SlideShare a Scribd company logo
1 of 47
Download to read offline
© VASCO Data Security, Inc. - CONFIDENTIAL
Kurt Berghs – Area Sales Belgium
VASCO
Securing IDentities
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
It’s a world war out there
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
3
Also in Belgium:
And we’re in the middle of it
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
4
Why? I hate my boss!
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
5
Jonathan James
Gary McKinnon
Kevin Mitnick
Why? Glory!
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
6
Why? Security…
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
7
Why? Money!!!
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
8
De oplossing van de overheid
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
9
• In België: CBPL (Privacy commissie) https://www.privacycommission.be
• Waakhond over de data gegevens van Belgen en van data bewaard in België
• Data: van Overheden, Medische gegevens, Klantengegevens, …
• Strafrechtelijke bevoegdheden
• Verschillende ISO normen worden aanbevolen (ISO 27001:2013)
• Data bewaren zoals een goede huisvader
• Meldingsplicht!!!
De oplossing van de overheid
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
10
Boetes:
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
11
How to hack?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
12
Hacking for dummies 1. GUESS a password
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
13
Hacking for dummies 1. GUESS a password
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
14
Hacking for dummies 2. browse or buy
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
15
Hacking for dummies 3. Just ask nicely
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
16
You’re not alone
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
17
You’re not alone
+500.000.000 accounts
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
18
You’re not alone
+1.000.000.000 accounts
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
What can you do?
19
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
What can you do?
20
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
What can you do?
21
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Moeten wij ons zorgen maken? The Target Breach
What happend to Target?
• One of the largest retail chains in US
• 40M personal customer records stolen by hackers
Concequences
• 200M $ estimated CC re-issuing cost
• 100M $ cost for security upgrade
• 46% drop in profit
• 10% drop in stockprice
• CEO resigned
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Moeten wij ons zorgen maken?
23
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
24
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
25
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
26
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
27
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
28
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
29
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
30
Hoe lossen we dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
31
Hoe lossen eind gebruikers dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
32
Hoe lossen eind gebruikers dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
33
Hoe lossen eind gebruikers dit op?
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Hoe lost VASCO dit op? Oorsprong
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Referenties in de financiele wereld
© VASCO Data Security, Inc. - CONFIDENTIAL
Tevredenheid met kwaliteit van digitaal aanbod per sector
64%
60%
48% 48%
45% 45%
39%
Financial Services Retail Media Utilities Local Government Central Government Transport
n = 2500Source: Fujitsu Digital Inside Out research
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Hoe lost VASCO dit op? Enterprise security
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Referenties in de enterprise markt
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Hoe lost Vasco dit op? Online Application Security
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Referenties in de online wereld
40
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Hoe lost Vasco dit op: 5 Solution Pillars
Multi-Factor
Authentication
Risk
Management
Mobile Application
Security
Identity
Proofing
Electronic
Signature
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
42
Multifactor Authentication
Hardware
Token
Software
Token
Wearable
© Gartner, 2014
Knowledge
Something known to
only the user
Token
Something held by only
the user
Biometric Trait
Something inherent to
only the user
A password, a passphrase,
a PIN
An OTP token, a smart card
with X. 509 public-key
infrastructure credentials
A biological or behavioral
trait, such as face
typography, fingerprint or
voice
Examples
Biometrics Behavioral
Analysis
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
43
Multifactor authentication before
DIGIPASS Go Range
DIGIPASS for Web
DIGIPASS E-signature
Virtual DIGIPASS
DIGIPASS for WindowsDIGIPASS for Mobile
Software
Appliance
Service
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
Multifactor authentication today
44
Username
OTP
Cloud office
My
employees
CRM
Webmail
Appli &
Desktop
Virtualizatie
SSO
Employees
1200
External
People/Partners
50000
UsernameUsername
OTP
ERP
Remote
Desktop
mngt
File sharing
Risk mngt
… portal
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
VASCO Solution: DIGIPASS for Apps
© VASCO Data Security, Inc. - CONFIDENTIAL
9367893678
© VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL
46
ROAM: Register Once. Authenticate Many.
VASCO Trusted Digital ID Platform
Identity Proofing Providers
- Government ID Card
- Experian
- AYIN
- IdenTrust
VASCO
Certified Digital ID
Verified Identities
47

More Related Content

Similar to VASCO Data Security Solutions for Protecting Identities and Securing Access

Vasco - DSS @Vilnius 2010
Vasco - DSS @Vilnius 2010Vasco - DSS @Vilnius 2010
Vasco - DSS @Vilnius 2010Andris Soroka
 
Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure Kappa Data
 
Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa Data
 
At the table with security solution provider VMware
At the table with security solution provider VMwareAt the table with security solution provider VMware
At the table with security solution provider VMwareXylos
 
DSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldDSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldAndris Soroka
 
Continuous Verification in a Serverless World
Continuous Verification in a Serverless WorldContinuous Verification in a Serverless World
Continuous Verification in a Serverless WorldLeon Stigter
 
VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015VASCO Data Security
 
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersSE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersAMD Developer Central
 
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017Tiago Henriques
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freTuan Yang
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...CODE BLUE
 
