SlideShare a Scribd company logo
© 2022 Yubico
1
KeyBank and ADP building secure
digital customer journeys
yubico
Perraju Nadakuduty
Distinguished Engineer,
Capital One
KeyBank and Capital One:
Securing identities and defeating fraud
with modern FIDO authentication
Christopher Nygard
Sr Information Security
Architect, KeyBank
Jerrod Chong
Chief Solutions
Officer, Yubico
© 2022 Yubico
2
Protect commercial client digital
journeys against account
takeovers using FIDO2 phishing-
resistant MFA
Secure enterprise user access to
all applications and data with
FIDO2 phishing-resistant
passwordless authentication
The Vision
© 2022 Yubico
3
Strategy: Use strong credentials to
access enterprise resources, and
reduce password usage
Strategy: Migrate commercial
customers to new authentication
orchestration system
The Driver: Uptick in account takeovers
1. VMware Modern Bank Heists 5.0, 2022
63%
of financial institutions
experienced an increase in
destructive attacks in 2022,
an increase of 17%
from 202111
4
4
Aug 11 - Consumer Financial Protection Bureau states
MFA that provides insufficient protection against
credential phishing can trigger liability
“MFA solutions that protect
against credential phishing,
such as those using the Web
Authentication (FIDO)
standard supported by web
browsers, are especially
important.
Why FIDO?
Journey to phishing-resistant FIDO authentication
5
Initially rolled out MFA using multi-protocol support
tokens that supported FIDO, for future initiatives
As FIDO matured, management decided to move
forward with FIDO2/WebAuthn for passwordless
authentication
Decision to use documentation-based identity
proofing with FIDO for strong credentialing
KeyBank was in process of integrating a new
authentication orchestration system into
commercial banking platform
FIDO-based authenticators were already on
long-term roadmap
Accelerated deployment of FIDO2
authenticators due to fraud patterns, to protect
clients against this growing threat
6
Capital One: Designing the right approach
6
Image Source: https://www.capitalone.com/about/corporate-information/
Separated journey into three elements:
Desktop, Network VPN, Web apps
Enhance employee verification (IDV) for
employee workforce
Evolve privileged access management
administration using FIDO2 for shared
secrets
Implement FIDO2 biometric authentication
for user agent access to PII and sensitive
data for regulatory compliance
© 2022 Yubico
Capital One: Designing the right approach
On-premises
Services
Web
Applications
VPN & Network Access
Critical Infrastructure
Elements (CLI etc.)
Privileged Access
Management
Application
Login
Maintain high assurance
for backup and recovery
+
Strong Binding
Employee ID
Proofing/Verification
Register FIDO
security key or
platform resident key
8
KeyBank: Designing the right approach
8
Image Source: https://www.key.com/businesses-institutions/business-expertise/articles/avoid-being-duped-by-deepfakes.html
Impact to clients
Impact to contact center
Timeline for adoption
FIDO benefits against phishing
Opt-in or mandatory?
9
Capital One: Recommendations
Have the right
documentation for
internal rollout
Internal users are fairly technically
savvy, reducing need for extensive
education and training, but the right
documentation helps
Design for
portability
Users use multiple systems and
devices, so build portability
mechanisms for FIDO credentials to
be used on multiple devices
Factor in compliance
requirements
Build technology reviews and audits
into project timelines. FIDO was
seen as a material tech change,
which called for higher scrutiny
Reuse existing
technology stacks
Leverage client-facing identity
verification processes internally
before issuing strong credentials
FIDO can solve
multiple business
problems
Strong identity verification and high
assurance of FIDO credentials can
solve multiple business scenarios—
easy password recovery, simplifies
privileged access management
Existing technology
stacks may need to be
refreshed
Work with partners and vendors to
upgrade existing technology stacks
to support FIDO
10
KeyBank: Lessons learned and recommendations
10
Offer user
flexibility
There is no one size fits all.
Offer multiple FIDO options
such as security keys and
platform authenticators
Prepare for
resistance
Develop clear opt-out
process. Add mitigating
controls and additional fraud
monitoring
Choose a partner,
not just a product
Vendor should change
and improve based on
customer feedback
Prepare clients
Use multi-channel
communications, not
everyone reads email
Be prepared to
troubleshoot
FIDO is great when it works, but
not all scenarios are seamless
and can require troubleshooting
Don’t underestimate
education & training
Prepare client-facing resources.
Understand and document
support issues
Secure all FIDO
touchpoints
Ensure strong security for FIDO
registration and recovery flows
since that is where attackers
will go next
Thank you!
11

More Related Content

Similar to 1ID2-KeyBank-CapitalOne.pptx

[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
WSO2
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
FIDO Alliance
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
FIDO Alliance
 
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
Suzanne Livingston
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
Fintech solution day 2019
Fintech solution day 2019Fintech solution day 2019
Fintech solution day 2019
PT Datacomm Diangraha
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
SecureAuth
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
FIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO Alliance
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
WSO2
 

