SlideShare a Scribd company logo
GARTNER’S CONVERGED &
COMPELLING FUTURE
MICHAEL THELANDER, SR DIR PRODUCT MARKETING
LEVERAGING THE TRUSTED IDENTITY CAPABILITIES MODEL - PART
1
MAY 2018
2
MICHAEL THELANDER
S E N I O R D I R E C T O R P R O D U C T M A R K E T I N G ,
I O V A T I O N
 CISSP-trained through SANS with experience in
configuration security and authentication
 25 years in product management and product marketing, with
the last 10 focused on cyber security
 Articles have appeared in SC Magazine, IT Professional
Magazine, CyberDefense Magazine, and SoftwareCEO.com
 Drives go-to-market initiatives at iovation
3
4
5
EXPLORING GARTNER’S TICM
T H E T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L
6
SESSION 1 AGENDA
E X P L O R I N G G A R T N E R ’ S T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L
3
2
1
DEFINING THE TICM
WHERE WE CAME FROM AND WHERE WE’RE
GOING
8
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
“ T A K E A N E W A P P R O A C H T O E S T A B L I S H I N G A N D M A I N T A I N I N G T R U S T … ”
9
THREE CORE PILLARS OF IDENTITY AND TRUST
T O D A Y, P E R S O N A L R E L A T I O N S H I P S T H A T B E C O M E D I G I T A L
Identity
Proofing
Authentication
Online
Fraud
Detection
10
THREE CORE PILLARS OF IDENTITY AND TRUST
D I S C I P L I N E S T H A T W E R E I N D E P E N E D E N T A R E B E C O M I N G I N T E R D E P E N D E N T
Identity
Proofing
Authentication
Online
Fraud
Detection
1
2
3
4
11
THREE CORE PILLARS OF IDENTITY AND TRUST
E A C H P I L L A R G E T S B G G E R , A N D A L L G R O W C L O S E R T O G E T H E R
Identity
Proofing Authentication
Online
Fraud
Detection
12
THREE CORE PILLARS OF IDENTITY AND TRUST
T H E C U S T O M E R ’ S D E V I C E B E C O M E S T H E “ A N C H O R O F T R U S T ”
Identity
Proofing Authentication
Online
Fraud
Detection
13
THREE CORE PILLARS OF IDENTITY AND TRUST
R O L E S B E C O M E M O R E D E F I N E D A N D M O R E I N T E R T W I N E D
Identity
Proofing Authentication
Online
Fraud
Detection
RISK &
COMPLIANCE
MANAGER
AUTHENTICATION
MANAGER
INFOSEC
ARCHITECT
FRAUD
MANAGER
UX DIRECTOR
UX DIRECTOR PRODUCT MANAGER
OR
LOB MANAGER
SO WHAT?
WHY IS THIS SUCH A BIG PROBLEM NOW?
15
WE’VE TURNED A CORNER
16
WE’VE TURNED A CORNER
17
FRAUD & RISK
1st and 3rd Party Fraud
Identity Theft
Application Fraud
Online Abuse
Policy Violation
CYBERSECURITY
Identity and Access
Mgmt
Account Takeover
Session Hijacking
Man-in-the-Middle
Attacks
SCA for PSD2
USER
EXPERIENCE
Grow the Business
Reduce Friction
Improve NPS
Omni-channel
Access
Increased
Visits/Month
Cross-device
Experience
18FRAUD TEAM IAM & INFOSEC TEAM PM + USER EXPERIENCE TEAM
CAN WE COMMUNICATE ACROSS TEAMS?
19
CAN WE COMMUNICATE ACROSS TEAMS?
20
COMMUNICATING ACROSS TEAMS!
ROLES: TICM
MODEL AS
FRAMEWORK
22
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)T H E L E G A C Y V I E W O F I D E N T I T Y A S S U R A N C E , I D P R O O F I N G A N D
A U T H E N T I C A T I O N
 In the “legacy”
enterprise view, ID
Proofing and recurring
authentication are
clearly separated
 ID Proofing is used at
account creation, and
User Authentication is
used at account login
 Online fraud detection
is not a significant
factor in this model, and
is managed elsewhere
23
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
 Significant changes in
the TICM view:
 The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
 Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
 They also note that
24
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
 Significant changes in
the TICM view:
 The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
 Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
 They also note that
25
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E T I C M E X P A N D S I N T O F D P U S E C A S E S
 Significant changes in
the TICM view:
 The inclusion of on
Online Fraud
Detection tools
expands the scope of
all activities, even ID
proofing
 Key terms arrive –
“contextual” and
“triangulation” – to
indicate new analytics
 They also note that
• Point-in-time activities become “continuous”
• “Context” is a key missing ingredient
• Solutions go from silos to “complementary”
• A new need develops: Dynamic Authentication
which is….
