SlideShare a Scribd company logo
1 of 19
SESSION ID:
#RSAC
Andrew Shikiar
Welcome & FIDO Update
Executive Director & CMO
FIDO Alliance
SEM-T02
Seminar Sponsors:
2 © FIDO Alliance 2022
Consumers that say that their
financial service provider
having at least one feature that
enhances security has “very” or
“extremely” impact on their
trust in that provider
(PYMNTS)
83%
4 out of 5
Bankers that said they expect overall
spending on cybersecurity to increase
over the next 12 months
(American Banker)
$18.5 million
Average cost of cyberattack in financial
services, higher than any other vertical
(Accenture)
Increase in cyberattacks against financial
services between February and April 2020
(VMWare)
238%
Orgs breached as a result of a user
password compromise
(MobileIron)
42%
Verified accounts that tweeted in
Bitcoin scam after social engineering
attack on Twitter
45
Number of times more likely the
financial services sector is to be hit by a
cyberattack
(Finextra / Boston Consulting Group)
300x
2
Execs who say their digital transformation
plans have sped up due to COVID-19
(Trulioo)
97%
3 © FIDO Alliance 2022
Some Predictions for 2022-23
 Phishing attacks will continue to succeed
 MFA bypass attacks will become mainstream
4 © FIDO Alliance 2022
Some (Happier) Predictions for 2022-23
• Enterprise passwordless
deployments will grow rapidly
• Device platforms will begin to
provide consumer-ready
solutions at scale
5 © FIDO Alliance 2022
PHISHING RESISTANT
A fundamental shift is required
(User-initiated & cryptographically secure)
• Stored on a server
• SMS OTP
• KBA
• Passwords
• On-device
(never on a server)
• Local Biometric
• Device PIN
• “Passkeys”
From legacy, knowledge-based credentialing
In your head (remembered)
To modern, possession-based credentialing
In your hand
5
SUSCEPTIBLE TO COMMON THREATS
6 © FIDO Alliance 2022
6
Security
Usability
Poor Easy
Weak
Strong
=
Single Gesture
Possession-based Authentication
Open standards for simpler,
stronger authentication using
public key cryptography
Industry imperative: Simpler and stronger
7 © FIDO Alliance 2022
7
+ Sponsor members + Associate members + Liaison members + Government members
Backed by global tech leaders
8 © FIDO Alliance 2022
FIDO Authentication: How it works
User verification
Require user gesture before
private key can be used
Authenticator
FIDO
Authentication
Private key dedicated
to one app
Public key
9 © FIDO Alliance 2022
Browser and OS Support = Endpoint Ubiquity
9
10 © FIDO Alliance 2022
10
Global market validation (partial list)
11 © FIDO Alliance 2022
11
Government embrace
12 © FIDO Alliance 2022
Next Steps for Reaching Mass Adoption:
Furthering usability while keeping
security in mind
13 © FIDO Alliance 2022
Core usability initiatives
2022: UX Committee launched this year
Upcoming: Plans for future UX research (e.g., Security key guidelines)
Upcoming: Multi-device FIDO credentials
2021: First FIDO UX guidelines (platform authenticators): published June 2021
14 © FIDO Alliance 2022
New: Multi-device FIDO credentials (“passkeys”)
 Enables deployment of FIDO at scale to
consumers moving between devices and
upgrading to new ones
 Will be supported in leading device
platforms starting this year
 Addresses usability AND security
challenges with account recovery
16 © FIDO Alliance 2022
16 © FIDO Alliance 2021
“Passkey” Crystal Ball
17 © FIDO Alliance 2022
17 © FIDO Alliance 2021
“Passkey” Crystal Ball
Will
• Help mass-market
consumer applications
• Turn the tide against
credential-led attacks
• Be applicable to SMB and
some enterprises
• Require market iteration
Won’t
• Happen overnight
• Be utilized in all industries
• Replace hardware security
keys for many scenarios
Seminar Sponsors:
Remaining Agenda
1:35 PM - 2:00 PM #MoreThanAPassword: The Case for FIDO in SMBs | Bob Lord, CISA
2:00 PM - 2:20 PM
Our Journey to Passwordless: Secure Authentication & Frictionless User Experience
Darrell Hawkins, Otis Elevator
2:20 PM - 2:35 PM
'Passkey' demonstrations, including cross-platform use cases
Christiaan Brand, Google & Tim Cappalli, Microsoft
2:35 PM - 2:55 PM
'Passkey’ primer
Shane Weeden, IBM
3:20 PM - 3:50 PM
Roundtable Discussion on 'Passkey' and Platform Implementation
Christiaan Brand, Google; Tim Cappalli, Microsoft; Shane Weeden, IBM; David Turner, FIDO Alliance
(Moderator)
3:50 PM - 4:20 PM
Usability, Passkeys and the Road Ahead
Ashish Jain, Arkose Labs; Catherine Cheng, PayPal; Kevin Goldman, Trusona;
4:20 PM - 4:45 PM
The Role of Privacy in MFA Deployments
Jamie Danker, Venable LLP; Christine Owen, Guidehouse; Megan Shamas, FIDO Alliance (Moderator)
4:45 PM - 5:00 PM Wrap Up
OCT. 17-19, 2022 | Seattle, WA & Virtually
Join us at
authenticatecon.com
Scan for registration discount!
20 © FIDO Alliance 2022
Thank you.

