The document discusses the debate around privacy vs convenience with Internet of Things (IoT) technology. It notes that while IoT provides increased connectivity and efficiency, it also raises privacy concerns as more personal data is collected. The document explores issues like identity management, data usage and ownership, and calls for balancing privacy and convenience. It provides examples of approaches like self-sovereign identity that could allow more individual control over personal data and addresses both sides of the important debate around privacy and convenience with emerging technologies.
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion. Filed on August 21, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
Internet (or Cyber) Governance has a long way to go and is presently fraught with confusion - this being a global phenomenon. Then there is the Internet of Things coming up at top speed which means that we have to face up to the risks that come with the convenience ! A solution for governance and some insight into the IoT risks were presented at the Defcon-OWASP Conference in Lucknow (India) on February 22, 2015
This is a presentation prepared and delivered to the International Bar Association Conference in 2012 on behalf of the Interactive Direct Marketing Association. It looks at some of the pragmatic challenges that exist in getting organisations to adopt and adapt to the requirements of the Cookies regulations.
DDoS awareness grows with the attack state shifting towards the healthy state of the Internet. DDoS attacks are like sharks in the ocean—you know they are there, even if you do not see any shark fins above the water. This picture describes what’s happening in the modern internet, where DDoS attacks occur every minute—they become the new normal, and those serving accessibility are adapting by including such services in their bundles. In 2017 an internet business without DDoS mitigation and WAF is ceased to exist.
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
A presentation by Commissioner Cavoukian to the Canadian Institute Advertising and Marketing Law Conference on how Privacy by Design can give a sustainable competitive advantage in advertising and marketing.
The New Internet: When Everything Becomes SmartJeeni
The New Internet is the Internet of Things (IoT). In a few years, people and devices will become almost indivisible entities. This article explains what it means for the economy, the society and our lives.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion. Filed on August 21, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
Internet (or Cyber) Governance has a long way to go and is presently fraught with confusion - this being a global phenomenon. Then there is the Internet of Things coming up at top speed which means that we have to face up to the risks that come with the convenience ! A solution for governance and some insight into the IoT risks were presented at the Defcon-OWASP Conference in Lucknow (India) on February 22, 2015
This is a presentation prepared and delivered to the International Bar Association Conference in 2012 on behalf of the Interactive Direct Marketing Association. It looks at some of the pragmatic challenges that exist in getting organisations to adopt and adapt to the requirements of the Cookies regulations.
DDoS awareness grows with the attack state shifting towards the healthy state of the Internet. DDoS attacks are like sharks in the ocean—you know they are there, even if you do not see any shark fins above the water. This picture describes what’s happening in the modern internet, where DDoS attacks occur every minute—they become the new normal, and those serving accessibility are adapting by including such services in their bundles. In 2017 an internet business without DDoS mitigation and WAF is ceased to exist.
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
A presentation by Commissioner Cavoukian to the Canadian Institute Advertising and Marketing Law Conference on how Privacy by Design can give a sustainable competitive advantage in advertising and marketing.
The New Internet: When Everything Becomes SmartJeeni
The New Internet is the Internet of Things (IoT). In a few years, people and devices will become almost indivisible entities. This article explains what it means for the economy, the society and our lives.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
Presented at the Gartner Identity & Access Management Summit, London, Travis Greene discussed the opportunities and challenges of the Internet of Things (IoT), as well as the early indicators of what the IoT world will look like. He also addressed IoT security and privacy, and the critical role that identity will play in the future.
Blockchain insider | Chapter 3 : Smart MoneyKoh How Tze
What we have now is truly borderless, programmable money
backed by immutable computer systems based on pure logic & mathematics.
3.1 ABCDs That Are Changing The World
3.2 A Century of Technology Innovation
3.3 Two Monetary Worlds
3.4 Three Phases of Cryptocurrencies
Corporate Currency
CBDC, Central Bank-issued Digital Currency
The Money Flower
Money Trees
3.5 The Creation of Capital In Its Simplest Form
3.6 Incentivizing Good Behaviour
Smart Mobility - Ethical Driving and Data Sharing
Resilient City - Impactful Positive Behaviors
Social Contributions - Datanomics
3.7 Bringing Down Borders
Assets Backed Tokens
Security Token Offering
Do We Need A Nation-State Backed Crypto Exchange?
