SlideShare a Scribd company logo
1 of 49
GARTNER’S CONVERGED &
COMPELLING FUTURE
MICHAEL THELANDER, SR DIR PRODUCT MARKETING
LEVERAGING THE TRUSTED IDENTITY CAPABILITIES MODEL - PART
1
MAY 2018
2
MICHAEL THELANDER
S E N I O R D I R E C T O R P R O D U C T M A R K E T I N G ,
I O V A T I O N
 CISSP-trained through SANS with experience in
configuration security and authentication
 25 years in product management and product marketing, with
the last 10 focused on cyber security
 Articles have appeared in SC Magazine, IT Professional
Magazine, CyberDefense Magazine, and SoftwareCEO.com
 Drives go-to-market initiatives at iovation
3
4
5
EXPLORING GARTNER’S TICM
T H E T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L
6
SESSION 1 AGENDA
E X P L O R I N G G A R T N E R ’ S T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L
3
2
1
DEFINING THE TICM
WHERE WE CAME FROM AND WHERE WE’RE
GOING
8
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
“ T A K E A N E W A P P R O A C H T O E S T A B L I S H I N G A N D M A I N T A I N I N G T R U S T … ”
9
THREE CORE PILLARS OF IDENTITY AND TRUST
T O D A Y, P E R S O N A L R E L A T I O N S H I P S T H A T B E C O M E D I G I T A L
Identity
Proofing
Authentication
Online
Fraud
Detection
10
THREE CORE PILLARS OF IDENTITY AND TRUST
D I S C I P L I N E S T H A T W E R E I N D E P E N E D E N T A R E B E C O M I N G I N T E R D E P E N D E N T
Identity
Proofing
Authentication
Online
Fraud
Detection
1
2
3
4
11
THREE CORE PILLARS OF IDENTITY AND TRUST
E A C H P I L L A R G E T S B G G E R , A N D A L L G R O W C L O S E R T O G E T H E R
Identity
Proofing Authentication
Online
Fraud
Detection
12
THREE CORE PILLARS OF IDENTITY AND TRUST
T H E C U S T O M E R ’ S D E V I C E B E C O M E S T H E “ A N C H O R O F T R U S T ”
Identity
Proofing Authentication
Online
Fraud
Detection
13
THREE CORE PILLARS OF IDENTITY AND TRUST
R O L E S B E C O M E M O R E D E F I N E D A N D M O R E I N T E R T W I N E D
Identity
Proofing Authentication
Online
Fraud
Detection
RISK &
COMPLIANCE
MANAGER
AUTHENTICATION
MANAGER
INFOSEC
ARCHITECT
FRAUD
MANAGER
UX DIRECTOR
UX DIRECTOR PRODUCT MANAGER
OR
LOB MANAGER
SO WHAT?
WHY IS THIS SUCH A BIG PROBLEM NOW?
15
WE’VE TURNED A CORNER
16
WE’VE TURNED A CORNER
17
FRAUD & RISK
1st and 3rd Party Fraud
Identity Theft
Application Fraud
Online Abuse
Policy Violation
CYBERSECURITY
Identity and Access
Mgmt
Account Takeover
Session Hijacking
Man-in-the-Middle
Attacks
SCA for PSD2
USER
EXPERIENCE
Grow the Business
Reduce Friction
Improve NPS
Omni-channel
Access
Increased
Visits/Month
Cross-device
Experience
18FRAUD TEAM IAM & INFOSEC TEAM PM + USER EXPERIENCE TEAM
CAN WE COMMUNICATE ACROSS TEAMS?
19
CAN WE COMMUNICATE ACROSS TEAMS?
20
COMMUNICATING ACROSS TEAMS!
ROLES: TICM
MODEL AS
FRAMEWORK
22
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)T H E L E G A C Y V I E W O F I D E N T I T Y A S S U R A N C E , I D P R O O F I N G A N D
A U T H E N T I C A T I O N
 In the “legacy”
enterprise view, ID
Proofing and recurring
authentication are
clearly separated
 ID Proofing is used at
account creation, and
User Authentication is
used at account login
 Online fraud detection
is not a significant
factor in this model, and
is managed elsewhere
23
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
 Significant changes in
the TICM view:
 The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
 Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
 They also note that
24
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
 Significant changes in
the TICM view:
 The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
 Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
 They also note that
25
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
 Significant changes in
the TICM view:
 The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
 Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
 They also note that
• Point-in-time activities become “continuous”
• “Context” is a key missing ingredient
• Solutions go from silos to “complementary”
• A new need develops: Dynamic Authentication