More Related Content

What's hot

What's hot (20)

Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidDeveloper Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
Getting Started with FIDO2
Getting Started with FIDO2Getting Started with FIDO2
Getting Started with FIDO2
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications Overview
 
Biometric Authentication.pdf
Biometric Authentication.pdfBiometric Authentication.pdf
Biometric Authentication.pdf
 
Webauthn Tutorial
Webauthn TutorialWebauthn Tutorial
Webauthn Tutorial
 
FIDO 생체인증 기술 개발 사례
FIDO 생체인증 기술 개발 사례FIDO 생체인증 기술 개발 사례
FIDO 생체인증 기술 개발 사례
 
Web Authentication API
Web Authentication APIWeb Authentication API
Web Authentication API
 
Fido認証概要説明
Fido認証概要説明Fido認証概要説明
Fido認証概要説明
 
パスワードのいらない世界へ  FIDO認証の最新状況
パスワードのいらない世界へ  FIDO認証の最新状況パスワードのいらない世界へ  FIDO認証の最新状況
パスワードのいらない世界へ  FIDO認証の最新状況
 

Similar to Welcome and FIDO Update.pptx

Similar to Welcome and FIDO Update.pptx (20)

Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 

More from FIDO Alliance

OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
FIDO Alliance
 

More from FIDO Alliance (7)

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptx
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
FIDO: The Value of Certification
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of Certification
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Welcome and FIDO Update.pptx

