This presentation was given by OneID founder and CEO Steve Kirsch at the pii2011 Venture Forum in Menlo Park, CA on November 15, 2011. For more information on the conference, visit http://pii2011.com.
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!Identive
This month’s Smart Sense Newsletter features an interview with Terry Gold, VP of Sales North America for idOnDemand. In the interview, Terry discussed several topics, including:
- How does idOnDemand keep up with and contain identity fraud?
- What identification solutions does idOnDemand offer?
- Who is the end-user of idOnDemand’s products and what benefits do they receive?
- Could smart cards become obsolete in the near future?
- What is the next big thing we can expect from idOnDemand?
Follow idOD on Twitter: http://twitter.com/idondemand
http://www.idondemand.com
http://www.identive-group.com
A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
The document discusses the concept of a digital footprint and how personal data is collected from various online activities and used by companies. It notes that an individual's digital footprint contains information about them that they share themselves as well as data about them from other sources, and this footprint can be analyzed to learn about the person. Control over personal data and digital footprints is important, as this information has value and privacy settings need to be managed to prevent unwanted access or use of people's data.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
The document discusses the Higgins Identity Framework, an open source project that aims to (1) model and (2) create technologies for personal identity on the Internet. It does this by implementing existing standards like OpenID and SAML rather than inventing new ones. The framework provides a consistent user experience for managing identity data across different systems using "information cards" and a centralized identity attribute service that integrates data from various sources. It allows users more control over their personal information and convenience in interactions that require identity verification.
Hoyos introduces his new identity assertion platform called HoyosID as a solution to what he sees as insanity in the current identity industry. HoyosID uses biometrics on smartphones to allow convenient login without passwords or tokens. Hoyos believes convenience is key for users and that solutions requiring extra hardware tokens will fail. HoyosID stores no biometrics and uses various techniques like liveness detection to prevent spoofing or replay attacks. It also includes an open API to integrate third party biometrics solutions. Hoyos plans to release HoyosID apps in early 2014 supporting major smartphone models.
SMS PASSCODE represents a new generation innovative solution that enables organizations and companies to easily protect employee remote access to corporate systems (Citrix, Microsoft icl. OWA, Virtual Desktops VPN, SSL VPN etc.) with two-factor authentication via SMS, voice call or secure e-mail. In short, the solution first validates the user name and password before creating and sending a one-time-password only, valid for that login attempt. Because it can only be generated this way and only works for that login on that computer, it is award-winning security against these modern threats. Easy and very secure.
The World Internet Security Company provides secure communication solutions including WISePhone+, a multi-platform secure VoIP solution available on iPhone, iPad, Android, PC and Blackberry. WISePhone+ allows for encrypted voice calls between supported devices and includes features like background support, call transfer, conferencing and call history. When used with WISePhoneGo, an optional managed service, it offers additional enterprise features such as intergroup calling, presence status and group messaging.
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!Identive
This month’s Smart Sense Newsletter features an interview with Terry Gold, VP of Sales North America for idOnDemand. In the interview, Terry discussed several topics, including:
- How does idOnDemand keep up with and contain identity fraud?
- What identification solutions does idOnDemand offer?
- Who is the end-user of idOnDemand’s products and what benefits do they receive?
- Could smart cards become obsolete in the near future?
- What is the next big thing we can expect from idOnDemand?
Follow idOD on Twitter: http://twitter.com/idondemand
http://www.idondemand.com
http://www.identive-group.com
A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
The document discusses the concept of a digital footprint and how personal data is collected from various online activities and used by companies. It notes that an individual's digital footprint contains information about them that they share themselves as well as data about them from other sources, and this footprint can be analyzed to learn about the person. Control over personal data and digital footprints is important, as this information has value and privacy settings need to be managed to prevent unwanted access or use of people's data.
Entrust IdentityGuard Mobile is a family of identity applications that leverage existing mobile devices for greater security, including transaction verification, one-time-passcode (OTP) authentication and embedded mobile application security.
And Entrust IdentityGuard Mobile is available on today's leading smartphone platforms, including the Apple iPhone, Google Android, RIM BlackBerry, Microsoft Windows Mobile and Symbian.
The document discusses the Higgins Identity Framework, an open source project that aims to (1) model and (2) create technologies for personal identity on the Internet. It does this by implementing existing standards like OpenID and SAML rather than inventing new ones. The framework provides a consistent user experience for managing identity data across different systems using "information cards" and a centralized identity attribute service that integrates data from various sources. It allows users more control over their personal information and convenience in interactions that require identity verification.
