SlideShare a Scribd company logo
1 of 14
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
1
Using IoT to Restore Freedom
Matt Topper
matt@uberether.com
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
2
Managed
Solutions
Hybrid IAM
Deployments
DevSecOps
Integration
Platform
Development
Architecture
& Design
About UsIAM to the Core.
Our team has built
the ICAM
architectures that
protect our nation’s
most critical assets.
Now we help
companies ensure
they’re offering their
customers and
employees the same
level of security.
Just set it and forget
it. Our team runs the
critical security
infrastructure for
numerous
government
agencies. Our
managed services
accelerate delivery
and provide the
secure baseline to
enable your
business.
One of the largest
challenges with
moving to the cloud
is determining how
to balance on
premise and cloud
IAM strategies.
Whole hog,
incremental or hybrid
all have their
benefits, let us help
enable your
organization.
Security in the cloud
provides many new
operating principles.
Not only do software
defined networks
change operating
procedures, but
hardening, identity
management, and
auditing has
completely changed.
Let us help.
IAM has moved well
beyond the stages of
rolling out a vendor
product and hoping
for the best. Identity
is the only thread
companies can rely
on to fuel their digital
transformation. Let
our team build the
platform to enabled
your businesses
success.
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
3
Identities: Beyond Humans
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
4
Going BeyondEvery single conversation
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
5
Beyond Contextual FactorsStronger than a certificate
• Biometrics
• Biological Biometrics
• Active Events
• Behavioral Biometrics
• Passive, Continuous Authentication
• Multimodal Biometrics
• Combinations of multiple factors
• Device Factors
• Geolocation, Gait Analysis, Temperature,
Barometric Pressure, Voice, Facial, Finger
• Profiles, Certificates, Patch Levels,
Velocity Checks, IP Address, Time of Day,
Fingerprinting, Open Ports, Software
Versions, Keystrokes
• Host Proximity
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
6
Let’s Get Physical!
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
7
Our HeroAnd a noble cause
The Challenge:
• Unfamiliar environment
• New activities
• Embarrassment
• Worried family members
• Technologically
challenged
• Fricking WIFI…
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
8
The First AttemptIt’s not pretty, but it worked
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
9
The Second AttemptBetter, but we had new problems
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
10
What Happened NextMo’ people mo’ problems
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
11
How We’re Doing itStandards based security
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
12
Customer Shift
Data Driven Innovation
Increased Demand For
Speed, Customization,
Experience and
Transparency
How Does It ApplyLeading Your Organization Through the Digital Transformation
• In the Office
• Badge in = domain login
• Current presence onsite?
• Brand new employee welcome
• Does the badge match the face?
• Where are all the visitors?
• In the Field
• Customers in the store
• Customers in the service bay
• New car? No problem
• Customers at the window
• Customer coming for pickup
• Remember when I left the room
New Products and
Business Models
Create New
Competitors and
Enhance Customer
Choices
Data Proliferation
and Application of
Advanced
Analytics Create
New Opportunities
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
13
Let’s Get Physical!
www.uberether.com
© 2018 UberEther, Inc. All Rights Reserved.
14
Thank you!

More Related Content

What's hot

Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
Converge 2018 - Funding Your Security Program Through Digital Transformation
Converge 2018 - Funding Your Security Program Through Digital TransformationConverge 2018 - Funding Your Security Program Through Digital Transformation
Converge 2018 - Funding Your Security Program Through Digital TransformationMatt Topper
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Prabir Saha
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceCipherCloud
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins FlexeraFlexera
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveNetworkCollaborators
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why Flexera
 
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...ThousandEyes
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan kohNetworkCollaborators
 

What's hot (20)

Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Converge 2018 - Funding Your Security Program Through Digital Transformation
Converge 2018 - Funding Your Security Program Through Digital TransformationConverge 2018 - Funding Your Security Program Through Digital Transformation
Converge 2018 - Funding Your Security Program Through Digital Transformation
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why
 
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 

Similar to Using IoT to Restore Freedom with Physical Identity

Artificial Intelligence Tutorial
Artificial Intelligence TutorialArtificial Intelligence Tutorial
Artificial Intelligence TutorialVeritone, Inc.
 