  • 1. SESSION ID: #RSAC Andrew Shikiar Welcome & FIDO Update Executive Director & CMO FIDO Alliance SEM-T02 Seminar Sponsors:
  • 2. 2 © FIDO Alliance 2022 Consumers that say that their financial service provider having at least one feature that enhances security has “very” or “extremely” impact on their trust in that provider (PYMNTS) 83% 4 out of 5 Bankers that said they expect overall spending on cybersecurity to increase over the next 12 months (American Banker) $18.5 million Average cost of cyberattack in financial services, higher than any other vertical (Accenture) Increase in cyberattacks against financial services between February and April 2020 (VMWare) 238% Orgs breached as a result of a user password compromise (MobileIron) 42% Verified accounts that tweeted in Bitcoin scam after social engineering attack on Twitter 45 Number of times more likely the financial services sector is to be hit by a cyberattack (Finextra / Boston Consulting Group) 300x 2 Execs who say their digital transformation plans have sped up due to COVID-19 (Trulioo) 97%
  • 3. 3 © FIDO Alliance 2022 Some Predictions for 2022-23  Phishing attacks will continue to succeed  MFA bypass attacks will become mainstream
  • 4. 4 © FIDO Alliance 2022 Some (Happier) Predictions for 2022-23 • Enterprise passwordless deployments will grow rapidly • Device platforms will begin to provide consumer-ready solutions at scale
  • 5. 5 © FIDO Alliance 2022 PHISHING RESISTANT A fundamental shift is required (User-initiated & cryptographically secure) • Stored on a server • SMS OTP • KBA • Passwords • On-device (never on a server) • Local Biometric • Device PIN • “Passkeys” From legacy, knowledge-based credentialing In your head (remembered) To modern, possession-based credentialing In your hand 5 SUSCEPTIBLE TO COMMON THREATS
  • 6. 6 © FIDO Alliance 2022 6 Security Usability Poor Easy Weak Strong = Single Gesture Possession-based Authentication Open standards for simpler, stronger authentication using public key cryptography Industry imperative: Simpler and stronger
  • 7. 7 © FIDO Alliance 2022 7 + Sponsor members + Associate members + Liaison members + Government members Backed by global tech leaders
  • 8. 8 © FIDO Alliance 2022 FIDO Authentication: How it works User verification Require user gesture before private key can be used Authenticator FIDO Authentication Private key dedicated to one app Public key
  • 9. 9 © FIDO Alliance 2022 Browser and OS Support = Endpoint Ubiquity 9
  • 10. 10 © FIDO Alliance 2022 10 Global market validation (partial list)
  • 11. 11 © FIDO Alliance 2022 11 Government embrace
  • 12. 12 © FIDO Alliance 2022 Next Steps for Reaching Mass Adoption: Furthering usability while keeping security in mind
  • 13. 13 © FIDO Alliance 2022 Core usability initiatives 2022: UX Committee launched this year Upcoming: Plans for future UX research (e.g., Security key guidelines) Upcoming: Multi-device FIDO credentials 2021: First FIDO UX guidelines (platform authenticators): published June 2021
  • 14. 14 © FIDO Alliance 2022 New: Multi-device FIDO credentials (“passkeys”)  Enables deployment of FIDO at scale to consumers moving between devices and upgrading to new ones  Will be supported in leading device platforms starting this year  Addresses usability AND security challenges with account recovery
  • 15. 16 © FIDO Alliance 2022 16 © FIDO Alliance 2021 “Passkey” Crystal Ball
  • 16. 17 © FIDO Alliance 2022 17 © FIDO Alliance 2021 “Passkey” Crystal Ball Will • Help mass-market consumer applications • Turn the tide against credential-led attacks • Be applicable to SMB and some enterprises • Require market iteration Won’t • Happen overnight • Be utilized in all industries • Replace hardware security keys for many scenarios
  • 17. Seminar Sponsors: Remaining Agenda 1:35 PM - 2:00 PM #MoreThanAPassword: The Case for FIDO in SMBs | Bob Lord, CISA 2:00 PM - 2:20 PM Our Journey to Passwordless: Secure Authentication & Frictionless User Experience Darrell Hawkins, Otis Elevator 2:20 PM - 2:35 PM 'Passkey' demonstrations, including cross-platform use cases Christiaan Brand, Google & Tim Cappalli, Microsoft 2:35 PM - 2:55 PM 'Passkey’ primer Shane Weeden, IBM 3:20 PM - 3:50 PM Roundtable Discussion on 'Passkey' and Platform Implementation Christiaan Brand, Google; Tim Cappalli, Microsoft; Shane Weeden, IBM; David Turner, FIDO Alliance (Moderator) 3:50 PM - 4:20 PM Usability, Passkeys and the Road Ahead Ashish Jain, Arkose Labs; Catherine Cheng, PayPal; Kevin Goldman, Trusona; 4:20 PM - 4:45 PM The Role of Privacy in MFA Deployments Jamie Danker, Venable LLP; Christine Owen, Guidehouse; Megan Shamas, FIDO Alliance (Moderator) 4:45 PM - 5:00 PM Wrap Up
  • 18. OCT. 17-19, 2022 | Seattle, WA & Virtually Join us at authenticatecon.com Scan for registration discount!
  • 19. 20 © FIDO Alliance 2022 Thank you.