Hoyos introduces his new identity assertion platform called HoyosID as a solution to what he sees as insanity in the current identity industry. HoyosID uses biometrics on smartphones to allow convenient login without passwords or tokens. Hoyos believes convenience is key for users and that solutions requiring extra hardware tokens will fail. HoyosID stores no biometrics and uses various techniques like liveness detection to prevent spoofing or replay attacks. It also includes an open API to integrate third party biometrics solutions. Hoyos plans to release HoyosID apps in early 2014 supporting major smartphone models.
SMS PASSCODE represents a new generation innovative solution that enables organizations and companies to easily protect employee remote access to corporate systems (Citrix, Microsoft icl. OWA, Virtual Desktops VPN, SSL VPN etc.) with two-factor authentication via SMS, voice call or secure e-mail. In short, the solution first validates the user name and password before creating and sending a one-time-password only, valid for that login attempt. Because it can only be generated this way and only works for that login on that computer, it is award-winning security against these modern threats. Easy and very secure.
The World Internet Security Company provides secure communication solutions including WISePhone+, a multi-platform secure VoIP solution available on iPhone, iPad, Android, PC and Blackberry. WISePhone+ allows for encrypted voice calls between supported devices and includes features like background support, call transfer, conferencing and call history. When used with WISePhoneGo, an optional managed service, it offers additional enterprise features such as intergroup calling, presence status and group messaging.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
This document provides an overview of Higgins, an open source identity framework being developed at the Eclipse Foundation. It summarizes the key components of Higgins 1.0 which was released in February 2008 including Identity Selectors, Identity Providers, Relying Party websites, and Identity Services. It then outlines the planned developments for Higgins 1.1 scheduled for June 2009, which includes a new AIR-based Identity Selector, enhancements to the Identity Attribute Service including access control and new context providers, support for relationship and additional card types, and integrating the selector as an OpenID service. The document concludes by discussing potential future directions for Higgins beyond version 1.1 such as mobile and ID-WSF support.
The Belgian Federal Government has implemented an electronic identity (eID) project to provide Belgian citizens with an electronic identity card. This eID card allows citizens to authenticate themselves digitally and apply digital signatures. The eID project timeline began in 1999 and saw full national rollout by 2009. Over 8.6 million eID cards have been issued. The eID functions as an e-government building block and has expanded to include Kids-ID and Foreigner-ID cards. Identity and access management (IAM) is also discussed as relevant to eGovernment for ensuring security, transparency, autonomy, and governance. Fedict provides an IAM offering and the presentation discusses IAM evolution and EU cross-border interoperability pilots.
The document discusses emerging mobile payment technologies and options. It describes technologies like Near Field Communication (NFC) and various mobile payment apps like Google Wallet, Apple Passbook, Square, and proprietary retailer apps. It encourages businesses to explore these new payment avenues and consumers to try out the different mobile payment methods.
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
The document discusses strong authentication solutions from Gemalto for enterprises. It describes Gemalto's secure personal devices that are used by billions of individuals worldwide, including SIM cards, credit cards, and e-passports. It then discusses the evolution of the authentication market towards mobility and cloud computing. The document promotes Gemalto's Protiva strong authentication service, which provides a flexible authentication solution that can be deployed both on-premise or as a hosted cloud service. It describes features such as user on-boarding, device fulfillment, and easy billing models.
The document discusses digital identity and biometrics. It notes that while digital communication is now common, digital identity can be vulnerable to fraud like password theft or breaking encryption keys. Biometrics provide a more secure method of verifying identity by using unique human traits. The document then describes dynamic signature verification, which analyzes characteristics of physical signatures to authenticate identity. It presents AutDSig as a solution that combines biometrics with digital certificates to uniquely verify identity when signing documents.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
AXSionics Internet Passport: a smartcard which holds your biometry and enables you to authenticate yourself and to validate a transaction on Internet. No risk of identity theft, all your information is kept on your card.
The document discusses an in-stock import program that allows orders to ship within two weeks with a minimum order quantity of 200. It also discusses RFID technology in credit cards and the security risks it poses, as criminals can now easily scan cards to steal personal data without physically taking the card. A RFID blocking wallet is presented as a solution to help protect against criminal scanning. Pricing details are provided for orders of the RFID blocking wallet in various quantities.