Similar to 1ID2-KeyBank-CapitalOne.pptx (20)

[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Fintech solution day 2019
Fintech solution day 2019Fintech solution day 2019
Fintech solution day 2019
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 

Recently uploaded

2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 

Recently uploaded (20)

2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 

1ID2-KeyBank-CapitalOne.pptx

  • 1. © 2022 Yubico 1 KeyBank and ADP building secure digital customer journeys yubico Perraju Nadakuduty Distinguished Engineer, Capital One KeyBank and Capital One: Securing identities and defeating fraud with modern FIDO authentication Christopher Nygard Sr Information Security Architect, KeyBank Jerrod Chong Chief Solutions Officer, Yubico
  • 2. © 2022 Yubico 2 Protect commercial client digital journeys against account takeovers using FIDO2 phishing- resistant MFA Secure enterprise user access to all applications and data with FIDO2 phishing-resistant passwordless authentication The Vision
  • 3. © 2022 Yubico 3 Strategy: Use strong credentials to access enterprise resources, and reduce password usage Strategy: Migrate commercial customers to new authentication orchestration system The Driver: Uptick in account takeovers 1. VMware Modern Bank Heists 5.0, 2022 63% of financial institutions experienced an increase in destructive attacks in 2022, an increase of 17% from 202111
  • 4. 4 4 Aug 11 - Consumer Financial Protection Bureau states MFA that provides insufficient protection against credential phishing can trigger liability “MFA solutions that protect against credential phishing, such as those using the Web Authentication (FIDO) standard supported by web browsers, are especially important. Why FIDO?
  • 5. Journey to phishing-resistant FIDO authentication 5 Initially rolled out MFA using multi-protocol support tokens that supported FIDO, for future initiatives As FIDO matured, management decided to move forward with FIDO2/WebAuthn for passwordless authentication Decision to use documentation-based identity proofing with FIDO for strong credentialing KeyBank was in process of integrating a new authentication orchestration system into commercial banking platform FIDO-based authenticators were already on long-term roadmap Accelerated deployment of FIDO2 authenticators due to fraud patterns, to protect clients against this growing threat
  • 6. 6 Capital One: Designing the right approach 6 Image Source: https://www.capitalone.com/about/corporate-information/ Separated journey into three elements: Desktop, Network VPN, Web apps Enhance employee verification (IDV) for employee workforce Evolve privileged access management administration using FIDO2 for shared secrets Implement FIDO2 biometric authentication for user agent access to PII and sensitive data for regulatory compliance
  • 7. © 2022 Yubico Capital One: Designing the right approach On-premises Services Web Applications VPN & Network Access Critical Infrastructure Elements (CLI etc.) Privileged Access Management Application Login Maintain high assurance for backup and recovery + Strong Binding Employee ID Proofing/Verification Register FIDO security key or platform resident key
  • 8. 8 KeyBank: Designing the right approach 8 Image Source: https://www.key.com/businesses-institutions/business-expertise/articles/avoid-being-duped-by-deepfakes.html Impact to clients Impact to contact center Timeline for adoption FIDO benefits against phishing Opt-in or mandatory?
  • 9. 9 Capital One: Recommendations Have the right documentation for internal rollout Internal users are fairly technically savvy, reducing need for extensive education and training, but the right documentation helps Design for portability Users use multiple systems and devices, so build portability mechanisms for FIDO credentials to be used on multiple devices Factor in compliance requirements Build technology reviews and audits into project timelines. FIDO was seen as a material tech change, which called for higher scrutiny Reuse existing technology stacks Leverage client-facing identity verification processes internally before issuing strong credentials FIDO can solve multiple business problems Strong identity verification and high assurance of FIDO credentials can solve multiple business scenarios— easy password recovery, simplifies privileged access management Existing technology stacks may need to be refreshed Work with partners and vendors to upgrade existing technology stacks to support FIDO
  • 10. 10 KeyBank: Lessons learned and recommendations 10 Offer user flexibility There is no one size fits all. Offer multiple FIDO options such as security keys and platform authenticators Prepare for resistance Develop clear opt-out process. Add mitigating controls and additional fraud monitoring Choose a partner, not just a product Vendor should change and improve based on customer feedback Prepare clients Use multi-channel communications, not everyone reads email Be prepared to troubleshoot FIDO is great when it works, but not all scenarios are seamless and can require troubleshooting Don’t underestimate education & training Prepare client-facing resources. Understand and document support issues Secure all FIDO touchpoints Ensure strong security for FIDO registration and recovery flows since that is where attackers will go next

Editor's Notes

  1. Enhance IDV from consumer process to their employee lifecyle
  2. Question You can register the platform built-in after IDV, as the first FIDO credential, but when you have to bootstrap the next platform built-in authenticator (another laptop for example), how would you do this without a portable security key?