Advertisement

Introduction to FIDO and eIDAS Services

FIDO Alliance
May. 29, 2020
Advertisement

More Related Content

Advertisement

More from FIDO Alliance(20)

Recently uploaded(20)

Advertisement

Introduction to FIDO and eIDAS Services

  1. © FIDO Alliance ©2020 Webinar: Introduction to FIDO and eIDAS Services
  2. © FIDO Alliance ©20202
  3. © FIDO Alliance ©2020 Today’s Speakers Andrew Shikiar Executive Director & CMO FIDO Alliance Sebastian Elfors Senior Solutions Architect Yubico
  4. © FIDO Alliance ©20204
  5. © FIDO Alliance ©2020 Intro to FIDO Andrew Shikiar Executive Director & CMO FIDO Alliance
  6. © FIDO Alliance ©2020 The Credential Theft Cycle Persists 6 Credential loss grew by 284% in 2019 Criminals purchase credentials, use botnets to prep attacks Up to 2% of stuffing attempts are successful Credentials cost $0.70 - $2.30 80-90% of login attempts to e-commerce sties are spoofs 15.1 billion exposed records in 2019 Data Breach leads to credentials for sale on Dark Web Credential stuffing attacks on e-commerce, enterprise, etc 7,098 data breaches last year Server-side Authentication Credentials Annual cost to US Businesses: $5 billion Sources: ITRC, Verizon, Shape Security, Akamai
  7. © FIDO Alliance ©20207 Security Usability Poor Easy WeakStrong = Single Gesture Possession-based Authentication Open standards for simpler, stronger authentication using asymmetric public key cryptography
  8. © FIDO Alliance ©20208 FIDO Breaks the Credential Theft Cycle & Prevents Account Takeovers Use of Public Key Cryptography eliminates dependence on server-side credentials Nothing of value for hackers to steal (public keys have no utility) Stuffed credentials won’t work Stops supply & demand for hackers
  9. © FIDO Alliance ©20209 + Sponsor members + Associate members + Liaison members FIDO Leadership
  10. © FIDO Alliance ©202010 Hello Since May 2018 Broader matrix of support across platforms and transports Over 2 Billion Devices can support FIDO Authentication
  11. © FIDO Alliance ©202011 Browser/Platform Support: A Detailed Update
  12. © FIDO Alliance ©2020 Intro to eIDAS Sebastian Elfors Senior Solutions Architect Yubico
  13. © FIDO Alliance ©202013
  14. © FIDO Alliance ©20201414
  15. © FIDO Alliance ©2020 Using FIDO for eIDAS Services Sebastian Elfors Senior Solutions Architect Yubico
  16. © FIDO Alliance ©20201616
  17. © FIDO Alliance ©20201717
  18. © FIDO Alliance ©20201818
  19. © FIDO Alliance ©20201919
  20. © FIDO Alliance ©20202020
  21. © FIDO Alliance ©20202121
  22. © FIDO Alliance ©20202222 https://fidoalliance.org/white- paper-introduction-of-fido-eidas- services/ https://fidoalliance.org/white-paper- using-fido-with-eidas-services/
  23. © FIDO Alliance ©2020 Q&A Andrew Shikiar Executive Director & CMO FIDO Alliance Sebastian Elfors Senior Solutions Architect Yubico
  24. © FIDO Alliance ©2020 If we didn’t have time to answer your question, please reach out to us at help@fidoalliance.org The webinar recording and slides will be emailed to you and posted on fidoalliance.org Please stay on to take the survey at the conclusion of the webinar 24
  25. © FIDO Alliance 2020 fidoalliance.org 25

Editor's Notes

  1. So let’s talk about credential theft.. It all starts with the fact that authentication has historically depended on centrally-stored, server side credentials. The problem with this is that the credentials are at risk of being stolen through a variety of mechanisms, which we’ll explore today. This is part of the landscape that FIDO was founded to address.
  2. We know that passwords have very weak security and poor usability – but the thing that doesn’t (or didn’t“) get enough attention was the risk associated with OTPs. Not only do OTPs present major usability challenges (what’s worse than one password? Two passwords) but OTPs are also centrally stored secrets, just for a shorter timeframe. As such, they are succeceptible to large-scale attacks and/or spear-phishing – as we’ve seen in some very well-documented breaches. This really is the crux of what FIDO is trying to do – it’s eliminating use of all shared secrets, not just passwords. FIDO’s goal from day one was to transform the market away from dependence on centrally stored shared secrets to a model that uses public key cryptography and allows consumers to authenticate through devices that they literally have in their fingertips every day. It’s simpler and stronger authentication. FIDO rapidly realized this goal with the initial release of FIDO’s UAF and U2F specifications in 2015.
  3. History of the Alliance: Organization was organized in 2012, open to any organization to join in 2013 with the mission to solve the world’s password problem FIDO was launched with just 6 member companies. Today we have more than 250 members from around the world – including the Board of Directors that you see represented here My favorite way of looking at this list of logos is consider closing your eyes and asking yourself “what companies do we need have sitting around a board table to help solve the password problem?” – and I suspect it would look a lot like this We have major platform providers and manufacturers creating devices that we all use every day We have leaders in security, biometrics and identity – both established companies and innovative start-ups Last but not least, we have companies whose very businesses depend on their ability to deliver high-assurance services to billions of users around the world
  4. -2019 was Significant year in terms of fido2 adoption -Platform authenticators are certified -Brings reach of fido2 to billions of users using these platforms -Browser support grown in breadth and depth -Ex: Stronger initial and growing support in safari for fido2 -Safari13 supports security keys on macOS, iOS and iPadOS
  5. -Significant year in terms of fido2 adoption -Platform authenticators are certified -Brings reach of fido2 to billions of users using these platforms -Browser support grown in breadth and depth -Ex: Stronger initial and growing support in safari for fido2 -Safari13 will support security keys on macoS - You can deploy across any mainstream OS today
  6. ANDREW
Advertisement