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCristian Garcia G.
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
Operational Use of Data to Succeed Under Value-Based Reimbursement
Operational Use of Data to Succeed Under Value-Based ReimbursementOperational Use of Data to Succeed Under Value-Based Reimbursement
Operational Use of Data to Succeed Under Value-Based ReimbursementGlorium Tech
 

Similar to VASCO Data Security Solutions for Protecting Identities and Securing Access (20)

Vasco - DSS @Vilnius 2010
Vasco - DSS @Vilnius 2010Vasco - DSS @Vilnius 2010
Vasco - DSS @Vilnius 2010
 
MYDIGIPASS.COM
MYDIGIPASS.COMMYDIGIPASS.COM
MYDIGIPASS.COM
 
Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure
 
Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013Kappa data fun in the sun lux 21022013
Kappa data fun in the sun lux 21022013
 
Infosec31october
Infosec31octoberInfosec31october
Infosec31october
 
Infosec1november
Infosec1novemberInfosec1november
Infosec1november
 
At the table with security solution provider VMware
At the table with security solution provider VMwareAt the table with security solution provider VMware
At the table with security solution provider VMware
 
DSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The WorldDSS ITSEC Conference 2012 - VASCO Authenticates The World
DSS ITSEC Conference 2012 - VASCO Authenticates The World
 
Continuous Verification in a Serverless World
Continuous Verification in a Serverless WorldContinuous Verification in a Serverless World
Continuous Verification in a Serverless World
 
VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015
 
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersSE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
 
Identikey
IdentikeyIdentikey
Identikey
 
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
 
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
Operational Use of Data to Succeed Under Value-Based Reimbursement
Operational Use of Data to Succeed Under Value-Based ReimbursementOperational Use of Data to Succeed Under Value-Based Reimbursement
Operational Use of Data to Succeed Under Value-Based Reimbursement
 

More from Accel

Accel klantenevent 2016: Proximus Call Connect
Accel klantenevent 2016: Proximus Call ConnectAccel klantenevent 2016: Proximus Call Connect
Accel klantenevent 2016: Proximus Call ConnectAccel
 
Accel klantenevent 2016: Clearmedia
Accel klantenevent 2016: ClearmediaAccel klantenevent 2016: Clearmedia
Accel klantenevent 2016: ClearmediaAccel
 
Accel klantenevent 2016: Microsoft
 Accel klantenevent 2016: Microsoft Accel klantenevent 2016: Microsoft
Accel klantenevent 2016: MicrosoftAccel
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel
 
Accel klantenevent 2016: A-Switch
Accel klantenevent 2016: A-SwitchAccel klantenevent 2016: A-Switch
Accel klantenevent 2016: A-SwitchAccel
 
Accel klantenevent 2016: Accel
Accel klantenevent 2016: AccelAccel klantenevent 2016: Accel
Accel klantenevent 2016: AccelAccel
 
Syneton presentatie accounting seminarie Accel
Syneton presentatie accounting seminarie AccelSyneton presentatie accounting seminarie Accel
Syneton presentatie accounting seminarie AccelAccel
 
Silverfin presentatie accounting seminarie Accel
Silverfin presentatie accounting seminarie AccelSilverfin presentatie accounting seminarie Accel
Silverfin presentatie accounting seminarie AccelAccel
 
Awingu presentatie accounting seminarie Accel
Awingu presentatie accounting seminarie AccelAwingu presentatie accounting seminarie Accel
Awingu presentatie accounting seminarie AccelAccel
 
Accel accounting seminarie
Accel accounting seminarieAccel accounting seminarie
Accel accounting seminarieAccel
 

More from Accel (10)

Accel klantenevent 2016: Proximus Call Connect
Accel klantenevent 2016: Proximus Call ConnectAccel klantenevent 2016: Proximus Call Connect
Accel klantenevent 2016: Proximus Call Connect
 
Accel klantenevent 2016: Clearmedia
Accel klantenevent 2016: ClearmediaAccel klantenevent 2016: Clearmedia
Accel klantenevent 2016: Clearmedia
 
Accel klantenevent 2016: Microsoft
 Accel klantenevent 2016: Microsoft Accel klantenevent 2016: Microsoft
Accel klantenevent 2016: Microsoft
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: Awingu
 
Accel klantenevent 2016: A-Switch
Accel klantenevent 2016: A-SwitchAccel klantenevent 2016: A-Switch
Accel klantenevent 2016: A-Switch
 
Accel klantenevent 2016: Accel
Accel klantenevent 2016: AccelAccel klantenevent 2016: Accel
Accel klantenevent 2016: Accel
 
Syneton presentatie accounting seminarie Accel
Syneton presentatie accounting seminarie AccelSyneton presentatie accounting seminarie Accel
Syneton presentatie accounting seminarie Accel
 
Silverfin presentatie accounting seminarie Accel
Silverfin presentatie accounting seminarie AccelSilverfin presentatie accounting seminarie Accel
Silverfin presentatie accounting seminarie Accel
 
Awingu presentatie accounting seminarie Accel
Awingu presentatie accounting seminarie AccelAwingu presentatie accounting seminarie Accel
Awingu presentatie accounting seminarie Accel
 