Life of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech TalksLife of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech TalksAmazon Web Services
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Amazon Web Services
 
Building Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 MinskBuilding Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 MinskBoaz Ziniman
 
Nimbix AI Cloud and PowerAI
Nimbix AI Cloud and PowerAINimbix AI Cloud and PowerAI
Nimbix AI Cloud and PowerAILeo Reiter
 
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...Amazon Web Services
 
The seven habits of highly successful builders - AWS Summit Cape Town 2018
The seven habits of highly successful builders - AWS Summit Cape Town 2018The seven habits of highly successful builders - AWS Summit Cape Town 2018
The seven habits of highly successful builders - AWS Summit Cape Town 2018Amazon Web Services
 
Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018
Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018
Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018Amazon Web Services
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...Martin Klie
 
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Amazon Web Services
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Boaz Ziniman
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Amazon Web Services
 
AI and IoT innovation - an industry focus
AI and IoT innovation - an industry focusAI and IoT innovation - an industry focus
AI and IoT innovation - an industry focusAmazon Web Services
 
A Definition of Done for DevSecOps
A Definition of Done for DevSecOpsA Definition of Done for DevSecOps
A Definition of Done for DevSecOpsGene Gotimer
 
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...Amazon Web Services
 

Similar to Using IoT to Restore Freedom with Physical Identity (20)

Containers for Startups
Containers for StartupsContainers for Startups
Containers for Startups
 
Artificial Intelligence Tutorial
Artificial Intelligence TutorialArtificial Intelligence Tutorial
Artificial Intelligence Tutorial
 
Life of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech TalksLife of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech Talks
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
 
Building Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 MinskBuilding Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 Minsk
 
Nimbix AI Cloud and PowerAI
Nimbix AI Cloud and PowerAINimbix AI Cloud and PowerAI
Nimbix AI Cloud and PowerAI
 
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
 
The seven habits of highly successful builders - AWS Summit Cape Town 2018
The seven habits of highly successful builders - AWS Summit Cape Town 2018The seven habits of highly successful builders - AWS Summit Cape Town 2018
The seven habits of highly successful builders - AWS Summit Cape Town 2018
 
Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018
Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018
Releasing Mission-Critical Software at Amazon (DEV209-R1) - AWS re:Invent 2018
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
 
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
DevOps: The Amazon Story
DevOps: The Amazon StoryDevOps: The Amazon Story
DevOps: The Amazon Story
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
 
AI and IoT innovation - an industry focus
AI and IoT innovation - an industry focusAI and IoT innovation - an industry focus
AI and IoT innovation - an industry focus
 
Culture of Innovation at Amazon
Culture of Innovation at AmazonCulture of Innovation at Amazon
Culture of Innovation at Amazon
 
A Definition of Done for DevSecOps
A Definition of Done for DevSecOpsA Definition of Done for DevSecOps
A Definition of Done for DevSecOps
 
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Using IoT to Restore Freedom with Physical Identity