• Continuous
• Contextual
• Complementary
26
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up authentication
– strongly leverages
risk and integrity signals
 ID Proofing can be re-
established at any
point in the customer
journey
 Analytics “yield greater
value than crude
KBA” in this process
27
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up authentication
– strongly leverages
risk and integrity signals
 ID Proofing can be re-
established at any
point in the customer
journey
 Analytics “yield greater
value than crude
KBA” in this process
28
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
 ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
 Analytics “yield greater
value than crude KBA”
in this process
• Look at the bottom of the diagram!
• The critical signals used in every phase
(account creation, login, and post login)
come from Online Fraud Detection tools
• Are you missing a key ingredient to
implement the Gartner TICM model?
29
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
 ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
 Analytics “yield greater
value than crude KBA”
in this process
• Are your fraud insights integrated into
cybersecurity?
• Is identity proofing dynamic or is it point-in-
time only?
• Are you having conversations across silos?
30
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
31
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
T H E N E W M O D E L
 Now all areas are
interdependent
 Trust elevation – or
step-up – strongly
leverages risk and
integrity signals
 ID Proofing can be re-
established at any point
in the customer journey
or lifecycle
 Analytics “yield greater
value than crude KBA”
in this process
“One of the authors had a client interaction that was particularly telling:
A team in a bank was looking at new customer authentication methods,
and was particularly interested in the potential value of analytics and
an adaptive access approach, without being aware of the overlap of
these techniques with OFD, which was the province of a
completely different team within the bank.”
32
BIG TAKEAWYS FROM SESSION ONE ON THE TICM
3
2
1
OUR NEXT WEBINARS
ONLINE FRAUD DETECTION TOOLS DELIVER
THE MISSING INGREDIENTS
34
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
 Credentials serve the
Identity Corroboration
problem
 Analytics solves for the
Identity Dissonance
problems
 Authentication products
(iovation’s LaunchKey
and ClearKey) enable
these functions
 Fraud detection products
(like iovation FraudForce)
enable these functions
35
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
I N O U R N E X T S E S S I O N
36
1. Mobile devices can be
gateways, consumers, or
IoT nodes
THE TICM WORKS IN THE INTERNET OF
THINGS
D E V I C E S A S G A T E W A Y S A N D C O N T R O L L E R S
Q&A
iovation.com/resources/reports
CONTACT US
www.iovation.com
@TheOtherMichael
SENIOR DIRECTOR PRODUCT MARKETING
MICHAEL
THELANDER
michael.thelander@iovation.com
503.943.6700
39
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
 The new model also
makes extensive use of a
“familiar people vs.
strange people” notion
 Third-party credentials
(like Single sign-on
systems), risk signals,
and attack signals are
important here
40
TR U STED ID EN TITY C A PA B ILITIES MOD EL
( TIC M)
 Authentication and
Online Fraud Detection
make the most use of
common tools and
signals
 Identity proofing
provides the critical
ingredient of Third-Party
Credentials
 The combination of “ID
Proofing + Online Fraud
Detection” provides, in
this model, the strongest
41
 External Message, NEW IMPLEMENTATIONS:
 If you’re building a new system that integrates identity proofing, auth, and OFD…
 … iovation can provide (or connect you to) every piece
 In an integrated solution that binds everything together
 External Messaged UPDATE or ADD-ON IMPLEMENTATIONS:
 iovation online fraud detection solutions add the missing risk and reputation ingredients
 Our SaaS-based solutions make it easy to layer risk insight into your integration points
 Third-Party PARTNER, CHANNEL or OEM MESSAGES:
 We deliver the pieces you may be missing to fulfill the TICM vision
 We can be a transparent “capabilities multiplier” for your offerings
THE BOTTOM LINE
42
43
44
45
46
47
WEBINAR