Editor's Notes

  1. Financial servies has always been a target for hackers, and COVID only accelerated this – over 230% growth in attacks from Feb-April alone. The average cost is nearly $20M for an attack. And the fact of the matter is I could spend my entire 15 minutes with slide after slide with data like this, and at the end of the day the vast majority of these stats come down to a fundamental truth, which is
  2. Phishing attacks will grow because hackers like making money, in addition to causing chaos. They’re relatively cheap to execute and have a staggering success rate.. 50% + But that’s not really new – I could have made the same prediction in each of the past several years and have been 100% correct. My headline prediction for 2022 is that MFA bypass attacks will become mainstream. Here are two examples from just this year – attacks on two hugely valuable brands
  3. But it’s not all doom and gloom.. There’s plenty of good news too. In general, there’s more awareness of the inherent risk of passwords – and Gartner has cited passwordless authentication as a technology to deploy NOW, with FIDO and FIDO security keys cited as the preferred method. This is one reason why we’re seeing so much VC investment in the digital identity landscape – our vendor community is struggling to keep up with all of the demand, which certainly is a good ‘problem’ to have [click] Beyond the enterprise, I’m confident that we’ll see solutions emerge from mobile platforms emerge this year that can bring truly passwordless login alternatives to the masses
  4. Do you look at your users this way? What is stopping you?
  5. FIDO’s goal from day one was to transform the market away from dependence on centrally stored shared secrets to a model that uses public key cryptography and allows consumers to authenticate through devices that they literally have in their fingertips every day. It’s simpler and stronger authentication. This vision has been realized through several sets of specifications since 2015, and also has seen rapid deployment – which we’ll touch on in a few
  6. And then today you can see major additions that have helped us move forward on our mission – amazon, apple, LINE, yahoo Japan, etc
  7. We always need a device in the middle, we call this the authenticator Step 1 - Local interaction between the user and authenticator – we call this user verification On the front end, we are very flexible – we require some user gesture and that gesture is verified by the authenticator directly Facial recognition, local PIN entry, security key – but we will talk more about the user experience in a minute Step 2: Once the user is verified by the authenticator, which lives on your personal device, the authenticator then authenticates you to the service. Not using your information or the evidence of who you are, but actually using public key cryptography. What’s beautiful about public key cryptography is you don’t ever have to give away your private key (your secret), with asymmetric cryptography – which is what we use – you use that private key to sign a challenge : proof of possession that you have the right private key. The service provider verifies that it is correct with the corresponding public key. Unique key pairs for each service – this is essential for privacy. No global identifiers with FIDO. Simple change of architecture turns the model upside down. The only thing now that is stored on a server are the public keys, which aren’t useful for scalable attack. With the chip migration here in the U.S., We used to talk a lot of about removing the incentive for cybercriminals to go after data – because chip data has so much less value. This is similar here to what we’re doing with FIDO.
  8. Talk about the journey of how we got here (FIDO2 / W3C) And it’s through that collaboration that we’re able to work towards device ubiquity – indeed as ubiqitiously available as passwords … on every device. Every browser. Every operating system. 
  9. Change logos out 1PW Microsoft Dashlane Google Add: Rakuten CVSHealth Merck B of A eBay
  10. Change logos out
  11. So where do we need to go to get to mass adoption? It’s really about usability while keeping our core security principles a priority. What we mean by usability is not just the experience of logging in but looking at user behavior and answering questions like what are the best messages for getting users interested in enrolling, what does that optimal enrollment flow look like, what visual cues are most appropriate for log in, how do we solve for account recovery in our device-based authentication model if someone loses a device or just gets a new one? These are the things that we are working on, and making progress on Also, deployability / integratability
  12. Workforce usability User journey is actually quite nuanced Employees will break your MFA if it’s not usable
  13. This is the next step in the evolution of FIDO and passwordless authentication adoption Makes FIDO as ubiquitous and available as passwords
  14. From TPS / HYPR 2022 deck
  15. From TPS / HYPR 2022 deck