which is….
• Continuous
• Contextual
• Complementary
26
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up authentication
– strongly leverages
risk and integrity signals
 ID Proofing can be re-
established at any
point in the customer
journey
 Analytics “yield greater
value than crude
KBA” in this process
27
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up authentication
– strongly leverages
risk and integrity signals
 ID Proofing can be re-
established at any
point in the customer
journey
 Analytics “yield greater
value than crude
KBA” in this process
28
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
 ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
 Analytics “yield greater
value than crude KBA”
in this process
• Look at the bottom of the diagram!
• The critical signals used in every phase
(account creation, login, and post login)
come from Online Fraud Detection tools
• Are you missing a key ingredient to
implement the Gartner TICM model?
29
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
 ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
 Analytics “yield greater
value than crude KBA”
in this process
• Are your fraud insights integrated into
cybersecurity?
• Is identity proofing dynamic or is it point-in-
time only?
• Are you having conversations across silos?
30
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
31
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
 ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
 Analytics “yield greater
value than crude KBA”
in this process
“One of the authors had a client interaction that was particularly telling:
A team in a bank was looking at new customer authentication methods,
and was particularly interested in the potential value of analytics and
an adaptive access approach, without being aware of the overlap of
these techniques with OFD, which was the province of a
completely different team within the bank.”
32
BIG TAKEAWYS FROM SESSION ONE ON THE TICM
3
2
1
OUR NEXT WEBINARS
ONLINE FRAUD DETECTION TOOLS DELIVER
THE MISSING INGREDIENTS
34
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
 Credentials serve the
Identity Corroboration
problem
 Analytics solves for the
Identity Dissonance
problems
 Authentication products
(iovation’s LaunchKey
and ClearKey) enable
these functions
 Fraud detection products
(like iovation FraudForce)
enable these functions
35
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
I N O U R N E X T S E S S I O N
36
1. Mobile devices can be
gateways, consumers, or
IoT nodes
THE TICM WORKS IN THE INTERNET OF
THINGS
D E V I C E S A S G A T E W A Y S A N D C O N T R O L L E R S
Q&A
iovation.com/resources/reports
CONTACT US
www.iovation.com
@TheOtherMichael
SENIOR DIRECTOR PRODUCT MARKETING
MICHAEL
THELANDER
michael.thelander@iovation.com
503.943.6700
39
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
 The new model also
makes extensive use of a
“familiar people vs.
strange people” notion
 Third-party credentials
(like Single sign-on
systems), risk signals,
and attack signals are
important here
40
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
 Authentication and
Online Fraud Detection
make the most use of
common tools and
signals
 Identity proofing
provides the critical
ingredient of Third-Party
Credentials
 The combination of “ID
Proofing + Online Fraud
Detection” provides, in
this model, the strongest
41
 External Message, NEW IMPLEMENTATIONS:
 If you’re building a new system that integrates identity proofing, auth, and OFD…
 … iovation can provide (or connect you to) every piece
 In an integrated solution that binds everything together
 External Messaged UPDATE or ADD-ON IMPLEMENTATIONS:
 iovation online fraud detection solutions add the missing risk and reputation ingredients
 Our SaaS-based solutions make it easy to layer risk insight into your integration points
 Third-Party PARTNER, CHANNEL or OEM MESSAGES:
 We deliver the pieces you may be missing to fulfill the TICM vision
 We can be a transparent “capabilities multiplier” for your offerings
THE BOTTOM LINE
42
43
44
45
46
47
WEBINAR