Blockchaining Sukuk
3.8 Summary
Programmable Money for Effective Resources Distribution
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
The title of this PPT is "Blockchain 50 Companies".
This document is based on CB insight.
My favorite companies are Funderbeam, Augur, CHRONICLED, mediachain, OpenBazaar, and ripple.
I strongly believe that blockchain will change the world.
I would be glad if I could help you even just a little bit.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
An initial perspective on the future of data by Stephan Shakespeare, CEO and Co-Founder, YouGov. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
4. Background of IoT Privacy vs
Convenience Debate
Society
Individual
NGO
Academic
Religious
Commercial
Government
4
5. John Locke's take on Role and Authority of
Government?
Foundation Principals from mid 17th century Philosopher
John Locke:
Life, Liberty and the Pursuit of …? Happiness? or Property?
Privacy is a universal human right. There are international
accords related to privacy that serve as the foundation for
national laws, policy frameworks, and international agreements
throughout the world.
https://www.eff.org/issues/international-privacy-standards
Source:
https://www.earlymoderntexts.com/assets/pdfs/locke1689a.pdf
https://www.eff.org/issues/international-privacy-standards 8
7. The Why
McKinsey - Digital
identification:
A key to inclusive
growth
• https://www.mckinsey.com/business-
functions/mckinsey-digital/our-
insights/digital-identification-a-key-to-
inclusive-growth
6
8. McKinsey – Economic Value
Follow the money
“In 2030, digital ID has the
potential to create economic
value equivalent to 6 percent of
GDP in emerging economies
on a per-country basis and 3
percent in mature economies,
assuming high levels of
adoption”
Source: https://www.mckinsey.com/business-functions/mckinsey-
digital/our-insights/digital-identification-a-key-to-inclusive-growth
7
9. Popularity of IoT technology
Purpose
An increasing number of electronic devices are becoming
internet-enabled each year, allowing for more sophisticated
communication and coordination between them and their
users. Electronics devices, ranging from laptops to
thermostats, to automobiles are being connected, forming a
network called the Internet of Things (IoT). In 2020, the
number of IoT devices is forecast to reach 8.74 billion,
surpassing the number of people on earth, showing how
integrated technology is becoming.
The popularity of IoT devices isn’t limited to just
households; businesses across the United States are also
taking advantage of IoT-based technologies to streamline
processes and increase efficiency. Around 29 percent of
North American and European organizations currently use
IoT technology within their business operations, and
another 10 percent plan to integrate IoT technology within
the next year.
5
12. Frictionless
Commerce
“When you remove friction from a
process or a system, you give the people
in that system back one of the only
things that is utterly nonrenewable,
time. And as more and more time has
been ironed out of almost everything
we do—
people have realized that for far too
long they’ve let someone else choose
how they are going to spend their time.
Those days are gone. Everyone values
their own time more than they used to,
and if you think you’ll be able to get
away with taking more of it than you
have been allocated—by leaving too
much friction in place—you are gravely
mistaken.”
https://www.wired.com/story/opinion-
the-future-of-commerce-belongs-to-the-
frictionless/
13. CONVENIENCE VS
PRIVACY
Manage your identity
• Younger respondents are more likely to say they always or mostly
re-use the same credentials that they have used for other accounts
• CONVENIENCE VS PRIVACY
• When making new online accounts, do you re-use the same
credentials (usernames, passwords) that you have used for other
accounts or do you create new credentials for each specific
account?
14. Self-sovereign
identity (SSI):
The true
password killer
How can we make security more convenient?
• While SSO and 2FA are great improvements over traditional,
centralized usernames and passwords, they still don’t let us have our
cake and eat it too — that is, they don’t give us both security and
convenience.
• But there’s an emerging technology that does. It’s called self-
sovereign identity (SSI).
