You might be forgiven for thinking that fraud and cybersecurity teams are habitually on the same page. But in most organizations, that’s not the case. Fraud is in a silo reporting to loss prevention or risk, and cyber security reports to the CISO. Fraud looks at stopping losses in real time, cyber security teams think future in terms of defense and recovery.
Last year research firm Gartner introduced their “Trusted Identity Capabilities Model,” a blueprint for converging the work done by identity proofing, authentication and fraud prevention teams, with the goal of gaining greater efficiency and gaining insight into new risks. Side benefits like better user experience and better alignment to organizational goals also come out of this model.
Part 1 of this webinar series looks at the problems this model seeks to solve, and what makes it different from past approaches. We’ll use diagrams and content from the original Gartner research, under temporary license to iovation.
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
1. GARTNER’S CONVERGED &
COMPELLING FUTURE
MICHAEL THELANDER, SR DIR PRODUCT MARKETING
LEVERAGING THE TRUSTED IDENTITY CAPABILITIES MODEL - PART
1
MAY 2018
2. 2
MICHAEL THELANDER
S E N I O R D I R E C T O R P R O D U C T M A R K E T I N G ,
I O V A T I O N
CISSP-trained through SANS with experience in
configuration security and authentication
25 years in product management and product marketing, with
the last 10 focused on cyber security
Articles have appeared in SC Magazine, IT Professional
Magazine, CyberDefense Magazine, and SoftwareCEO.com
Drives go-to-market initiatives at iovation
8. 8
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
“ T A K E A N E W A P P R O A C H T O E S T A B L I S H I N G A N D M A I N T A I N I N G T R U S T … ”
9. 9
THREE CORE PILLARS OF IDENTITY AND TRUST
T O D A Y, P E R S O N A L R E L A T I O N S H I P S T H A T B E C O M E D I G I T A L
Identity
Proofing
Authentication
Online
Fraud
Detection
10. 10
THREE CORE PILLARS OF IDENTITY AND TRUST
D I S C I P L I N E S T H A T W E R E I N D E P E N E D E N T A R E B E C O M I N G I N T E R D E P E N D E N T
Identity
Proofing
Authentication
Online
Fraud
Detection
1
2
3
4
11. 11
THREE CORE PILLARS OF IDENTITY AND TRUST
E A C H P I L L A R G E T S B G G E R , A N D A L L G R O W C L O S E R T O G E T H E R
Identity
Proofing Authentication
Online
Fraud
Detection
12. 12
THREE CORE PILLARS OF IDENTITY AND TRUST
T H E C U S T O M E R ’ S D E V I C E B E C O M E S T H E “ A N C H O R O F T R U S T ”
Identity
Proofing Authentication
Online
Fraud
Detection
13. 13
THREE CORE PILLARS OF IDENTITY AND TRUST
R O L E S B E C O M E M O R E D E F I N E D A N D M O R E I N T E R T W I N E D
Identity
Proofing Authentication
Online
Fraud
Detection
RISK &
COMPLIANCE
MANAGER
AUTHENTICATION
MANAGER
INFOSEC
ARCHITECT
FRAUD
MANAGER
UX DIRECTOR
UX DIRECTOR PRODUCT MANAGER
OR
LOB MANAGER
22. 22
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)T H E L E G A C Y V I E W O F I D E N T I T Y A S S U R A N C E , I D P R O O F I N G A N D
A U T H E N T I C A T I O N
In the “legacy”
enterprise view, ID
Proofing and recurring
authentication are
clearly separated
ID Proofing is used at
account creation, and
User Authentication is
used at account login
Online fraud detection
is not a significant
factor in this model, and
is managed elsewhere
23. 23
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
Significant changes in
the TICM view:
The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
They also note that
24. 24
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
Significant changes in
the TICM view:
The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
They also note that
25. 25
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
Significant changes in
the TICM view:
The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
They also note that
• Point-in-time activities become “continuous”
• “Context” is a key missing ingredient
• Solutions go from silos to “complementary”
• A new need develops: Dynamic Authentication
which is….