More Related Content

Similar to Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)

Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
Alex Robbins
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
TransUnion
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
Future Agenda
 

Similar to Gartner Offers a Converged and Compelling Future (Gartner Report Part 1) (20)

Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Velix.ID
Velix.ID Velix.ID
Velix.ID
 
Asia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned BusinessAsia Start-Up InsurTech Award 2017 - Aligned Business
Asia Start-Up InsurTech Award 2017 - Aligned Business
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
 
Dynamic authentication rollin'
Dynamic authentication rollin'Dynamic authentication rollin'
Dynamic authentication rollin'
 
Esteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should careEsteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should care
 
Digital Trust and the Identity of things
Digital Trust and the Identity of thingsDigital Trust and the Identity of things
Digital Trust and the Identity of things
 
Hedging Your Bets: Why Top FI’s are Investing in Machine Learning
Hedging Your Bets: Why Top FI’s are Investing in Machine LearningHedging Your Bets: Why Top FI’s are Investing in Machine Learning
Hedging Your Bets: Why Top FI’s are Investing in Machine Learning
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
Digital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive IndustryDigital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive Industry
 

More from TransUnion

Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
TransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)

  • 1. GARTNER’S CONVERGED & COMPELLING FUTURE MICHAEL THELANDER, SR DIR PRODUCT MARKETING LEVERAGING THE TRUSTED IDENTITY CAPABILITIES MODEL - PART 1 MAY 2018
  • 2. 2 MICHAEL THELANDER S E N I O R D I R E C T O R P R O D U C T M A R K E T I N G , I O V A T I O N  CISSP-trained through SANS with experience in configuration security and authentication  25 years in product management and product marketing, with the last 10 focused on cyber security  Articles have appeared in SC Magazine, IT Professional Magazine, CyberDefense Magazine, and SoftwareCEO.com  Drives go-to-market initiatives at iovation
  • 3. 3
  • 4. 4
  • 5. 5 EXPLORING GARTNER’S TICM T H E T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L
  • 6. 6 SESSION 1 AGENDA E X P L O R I N G G A R T N E R ’ S T R U S T E D I D E N T I T Y C A P A B I L I T I E S M O D E L 3 2 1
  • 7. DEFINING THE TICM WHERE WE CAME FROM AND WHERE WE’RE GOING
  • 8. 8 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) “ T A K E A N E W A P P R O A C H T O E S T A B L I S H I N G A N D M A I N T A I N I N G T R U S T … ”
  • 9. 9 THREE CORE PILLARS OF IDENTITY AND TRUST T O D A Y, P E R S O N A L R E L A T I O N S H I P S T H A T B E C O M E D I G I T A L Identity Proofing Authentication Online Fraud Detection
  • 10. 10 THREE CORE PILLARS OF IDENTITY AND TRUST D I S C I P L I N E S T H A T W E R E I N D E P E N E D E N T A R E B E C O M I N G I N T E R D E P E N D E N T Identity Proofing Authentication Online Fraud Detection 1 2 3 4
  • 11. 11 THREE CORE PILLARS OF IDENTITY AND TRUST E A C H P I L L A R G E T S B G G E R , A N D A L L G R O W C L O S E R T O G E T H E R Identity Proofing Authentication Online Fraud Detection
  • 12. 12 THREE CORE PILLARS OF IDENTITY AND TRUST T H E C U S T O M E R ’ S D E V I C E B E C O M E S T H E “ A N C H O R O F T R U S T ” Identity Proofing Authentication Online Fraud Detection
  • 13. 13 THREE CORE PILLARS OF IDENTITY AND TRUST R O L E S B E C O M E M O R E D E F I N E D A N D M O R E I N T E R T W I N E D Identity Proofing Authentication Online Fraud Detection RISK & COMPLIANCE MANAGER AUTHENTICATION MANAGER INFOSEC ARCHITECT FRAUD MANAGER UX DIRECTOR UX DIRECTOR PRODUCT MANAGER OR LOB MANAGER
  • 14. SO WHAT? WHY IS THIS SUCH A BIG PROBLEM NOW?
  • 17. 17 FRAUD & RISK 1st and 3rd Party Fraud Identity Theft Application Fraud Online Abuse Policy Violation CYBERSECURITY Identity and Access Mgmt Account Takeover Session Hijacking Man-in-the-Middle Attacks SCA for PSD2 USER EXPERIENCE Grow the Business Reduce Friction Improve NPS Omni-channel Access Increased Visits/Month Cross-device Experience
  • 18. 18FRAUD TEAM IAM & INFOSEC TEAM PM + USER EXPERIENCE TEAM CAN WE COMMUNICATE ACROSS TEAMS?
  • 19. 19 CAN WE COMMUNICATE ACROSS TEAMS?
  • 22. 22 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)T H E L E G A C Y V I E W O F I D E N T I T Y A S S U R A N C E , I D P R O O F I N G A N D A U T H E N T I C A T I O N  In the “legacy” enterprise view, ID Proofing and recurring authentication are clearly separated  ID Proofing is used at account creation, and User Authentication is used at account login  Online fraud detection is not a significant factor in this model, and is managed elsewhere
  • 23. 23 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E T I C M E X P A N D S I N T O F D P U S E C A S E S  Significant changes in the TICM view:  The inclusion of on Online Fraud Detection tools expands the scope of all activities, even ID proofing  Key terms arrive – “contextual” and “triangulation” – to indicate new analytics  They also note that
  • 24. 24 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E T I C M E X P A N D S I N T O F D P U S E C A S E S  Significant changes in the TICM view:  The inclusion of on Online Fraud Detection tools expands the scope of all activities, even ID proofing  Key terms arrive – “contextual” and “triangulation” – to indicate new analytics  They also note that