More Related Content

Similar to Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)

Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
Alex Robbins
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
TransUnion
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
Future Agenda
 

Similar to Gartner Offers a Converged and Compelling Future (Gartner Report Part 1) (20)

Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Velix.ID
Velix.ID Velix.ID
Velix.ID
 
Asia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned BusinessAsia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned Business
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
 
Esteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should careEsteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should care
 
Digital Trust and the Identity of things
Digital Trust and the Identity of thingsDigital Trust and the Identity of things
Digital Trust and the Identity of things
 
Hedging Your Bets: Why Top FI’s are Investing in Machine Learning
Hedging Your Bets: Why Top FI’s are Investing in Machine LearningHedging Your Bets: Why Top FI’s are Investing in Machine Learning
Hedging Your Bets: Why Top FI’s are Investing in Machine Learning
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
Digital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive IndustryDigital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive Industry
 

More from TransUnion

Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)

  • 1. GARTNER’S CONVERGED & COMPELLING FUTURE MICHAEL THELANDER, SR DIR PRODUCT MARKETING LEVERAGING THE TRUSTED IDENTITY CAPABILITIES MODEL - PART 1 MAY 2018
  • 2. 2 MICHAEL THELANDER S E N I O R D I R E C T O R P R O D U C T M A R K E T I N G , I O V A T I O N  CISSP-trained through SANS with experience in configuration security and authentication  25 years in product management and product marketing, with the last 10 focused on cyber security  Articles have appeared in SC Magazine, IT Professional Magazine, CyberDefense Magazine, and SoftwareCEO.com  Drives go-to-market initiatives at iovation
  • 3. 3
  • 4. 4
  • 5. 5 EXPLORING GARTNER’S TICM T H E T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L
  • 6. 6 SESSION 1 AGENDA E X P L O R I N G G A R T N E R ’ S T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L 3 2 1
  • 7. DEFINING THE TICM WHERE WE CAME FROM AND WHERE WE’RE GOING
  • 8. 8 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) “ T A K E A N E W A P P R O A C H T O E S T A B L I S H I N G A N D M A I N T A I N I N G T R U S T … ”
  • 9. 9 THREE CORE PILLARS OF IDENTITY AND TRUST T O D A Y, P E R S O N A L R E L A T I O N S H I P S T H A T B E C O M E D I G I T A L Identity Proofing Authentication Online Fraud Detection
  • 10. 10 THREE CORE PILLARS OF IDENTITY AND TRUST D I S C I P L I N E S T H A T W E R E I N D E P E N E D E N T A R E B E C O M I N G I N T E R D E P E N D E N T Identity Proofing Authentication Online Fraud Detection 1 2 3 4
  • 11. 11 THREE CORE PILLARS OF IDENTITY AND TRUST E A C H P I L L A R G E T S B G G E R , A N D A L L G R O W C L O S E R T O G E T H E R Identity Proofing Authentication Online Fraud Detection
  • 12. 12 THREE CORE PILLARS OF IDENTITY AND TRUST T H E C U S T O M E R ’ S D E V I C E B E C O M E S T H E “ A N C H O R O F T R U S T ” Identity Proofing Authentication Online Fraud Detection
  • 13. 13 THREE CORE PILLARS OF IDENTITY AND TRUST R O L E S B E C O M E M O R E D E F I N E D A N D M O R E I N T E R T W I N E D Identity Proofing Authentication Online Fraud Detection RISK & COMPLIANCE MANAGER AUTHENTICATION MANAGER INFOSEC ARCHITECT FRAUD MANAGER UX DIRECTOR UX DIRECTOR PRODUCT MANAGER OR LOB MANAGER
  • 14. SO WHAT? WHY IS THIS SUCH A BIG PROBLEM NOW?
  • 17. 17 FRAUD & RISK 1st and 3rd Party Fraud Identity Theft Application Fraud Online Abuse Policy Violation CYBERSECURITY Identity and Access Mgmt Account Takeover Session Hijacking Man-in-the-Middle Attacks SCA for PSD2 USER EXPERIENCE Grow the Business Reduce Friction Improve NPS Omni-channel Access Increased Visits/Month Cross-device Experience
  • 18. 18FRAUD TEAM IAM & INFOSEC TEAM PM + USER EXPERIENCE TEAM CAN WE COMMUNICATE ACROSS TEAMS?
  • 19. 19 CAN WE COMMUNICATE ACROSS TEAMS?
  • 22. 22 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)T H E L E G A C Y V I E W O F I D E N T I T Y A S S U R A N C E , I D P R O O F I N G A N D A U T H E N T I C A T I O N  In the “legacy” enterprise view, ID Proofing and recurring authentication are clearly separated  ID Proofing is used at account creation, and User Authentication is used at account login  Online fraud detection is not a significant factor in this model, and is managed elsewhere
  • 23. 23 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E T I C M E X P A N D S I N T O F D P U S E C A S E S  Significant changes in the TICM view:  The inclusion of on Online Fraud Detection tools expands the scope of all activities, even ID proofing  Key terms arrive – “contextual” and “triangulation” – to indicate new analytics  They also note that
  • 24. 24 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E T I C M E X P A N D S I N T O F D P U S E C A S E S  Significant changes in the TICM view:  The inclusion of on Online Fraud Detection tools expands the scope of all activities, even ID proofing  Key terms arrive – “contextual” and “triangulation” – to indicate new analytics  They also note that