• Continuous
• Contextual
• Complementary
26. 26
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
Now all areas are
interdependent
Trust elevation – or
step-up authentication
– strongly leverages
risk and integrity signals
ID Proofing can be re-
established at any
point in the customer
journey
Analytics “yield greater
value than crude
KBA” in this process
27. 27
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
Now all areas are
interdependent
Trust elevation – or
step-up authentication
– strongly leverages
risk and integrity signals
ID Proofing can be re-
established at any
point in the customer
journey
Analytics “yield greater
value than crude
KBA” in this process
28. 28
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
Now all areas are
interdependent
Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
Analytics “yield greater
value than crude KBA”
in this process
• Look at the bottom of the diagram!
• The critical signals used in every phase
(account creation, login, and post login)
come from Online Fraud Detection tools
• Are you missing a key ingredient to
implement the Gartner TICM model?
29. 29
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
Now all areas are
interdependent
Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
Analytics “yield greater
value than crude KBA”
in this process
• Are your fraud insights integrated into
cybersecurity?
• Is identity proofing dynamic or is it point-in-
time only?
• Are you having conversations across silos?
30. 30
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
31. 31
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
Now all areas are
interdependent
Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
Analytics “yield greater
value than crude KBA”
in this process
“One of the authors had a client interaction that was particularly telling:
A team in a bank was looking at new customer authentication methods,
and was particularly interested in the potential value of analytics and
an adaptive access approach, without being aware of the overlap of
these techniques with OFD, which was the province of a
completely different team within the bank.”
34. 34
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
Credentials serve the
Identity Corroboration
problem
Analytics solves for the
Identity Dissonance
problems
Authentication products
(iovation’s LaunchKey
and ClearKey) enable
these functions
Fraud detection products
(like iovation FraudForce)
enable these functions
35. 35
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
I N O U R N E X T S E S S I O N
36. 36
1. Mobile devices can be
gateways, consumers, or
IoT nodes
THE TICM WORKS IN THE INTERNET OF
THINGS
D E V I C E S A S G A T E W A Y S A N D C O N T R O L L E R S
39. 39
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
The new model also
makes extensive use of a
“familiar people vs.
strange people” notion
Third-party credentials
(like Single sign-on
systems), risk signals,
and attack signals are
important here
40. 40
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
Authentication and
Online Fraud Detection
make the most use of
common tools and
signals
Identity proofing
provides the critical
ingredient of Third-Party
Credentials
The combination of “ID
Proofing + Online Fraud
Detection” provides, in
this model, the strongest
41. 41
External Message, NEW IMPLEMENTATIONS:
If you’re building a new system that integrates identity proofing, auth, and OFD…
… iovation can provide (or connect you to) every piece
In an integrated solution that binds everything together
External Messaged UPDATE or ADD-ON IMPLEMENTATIONS:
iovation online fraud detection solutions add the missing risk and reputation ingredients
Our SaaS-based solutions make it easy to layer risk insight into your integration points
Third-Party PARTNER, CHANNEL or OEM MESSAGES:
We deliver the pieces you may be missing to fulfill the TICM vision
We can be a transparent “capabilities multiplier” for your offerings
THE BOTTOM LINE
Starbucks has a reputation for forging strong personal relationships, and this is in essence the root of identity proofing. Authentication is the way we extend that personal, 1:1 barista-to-customer relationship into the digital world. Lastly, any open and friendly platform will by nature invite fraud. How do we stop fraud without trampling on user experience?
As these needs evolve, we see how interdependent these phases are on one another. We need collaborative systems that can inform the next system in the chain of risk, of trustworthiness, and even reward
Today, these silos are not only moving closer together as digital interactions become the new norm, but overalapping and the walls are breaking down
To facilitate this, our online systems need a new anchor of trust. We believe the end users’ multiple devices serve as that anchor, in their specific identities, in their communal identity, and in their reputation
To facilitate this, our online systems need a new anchor of trust. We believe the end users’ multiple devices serve as that anchor, in their specific identities, in their communal identity, and in their reputation