  • 1. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 1 Using IoT to Restore Freedom Matt Topper matt@uberether.com
  • 2. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 2 Managed Solutions Hybrid IAM Deployments DevSecOps Integration Platform Development Architecture & Design About UsIAM to the Core. Our team has built the ICAM architectures that protect our nation’s most critical assets. Now we help companies ensure they’re offering their customers and employees the same level of security. Just set it and forget it. Our team runs the critical security infrastructure for numerous government agencies. Our managed services accelerate delivery and provide the secure baseline to enable your business. One of the largest challenges with moving to the cloud is determining how to balance on premise and cloud IAM strategies. Whole hog, incremental or hybrid all have their benefits, let us help enable your organization. Security in the cloud provides many new operating principles. Not only do software defined networks change operating procedures, but hardening, identity management, and auditing has completely changed. Let us help. IAM has moved well beyond the stages of rolling out a vendor product and hoping for the best. Identity is the only thread companies can rely on to fuel their digital transformation. Let our team build the platform to enabled your businesses success.
  • 3. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 3 Identities: Beyond Humans
  • 4. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 4 Going BeyondEvery single conversation
  • 5. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 5 Beyond Contextual FactorsStronger than a certificate • Biometrics • Biological Biometrics • Active Events • Behavioral Biometrics • Passive, Continuous Authentication • Multimodal Biometrics • Combinations of multiple factors • Device Factors • Geolocation, Gait Analysis, Temperature, Barometric Pressure, Voice, Facial, Finger • Profiles, Certificates, Patch Levels, Velocity Checks, IP Address, Time of Day, Fingerprinting, Open Ports, Software Versions, Keystrokes • Host Proximity
  • 6. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 6 Let’s Get Physical!
  • 7. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 7 Our HeroAnd a noble cause The Challenge: • Unfamiliar environment • New activities • Embarrassment • Worried family members • Technologically challenged • Fricking WIFI…
  • 8. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 8 The First AttemptIt’s not pretty, but it worked
  • 9. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 9 The Second AttemptBetter, but we had new problems
  • 10. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 10 What Happened NextMo’ people mo’ problems
  • 11. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 11 How We’re Doing itStandards based security
  • 12. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 12 Customer Shift Data Driven Innovation Increased Demand For Speed, Customization, Experience and Transparency How Does It ApplyLeading Your Organization Through the Digital Transformation • In the Office • Badge in = domain login • Current presence onsite? • Brand new employee welcome • Does the badge match the face? • Where are all the visitors? • In the Field • Customers in the store • Customers in the service bay • New car? No problem • Customers at the window • Customer coming for pickup • Remember when I left the room New Products and Business Models Create New Competitors and Enhance Customer Choices Data Proliferation and Application of Advanced Analytics Create New Opportunities
  • 13. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 13 Let’s Get Physical!
  • 14. www.uberether.com © 2018 UberEther, Inc. All Rights Reserved. 14 Thank you!