  • 25. 25 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E T I C M E X P A N D S I N T O F D P U S E C A S E S  Significant changes in the TICM view:  The inclusion of on Online Fraud Detection tools expands the scope of all activities, even ID proofing  Key terms arrive – “contextual” and “triangulation” – to indicate new analytics  They also note that • Point-in-time activities become “continuous” • “Context” is a key missing ingredient • Solutions go from silos to “complementary” • A new need develops: Dynamic Authentication which is…. • Continuous • Contextual • Complementary
  • 26. 26 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up authentication – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey  Analytics “yield greater value than crude KBA” in this process
  • 27. 27 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up authentication – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey  Analytics “yield greater value than crude KBA” in this process
  • 28. 28 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey or lifecycle  Analytics “yield greater value than crude KBA” in this process • Look at the bottom of the diagram! • The critical signals used in every phase (account creation, login, and post login) come from Online Fraud Detection tools • Are you missing a key ingredient to implement the Gartner TICM model?
  • 29. 29 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey or lifecycle  Analytics “yield greater value than crude KBA” in this process • Are your fraud insights integrated into cybersecurity? • Is identity proofing dynamic or is it point-in- time only? • Are you having conversations across silos?
  • 30. 30 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L
  • 31. 31 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey or lifecycle  Analytics “yield greater value than crude KBA” in this process “One of the authors had a client interaction that was particularly telling: A team in a bank was looking at new customer authentication methods, and was particularly interested in the potential value of analytics and an adaptive access approach, without being aware of the overlap of these techniques with OFD, which was the province of a completely different team within the bank.”
  • 32. 32 BIG TAKEAWYS FROM SESSION ONE ON THE TICM 3 2 1
  • 33. OUR NEXT WEBINARS ONLINE FRAUD DETECTION TOOLS DELIVER THE MISSING INGREDIENTS
  • 34. 34 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)  Credentials serve the Identity Corroboration problem  Analytics solves for the Identity Dissonance problems  Authentication products (iovation’s LaunchKey and ClearKey) enable these functions  Fraud detection products (like iovation FraudForce) enable these functions
  • 35. 35 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) I N O U R N E X T S E S S I O N
  • 36. 36 1. Mobile devices can be gateways, consumers, or IoT nodes THE TICM WORKS IN THE INTERNET OF THINGS D E V I C E S A S G A T E W A Y S A N D C O N T R O L L E R S
  • 38. CONTACT US www.iovation.com @TheOtherMichael SENIOR DIRECTOR PRODUCT MARKETING MICHAEL THELANDER michael.thelander@iovation.com 503.943.6700
  • 39. 39 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)  The new model also makes extensive use of a “familiar people vs. strange people” notion  Third-party credentials (like Single sign-on systems), risk signals, and attack signals are important here
  • 40. 40 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)  Authentication and Online Fraud Detection make the most use of common tools and signals  Identity proofing provides the critical ingredient of Third-Party Credentials  The combination of “ID Proofing + Online Fraud Detection” provides, in this model, the strongest
  • 41. 41  External Message, NEW IMPLEMENTATIONS:  If you’re building a new system that integrates identity proofing, auth, and OFD…  … iovation can provide (or connect you to) every piece  In an integrated solution that binds everything together  External Messaged UPDATE or ADD-ON IMPLEMENTATIONS:  iovation online fraud detection solutions add the missing risk and reputation ingredients  Our SaaS-based solutions make it easy to layer risk insight into your integration points  Third-Party PARTNER, CHANNEL or OEM MESSAGES:  We deliver the pieces you may be missing to fulfill the TICM vision  We can be a transparent “capabilities multiplier” for your offerings THE BOTTOM LINE
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48.

Editor's Notes

  1. Starbucks has a reputation for forging strong personal relationships, and this is in essence the root of identity proofing. Authentication is the way we extend that personal, 1:1 barista-to-customer relationship into the digital world. Lastly, any open and friendly platform will by nature invite fraud. How do we stop fraud without trampling on user experience?
  2. As these needs evolve, we see how interdependent these phases are on one another. We need collaborative systems that can inform the next system in the chain of risk, of trustworthiness, and even reward
  3. Today, these silos are not only moving closer together as digital interactions become the new norm, but overalapping and the walls are breaking down
  4. To facilitate this, our online systems need a new anchor of trust. We believe the end users’ multiple devices serve as that anchor, in their specific identities, in their communal identity, and in their reputation
  5. To facilitate this, our online systems need a new anchor of trust. We believe the end users’ multiple devices serve as that anchor, in their specific identities, in their communal identity, and in their reputation