Source: https://www.securitymagazine.com/articles/93356-self-sovereign-identity-the-true-password-killer
18
15. Self Sovereign Identity (SSI)
Credential Flow Self-sovereign identity in the
context of data protection and
privacy (yourstory.com)
The How
Government issues
holds and verifies
credentials, and you
can make claims
with cryptographic
integrity using
identity and
currency wallets
19
17. Primary Government Roles in Identity
Issue Proof
Documents
Permissions and
Authorizations and
Promote Standards
01
Secure and Validate
Credentials and
Claims
02
Record Certain Life
Events
03
Confirm Access to
Benefits and
Entitlements
04
Establish Trust in
Proofs and Claims
while Protecting
Privacy
05
12
19. NIST - Identity and
Access
Management
Roadmap
19
Public Law No: 116-207 (12/04/2020) Internet of Things
Cybersecurity Improvement Act of 2020 or the IoT
Cybersecurity Improvement Act of 2020
https://www.congress.gov/bill/116th-congress/house-
bill/1668
This bill requires the National Institute of Standards and
Technology (NIST) and the Office of Management and Budget
(OMB) to take specified steps to increase cybersecurity for
Internet of Things (IoT) devices. IoT is the extension of
internet connectivity into physical devices and everyday
objects.
https://www.nist.gov/blogs/cybersecurity-insights/rounding-
your-iot-security-requirements-draft-nist-guidance-federal
20. “The United States doesn’t have a singular law that covers the privacy of all types of data. Instead, it has a mix of laws
that go by acronyms like HIPAA, FCRA, FERPA, GLBA, ECPA, COPPA, and VPPA.”
Source: https://www.nytimes.com/wirecutter/blog/state-of-privacy-laws-in-us/
22. Digital Dependence
Convenience Trumps Security & Privacy
• Consumers’ increased reliance on digital channels during the
pandemic may have caused more lax attitudes towards security – with
the convenience of digital ordering often outweighing security and
privacy concerns.
• Many consumers (particularly younger generations) say they would
rather place an order digitally, even if there were security or privacy
concerns with the application. Additionally, consumers rarely decline to
use a new digital platform due to security or privacy concerns.
• This surge in new accounts may also be creating password fatigue,
with consumers reporting high levels of password reuse across their
accounts. This means many of the new accounts created during the
pandemic likely relied on reused credentials, which may have been
compromised in previous data breaches.
Source : https://techcoffeehouse.com/2021/06/25/ibm-survey-pandemic-induced-
digital-reliance-creates-lingering-security-side-effects-in-singapore/
24. Impact
• Unsavory services can expose digital identities and personal
information via the Internet of Things
• The current generation of heavy internet users are digital
denizens, creating curated online personas out of heaps of
information uploaded to social media sites. These people are
also generating detailed “digital exhaust” via the Internet of
Things-connected devices with which they either knowingly
or unknowingly engage. Third parties with either good or bad
intentions can create rich identities out of these data
deposits, to use and abuse as they see fit. This issue actually
stems from one of the biggest opportunities presented by the
IoT: the sheer number of seamless connections proliferating
among digital systems. Internet services promise wonderful
things, yet users rarely take the time to think about the
nature of the information required to accomplish their online
goals.
• Source:
https://intelligence.weforum.org/topics/a1G0X000005JJGcU
AO?tab=publications
34
26. Call to Action
Think about control and ownership of identity privacy and how it
can enhance your cybersecurity footprint
Think about
Demand to know where your personal information is going and
how it is stored
Demand
Find Out what your identity information is being used for and
who has access
Find out
Learn more about identity tools and processes including Self
Sovereign Identity
Learn
Be aware of the tradeoffs of convivence when it comes at the
expense of privacy
Tradeoffs
22
32. More Information
https://sovrin.org/developers/
Video The Sovrin Network- Making Self-Sovereign Identity a
Reality
• https://vimeo.com/305420834
Trust over IP
• https://wiki.trustoverip.org/display/HOME/Trust+Over+IP+Fou
ndation
Books
• https://www.manning.com/books/self-sovereign-identity
• https://www.anthempress.com/the-domains-of-identity-pb
Courses
• https://digitaldefynd.com/best-hyperledger-fabric-courses/
29
33. Digital Identification and Authentication Council
of Canada - DIACC
• Interoperability: Digital Identity You Can Use
• The DIACC is committed to unlocking economic
opportunities for Canadian consumers, and businesses by
providing the framework to develop a robust, secure,
scalable and privacy-enhancing digital identification and
authentication ecosystem that will decrease costs for
everyone while improving service delivery and driving GDP
growth.