Accel accounting seminarie
Accel accounting seminarieAccel accounting seminarie
Accel accounting seminarie
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

VASCO Data Security Solutions for Protecting Identities and Securing Access

  • 1. © VASCO Data Security, Inc. - CONFIDENTIAL Kurt Berghs – Area Sales Belgium VASCO Securing IDentities
  • 2. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL It’s a world war out there
  • 3. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 3 Also in Belgium: And we’re in the middle of it
  • 4. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 4 Why? I hate my boss!
  • 5. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 5 Jonathan James Gary McKinnon Kevin Mitnick Why? Glory!
  • 6. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 6 Why? Security…
  • 7. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 7 Why? Money!!!
  • 8. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 8 De oplossing van de overheid
  • 9. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 9 • In België: CBPL (Privacy commissie) https://www.privacycommission.be • Waakhond over de data gegevens van Belgen en van data bewaard in België • Data: van Overheden, Medische gegevens, Klantengegevens, … • Strafrechtelijke bevoegdheden • Verschillende ISO normen worden aanbevolen (ISO 27001:2013) • Data bewaren zoals een goede huisvader • Meldingsplicht!!! De oplossing van de overheid
  • 10. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 10 Boetes:
  • 11. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 11 How to hack?
  • 12. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 12 Hacking for dummies 1. GUESS a password
  • 13. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 13 Hacking for dummies 1. GUESS a password
  • 14. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 14 Hacking for dummies 2. browse or buy
  • 15. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 15 Hacking for dummies 3. Just ask nicely
  • 16. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 16 You’re not alone
  • 17. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 17 You’re not alone +500.000.000 accounts
  • 18. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 18 You’re not alone +1.000.000.000 accounts
  • 19. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL What can you do? 19
  • 20. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL What can you do? 20
  • 21. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL What can you do? 21
  • 22. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Moeten wij ons zorgen maken? The Target Breach What happend to Target? • One of the largest retail chains in US • 40M personal customer records stolen by hackers Concequences • 200M $ estimated CC re-issuing cost • 100M $ cost for security upgrade • 46% drop in profit • 10% drop in stockprice • CEO resigned
  • 23. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Moeten wij ons zorgen maken? 23
  • 24. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 24 Hoe lossen we dit op?
  • 25. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 25 Hoe lossen we dit op?
  • 26. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 26 Hoe lossen we dit op?
  • 27. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 27 Hoe lossen we dit op?
  • 28. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 28 Hoe lossen we dit op?
  • 29. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 29 Hoe lossen we dit op?
  • 30. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 30 Hoe lossen we dit op?
  • 31. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 31 Hoe lossen eind gebruikers dit op?
  • 32. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 32 Hoe lossen eind gebruikers dit op?
  • 33. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 33 Hoe lossen eind gebruikers dit op?
  • 34. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Hoe lost VASCO dit op? Oorsprong
  • 35. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Referenties in de financiele wereld
  • 36. © VASCO Data Security, Inc. - CONFIDENTIAL Tevredenheid met kwaliteit van digitaal aanbod per sector 64% 60% 48% 48% 45% 45% 39% Financial Services Retail Media Utilities Local Government Central Government Transport n = 2500Source: Fujitsu Digital Inside Out research
  • 37. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Hoe lost VASCO dit op? Enterprise security
  • 38. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Referenties in de enterprise markt
  • 39. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Hoe lost Vasco dit op? Online Application Security
  • 40. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Referenties in de online wereld 40
  • 41. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Hoe lost Vasco dit op: 5 Solution Pillars Multi-Factor Authentication Risk Management Mobile Application Security Identity Proofing Electronic Signature
  • 42. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 42 Multifactor Authentication Hardware Token Software Token Wearable © Gartner, 2014 Knowledge Something known to only the user Token Something held by only the user Biometric Trait Something inherent to only the user A password, a passphrase, a PIN An OTP token, a smart card with X. 509 public-key infrastructure credentials A biological or behavioral trait, such as face typography, fingerprint or voice Examples Biometrics Behavioral Analysis
  • 43. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 43 Multifactor authentication before DIGIPASS Go Range DIGIPASS for Web DIGIPASS E-signature Virtual DIGIPASS DIGIPASS for WindowsDIGIPASS for Mobile Software Appliance Service
  • 44. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL Multifactor authentication today 44 Username OTP Cloud office My employees CRM Webmail Appli & Desktop Virtualizatie SSO Employees 1200 External People/Partners 50000 UsernameUsername OTP ERP Remote Desktop mngt File sharing Risk mngt … portal
  • 45. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL VASCO Solution: DIGIPASS for Apps © VASCO Data Security, Inc. - CONFIDENTIAL 9367893678
  • 46. © VASCO Data Security, Inc. - CONFIDENTIAL© VASCO Data Security, Inc. - CONFIDENTIAL 46 ROAM: Register Once. Authenticate Many. VASCO Trusted Digital ID Platform Identity Proofing Providers - Government ID Card - Experian - AYIN - IdenTrust VASCO Certified Digital ID Verified Identities
  • 47. 47