Editor's Notes

  1. Many organizations are moving to a Zero Trust model, most publicly discussed implementation is Google’s BeyondCorp. We trust nothing and build up profiles on the users and devices that connect to our networks and services. Even 20 person companies are able to built perimeter less security solutions that span their on premise and cloud services. Ideally we are moving away from just a password beyond MFA to true assertion of a user, the devices they use and the patterns by which follow every day. Better definition of corporate identity that aligns with how employees operate today Access decision making is done with the right contextual information Access controls are centralized with better visibility into employee activity Enforced security measures encourage better corporate security posture The network no longer defines trust, eliminating common attack vectors
  2. Very quickly, through our user’s devices the behaviors by which people are following Geolocation, Gait Analysis, Temperature, Barometric pressure, voice recognition, facial recognition, connected devices, biometrics, connected accounts. Mindwave headset But also the user’s devices utilizing Device Profiling, Certificates, Patch Levels, Velocity Checks, IP Address, Time of Day, trusted devices, fingerprinting, open ports, known software versions, and the combination of these devices working together in proximity from the same places. People have become the new perimeter.
  3. With all of this movement, it’s always bugged me that in so many companies the logical access control systems are completely separate from the physical access control systems. Badge readers, security cameras and security personnel are rarely integrated into the IAM governance solutions. Contractors and visitors are managed here but never connected to our internal systems for account provisioning or tracking them around the building. When we get an itch as a company we tend to do things that also solve a problem we personally have. In 2013 we wanted to learn more about AWS so we built a scalable cloud native web application to help us and up to 10,000 of our closest friends at a time to plan, rate and drink more beer at festivals across the country. There is nothing like 10,000 drunk people hitting your app within a 20 minute period to make sure your auto scaling works. This project was no different, but this one was for a much more noble cause. We’d been scratching an itch on how to manage IoT devices that aren’t directly tied to humans, the rapid lowering of costs to acquire and deploy devices, advancement in BLE technologies for positioning (we tried this with our beer event application) and facial recognition APIs from Google and Amazon. We also realize how cheap and easy it is to clone a RFID based access card with only a few hundred dollars in hardware and proximity to your readers.
  4. This is Chris. Additionally, Chris was mentioning that his mother in law was struggling with dementia, she and her husband were currently living with them and soon to move into a new retirement community. There was worry that she would get lost and not deal well with the transition. Quickly upon moving into the new environment these worries turned out to be true. Not being familiar with the new environment she struggled to adapt. She could not easily find where she was supposed to be going, was getting lost, and started to just stay in her room and not enjoy life.    When Chris talked with her he asked why she didn’t use the facility’s call button to ask for help when she was stuck and she felt that she was a bother to the staff with the button and they treated it like an emergency. She also wanted a way to more discretely ask for help from friends and family and not cause a stink. Initially we tried addressing some of this through giving her shortcuts on her phone to call specific people, update here google calendar to remind her where she was going, but the biggest challenge was she couldn’t describe where she was if she was in trouble or how she could get to the actual places that were on her calendar.
  5. We were close, but had to turn it on it’s head to overcome these issues. We started using active readers (first raspberry pi’s then ESP32s about $10 each) and dummy tokens. We built a mesh network of the devices so they all communicated with each other on beacon locations.  We found that BLE enabled badges and fobs are down to $1 a piece at scale. Some of these even have an ability to broadcast a different identifier when a button is pushed. Able to control the antenna/signal strength to get better positioning. We had a working prototype of one person and their family.
  6. We were close, but had to turn it on it’s head to overcome these issues. We started using active readers (first raspberry pi’s then ESP32s about $10 each) and dummy tokens. We built a mesh network of the devices so they all communicated with each other on beacon locations.  We found that BLE enabled badges and fobs are down to $1 a piece at scale. Some of these even have an ability to broadcast a different identifier when a button is pushed. Able to control the antenna/signal strength to get better positioning. We had a working prototype of one person and their family.
  7. Then something happened. Other people started asking questions, she shared the cool tracking with her friends. They wanted it too. The facility asked us about it because they could see her demeanor change. All of a sudden we had an identity problem brewing. Multiple devices, people registration, fob registration, needed to associate those fobs to humans. Needed to only track allowed fobs. Their friends needed to register for the platform. They had to authorize their friends to see their locations. Had to register staff members. Everyone needed authentication for the UIs Distributed readers needed to be managed to the platform. We had to manage certificates on the devices, control software push updates from afar.
  8. Show user interfaces, show architecture diagrams, show some of the devices, discuss the standards being used in each level / layer of the architecture. (certificates, mqqt, oauth, oidc, social login, etc.)
  9. Discuss how this not only applies to a nursing home, but how these factors can contribute to additional factors for authorization policies and tracking behavior patterns. Easier to detect badge cloning without expensive camera systems (but that would add more context). Talk about simple things like what was done at CIA. If you aren’t in the building you can’t log into the network directly. No more tailgating. When you leave you badge out and we remove your access.  Your badge is in the office with you laptop, but your phone is at home. What is the policy and access risk on this? You customers are in the store, where are they? Are they a VIP? What were they looking at on your website last night? What should you sell them today? What did they leave in their cart?  A car pulls into the service bay, know what car it is and what you need to schedule before you even approach the window of the vehicle. Greet the customer by name when they pull up to the speaker to order lunch, ask them if they want the grande frappucino again. When the customer walks in just hand them their pizza from the shelf. It’ll amaze them. You are watching TV with your significant other and go to bed, your set top box should know when you left the room and where to start the show when you get up in the morning (even though they stayed up and finished the show) These devices are getting cheaper every day, the best practices are emerging and providing exciting new opportunities in for our businesses can help power your digital transformation. With the power of identity we can change the lives of our customers for the better and give them a much more memorable experience.