• The DIACC Trust Framework Expert Committee (TFEC)
represents a diversity of public and private sector
stakeholders who collaborate to deliver resources that help
to solve and secure identity including: validated use cases,
standards, model agreements, international alignments, and
informative policy development recommendations.
https://diacc.ca/the-diacc/
35. Self Sovereign
Identity
implementations
• Just a few of the SSI implementations that were launched in 2020 or are pending launch
in early 2021 include:
• IATA Travel Pass will be the first verifiable credential capable of providing proof of
COVID-19 test and vaccination status at airports around the world,
• NHS Staff Passport is the first portable digital identity credential for doctors and nurses
in one of the largest public healthcare networks in the world,
• GLEIF (the Global Legal Entity Identifier Foundation), based in Switzerland and the only
global online source that provides open, standardized and high quality legal entity
reference data, is committed to following the SSI model for digital identity credentials
for companies.
• SSI4DE, co-funded by the German Federal Ministry of Economic Affairs, supports
showcases for secure digital identities in Germany, and Chancellor Angela Merkel
declared digital identity as a priority matter during December 2020.
• CULedger MemberPass brings SSI to financial services with Credit Union customer
identity verification,
• Farmer Connect is realizing is vision to “Humanize consumption through technology” by
enabling and empowering individual coffee farmers to more easily work with global
enterprises, and reducing costs and inefficiencies for large companies to work directly
with small and often remote farmers.
• Lumedic Exchange is the first network designed exclusively for patient-centric exchange
of healthcare data using SSI-based verifiable credentials.
Source: https://sovrin.org/2020-how-ssi-went-mainstream/ 26
36. Estonia
Already
Lives Online
Once they’re in the system, Estonians don’t
need to fill out forms, thanks to the country’s
“once-only” rule, which mandates that the
government is allowed to ask for any given
piece of information only one time.
Authenticated digital signatures are also more
secure than their handwritten counterparts, a
source of bemusement to Estonians, who
“think it’s crazy that much of the world still
signs with a pen,”
Source:
https://www.theatlantic.com/international/archive
/2020/05/estonia-america-congress-online-
pandemic/612034/
33
37. Tell Us Once -
UK
Government
Availability:
• Not released
Published by:
• Department for Work and Pensions
Last updated:
• 12 December 2013
Topic:
• Society
License:
• None
Summary
• Tell Us Once is a service which allows people to report a birth or
death to most government organizations in one go.
• The Tell Us Once Database records details of the life event and the
information recorded can include the data of
• birth or death, Names, National Insurance Number, Driving License
and Passport details.
• Information is held for a maximum of 35 days then deleted.
Source: https://data.gov.uk/dataset/fb4b924c-7a42-433a-8280-
78a924a00a94/tell-us-once 36
39. Don Lovett
Bio
Mr. Lovett is a Business and Technology Leader who is passionate about the promise of
Controlled IoT and emerging technology. He recently served as the Chief Information Officer
(CIO) in the Office of Contracting and Procurement Agency, which annually procures $6.7
billion of goods and services for the District of Columbia Government. In this leadership role,
he activated a digital transformation strategy with a focus on linking improvements in data
accuracy, security, accessibility, and transparency to improvements in customer experience.
Mr. Lovett is the Founder and Principal Consultant at ProjectBits Consulting, where he
provided Public Sector, Hi-Tech, Telecom, Financial Services, Manufacturing, and Distribution
clients with business and technology solutions and advice. Before that, he had a decade-long
career at KPMG where he was admitted to the Partnership. He serves as a co-lead for the
ACT-IAC Emerging Technology IoT and Smart Community Working Group. He currently also
leads the America’s at the Government Blockchain Association.
Mr. Lovett has a Master’s Degree in Business Administration (MBA) from the University of
Houston and a Bachelor’s in Accounting from the University of Houston. He served as an
affiliate faculty member at Regis University teaching graduate-level students in organizational
and operational aspects of project management. He has earned graduate-level certificates in
Software Engineering from the University of Texas and Telecommunications Management
from the University of Dallas. He holds SSCP, CSM, and ITIL, Azure and PMP credentials.
Don Lovett
don@projectbits.com
703-434-1660 Mobile
https://www.linkedin.com/in/donlovett/
https://www.projectbits.com/
38