  • 25. 25 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E T I C M E X P A N D S I N T O F D P U S E C A S E S  Significant changes in the TICM view:  The inclusion of on Online Fraud Detection tools expands the scope of all activities, even ID proofing  Key terms arrive – “contextual” and “triangulation” – to indicate new analytics  They also note that • Point-in-time activities become “continuous” • “Context” is a key missing ingredient • Solutions go from silos to “complementary” • A new need develops: Dynamic Authentication which is…. • Continuous • Contextual • Complementary
  • 26. 26 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up authentication – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey  Analytics “yield greater value than crude KBA” in this process
  • 27. 27 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up authentication – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey  Analytics “yield greater value than crude KBA” in this process
  • 28. 28 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey or lifecycle  Analytics “yield greater value than crude KBA” in this process • Look at the bottom of the diagram! • The critical signals used in every phase (account creation, login, and post login) come from Online Fraud Detection tools • Are you missing a key ingredient to implement the Gartner TICM model?
  • 29. 29 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey or lifecycle  Analytics “yield greater value than crude KBA” in this process • Are your fraud insights integrated into cybersecurity? • Is identity proofing dynamic or is it point-in- time only? • Are you having conversations across silos?
  • 30. 30 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L
  • 31. 31 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) T H E N E W M O D E L  Now all areas are interdependent  Trust elevation – or step-up – strongly leverages risk and integrity signals  ID Proofing can be re- established at any point in the customer journey or lifecycle  Analytics “yield greater value than crude KBA” in this process “One of the authors had a client interaction that was particularly telling: A team in a bank was looking at new customer authentication methods, and was particularly interested in the potential value of analytics and an adaptive access approach, without being aware of the overlap of these techniques with OFD, which was the province of a completely different team within the bank.”
  • 32. 32 BIG TAKEAWYS FROM SESSION ONE ON THE TICM 3 2 1
  • 33. OUR NEXT WEBINARS ONLINE FRAUD DETECTION TOOLS DELIVER THE MISSING INGREDIENTS
  • 34. 34 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)  Credentials serve the Identity Corroboration problem  Analytics solves for the Identity Dissonance problems  Authentication products (iovation’s LaunchKey and ClearKey) enable these functions  Fraud detection products (like iovation FraudForce) enable these functions
  • 35. 35 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M) I N O U R N E X T S E S S I O N
  • 36. 36 1. Mobile devices can be gateways, consumers, or IoT nodes THE TICM WORKS IN THE INTERNET OF THINGS D E V I C E S A S G A T E W A Y S A N D C O N T R O L L E R S
  • 38. CONTACT US www.iovation.com @TheOtherMichael SENIOR DIRECTOR PRODUCT MARKETING MICHAEL THELANDER michael.thelander@iovation.com 503.943.6700
  • 39. 39 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)  The new model also makes extensive use of a “familiar people vs. strange people” notion  Third-party credentials (like Single sign-on systems), risk signals, and attack signals are important here
  • 40. 40 TR U STED ID EN TITY C A PA B ILITIES MOD EL ( TIC M)  Authentication and Online Fraud Detection make the most use of common tools and signals  Identity proofing provides the critical ingredient of Third-Party Credentials  The combination of “ID Proofing + Online Fraud Detection” provides, in this model, the strongest
  • 41. 41  External Message, NEW IMPLEMENTATIONS:  If you’re building a new system that integrates identity proofing, auth, and OFD…  … iovation can provide (or connect you to) every piece  In an integrated solution that binds everything together  External Messaged UPDATE or ADD-ON IMPLEMENTATIONS:  iovation online fraud detection solutions add the missing risk and reputation ingredients  Our SaaS-based solutions make it easy to layer risk insight into your integration points  Third-Party PARTNER, CHANNEL or OEM MESSAGES:  We deliver the pieces you may be missing to fulfill the TICM vision  We can be a transparent “capabilities multiplier” for your offerings THE BOTTOM LINE
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48.

Editor's Notes

  1. Starbucks has a reputation for forging strong personal relationships, and this is in essence the root of identity proofing. Authentication is the way we extend that personal, 1:1 barista-to-customer relationship into the digital world. Lastly, any open and friendly platform will by nature invite fraud. How do we stop fraud without trampling on user experience?
  2. As these needs evolve, we see how interdependent these phases are on one another. We need collaborative systems that can inform the next system in the chain of risk, of trustworthiness, and even reward
  3. Today, these silos are not only moving closer together as digital interactions become the new norm, but overalapping and the walls are breaking down
  4. To facilitate this, our online systems need a new anchor of trust. We believe the end users’ multiple devices serve as that anchor, in their specific identities, in their communal identity, and in their reputation
  5. To facilitate this, our online systems need a new anchor of trust. We believe the end users’ multiple devices serve as that anchor, in their specific identities, in their communal identity, and in their reputation