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
Gemalto introduced smart card and biometric authentication solutions. It discussed using fingerprints for biometric authentication on computers due to user acceptance and technology maturity. Combining biometrics with smart cards provides multifactor authentication with a portable device linked to the user, improving security and convenience. Existing implementations include matching biometrics on or off the smart card. Limitations include operating system support, but workarounds exist and the ultimate solution is a smart card using PKI with both a PIN and biometrics for authentication.
This document discusses using web 2.0 and social networking to improve healthcare, specifically for aging populations. It provides examples of how connecting patients online can reduce healthcare costs and improve outcomes. Intel is studying a VA home healthcare program to see how health IT tools could help the program scale to more veterans by improving care coordination and quality. The document advocates that ultrabook-based services can minimize web 2.0 risks for end users and maximize its benefits for healthcare.
The document provides information about a company that was founded in 1999 in Geneva, Switzerland that specializes in IT security technologies like digital identity protection and data security. The company has two high-security data centers in Switzerland and their mission is to help secure online transactions and protect data from unauthorized access. They offer scalable security solutions for businesses and consumers. Their focus is on providing top security for authentication, identity recognition, and digital certificates.
This document discusses DIGIPASS, a solution from VASCO Data Security that allows users to securely sign documents electronically. DIGIPASS combines strong authentication, digital signatures, and document signing on a single platform. It ensures user identity and document integrity through electronic signatures. Users can sign documents using an electronic pen or identity card. DIGIPASS' features include support for multiple certificate authorities, digital signing of common file formats, and visualization of electronic signatures on documents.
Squaring Zooko's Triangle - Blockchain Authentication for Smart DustsDaoliCloud Ltd
Zooko's Triangle -- a trilemma of three properties that are generally considered desirable for names of participants in a network protocol -- is cleanly refuted by ID based cryptography.
This document discusses behavioral biometrics and how it can be used to balance security and usability. It describes how behavioral biometrics works by analyzing a user's interactions such as touch pressure and angle when using a device. This data is then used to continuously authenticate users. The document outlines two main solutions - one for desktop that monitors mouse and keyboard input, and one for web and mobile that adds small code to analyze interactions without requiring a client install. Potential applications discussed include use in enterprises, for social media platforms to prevent account hijacking, and for mobile devices to add biometric locks without extra hardware. Demos of behavioral biometric solutions for web and mobile are also referenced.
TDWI Inda BI on Cloud Future State Visiontdwiindia
The document discusses 4 technology trends through 2018: 1) Always-on connectivity will make the internet integral to daily life via billions of connected devices; 2) Intelligent information via semantic web searches will provide personalized solutions; 3) Richer interactions using voice, gestures, touch, holograms and robotics will engage customers in more meaningful ways; 4) Simple, intuitive devices and seamless shifting between screens will be the main way consumers interact with information and complete tasks.
New electronic platforms using tiny devices and sensors will provide more child-friendly ways for helplines to reach children, potentially including automatic alarms and virtual support environments. Helplines should utilize these emerging technologies to provide widespread coverage while reducing pressure on frontline staff. Advances in areas like augmented reality, wearable devices, and virtual environments may allow helplines to better support children's social and emotional needs.
This document discusses managing the Personal Identity Verification (PIV) life-cycle and converging physical and logical access control systems. It explores the challenges of the PIV life-cycle from issuance through retirement. Key challenges include managing identity information across different systems, establishing administrative controls and workflows, and provisioning/de-provisioning with disparate solutions. The document also examines challenges of enabling PIV credentials to authenticate physical and logical access systems and managing authentication processes. Finally, it presents a logical PIV architecture solution to integrate identity enrollment, life-cycle management services, and physical/logical access control.
Your trusted identity authentication and verification partner for financial institutions, enterprises, and governments in protecting users’ identities with a mobile-first frictionless experience
This presentation by Terence Craig and Mary Ludloff of PatternBuilders was delivered at the pii2011 Venture Forum in Menlo Park, CA on November 15, 2011. For more information on the conference, visit http://pii2011.com.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
This document provides an overview of Higgins, an open source identity framework being developed at the Eclipse Foundation. It summarizes the key components of Higgins 1.0 which was released in February 2008 including Identity Selectors, Identity Providers, Relying Party websites, and Identity Services. It then outlines the planned developments for Higgins 1.1 scheduled for June 2009, which includes a new AIR-based Identity Selector, enhancements to the Identity Attribute Service including access control and new context providers, support for relationship and additional card types, and integrating the selector as an OpenID service. The document concludes by discussing potential future directions for Higgins beyond version 1.1 such as mobile and ID-WSF support.
