt services
  15. Identity coming to the fore in government in general: Identity is now seen as critical infrastructure – right alongside the nation’s power grid You see the CISA references, and also the Biden EO on MFA Outside of the US there are critical identity initiatives also taking place – including eIDAS and National ID wallets in Europe
  16. It’s worth highlighting the latest CISA guidance on MFA, which cites FIDO and FIDO security keys as the gold standard of MFA. Many thanks to Jen Easterly and her remarkable team for the work that they’re doing.
  17. We heard earlier from Eric Mill in his opening address – but for those of you who may have arrived late, it’s worth highlighting these aspects of the OMB zero trust strategy Specifically, the push on *any* phishing-resistant MFA for agency workers, and also as an option for public users. Look, PIV and CAC are great – but the fact of the matter is that FIDO Security Keys from companies such as Yubico, OneSpan and Feitian present a lower-friction option for agencies to deploy in rapid fashion
  18. So to start to wrap things up, I’d like to look at a few of FIDO’s objectives – the first of which is to become part of the Web’s DNA This is an objective because it is *necessary* for our mission to be successful. Passwords are part of our lives because they’re ubiquitious and part of the web’s DNA – simply put, we need to supplant them. There are three key steps that any technology needs to achieve to reach this goal..
  19. Once that’s accomplished, our primary objective is to enable a phishing-resistant future. Here’s what we have to do to get there. Changing user behavior. Not using a password is easier than trying to remember a password, but trying to change user behavior is difficult. We did a UX study last year and it was fascinating to see consumers’ reactions to using what ultimately is a more user-friendly solution. That points to the need for education and consistent implementation – but the good news is that thanks to mobile devices, most people are accustomed to password-free login flows through things like FaceID. Now we all know that’s not truly passwordless – but having people learn that behavior is good. This is a big one – and a space where FIDO is doing some super important work to standardize ID verification flows. But as long as accounts are being created with knowledge-based credentials, there will also be a wide open account recovery backdoor that hackers can use to take over accounts. We need to standardize and implement a possession-based approach to account creation that matches our commitment to possession-based authn Then, we can truly start to replace passwords altogether with FIDO keypairs. We’re seeing several major companies do this today – most notably Microsoft accounts, but also eBay, NTT DOCOMO and several other companies are now allowing users to delete their passwords altogether.