The Belgian Federal Government has implemented an electronic identity (eID) project to provide Belgian citizens with an electronic identity card. This eID card allows citizens to authenticate themselves digitally and apply digital signatures. The eID project timeline began in 1999 and saw full national rollout by 2009. Over 8.6 million eID cards have been issued. The eID functions as an e-government building block and has expanded to include Kids-ID and Foreigner-ID cards. Identity and access management (IAM) is also discussed as relevant to eGovernment for ensuring security, transparency, autonomy, and governance. Fedict provides an IAM offering and the presentation discusses IAM evolution and EU cross-border interoperability pilots.
The document discusses emerging mobile payment technologies and options. It describes technologies like Near Field Communication (NFC) and various mobile payment apps like Google Wallet, Apple Passbook, Square, and proprietary retailer apps. It encourages businesses to explore these new payment avenues and consumers to try out the different mobile payment methods.
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
The document discusses strong authentication solutions from Gemalto for enterprises. It describes Gemalto's secure personal devices that are used by billions of individuals worldwide, including SIM cards, credit cards, and e-passports. It then discusses the evolution of the authentication market towards mobility and cloud computing. The document promotes Gemalto's Protiva strong authentication service, which provides a flexible authentication solution that can be deployed both on-premise or as a hosted cloud service. It describes features such as user on-boarding, device fulfillment, and easy billing models.
The document discusses digital identity and biometrics. It notes that while digital communication is now common, digital identity can be vulnerable to fraud like password theft or breaking encryption keys. Biometrics provide a more secure method of verifying identity by using unique human traits. The document then describes dynamic signature verification, which analyzes characteristics of physical signatures to authenticate identity. It presents AutDSig as a solution that combines biometrics with digital certificates to uniquely verify identity when signing documents.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
AXSionics Internet Passport: a smartcard which holds your biometry and enables you to authenticate yourself and to validate a transaction on Internet. No risk of identity theft, all your information is kept on your card.
The document discusses an in-stock import program that allows orders to ship within two weeks with a minimum order quantity of 200. It also discusses RFID technology in credit cards and the security risks it poses, as criminals can now easily scan cards to steal personal data without physically taking the card. A RFID blocking wallet is presented as a solution to help protect against criminal scanning. Pricing details are provided for orders of the RFID blocking wallet in various quantities.
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
Gemalto introduced smart card and biometric authentication solutions. It discussed using fingerprints for biometric authentication on computers due to user acceptance and technology maturity. Combining biometrics with smart cards provides multifactor authentication with a portable device linked to the user, improving security and convenience. Existing implementations include matching biometrics on or off the smart card. Limitations include operating system support, but workarounds exist and the ultimate solution is a smart card using PKI with both a PIN and biometrics for authentication.
This document discusses using web 2.0 and social networking to improve healthcare, specifically for aging populations. It provides examples of how connecting patients online can reduce healthcare costs and improve outcomes. Intel is studying a VA home healthcare program to see how health IT tools could help the program scale to more veterans by improving care coordination and quality. The document advocates that ultrabook-based services can minimize web 2.0 risks for end users and maximize its benefits for healthcare.
The document provides information about a company that was founded in 1999 in Geneva, Switzerland that specializes in IT security technologies like digital identity protection and data security. The company has two high-security data centers in Switzerland and their mission is to help secure online transactions and protect data from unauthorized access. They offer scalable security solutions for businesses and consumers. Their focus is on providing top security for authentication, identity recognition, and digital certificates.
This document discusses DIGIPASS, a solution from VASCO Data Security that allows users to securely sign documents electronically. DIGIPASS combines strong authentication, digital signatures, and document signing on a single platform. It ensures user identity and document integrity through electronic signatures. Users can sign documents using an electronic pen or identity card. DIGIPASS' features include support for multiple certificate authorities, digital signing of common file formats, and visualization of electronic signatures on documents.
Squaring Zooko's Triangle - Blockchain Authentication for Smart DustsDaoliCloud Ltd
Zooko's Triangle -- a trilemma of three properties that are generally considered desirable for names of participants in a network protocol -- is cleanly refuted by ID based cryptography.
This document discusses behavioral biometrics and how it can be used to balance security and usability. It describes how behavioral biometrics works by analyzing a user's interactions such as touch pressure and angle when using a device. This data is then used to continuously authenticate users. The document outlines two main solutions - one for desktop that monitors mouse and keyboard input, and one for web and mobile that adds small code to analyze interactions without requiring a client install. Potential applications discussed include use in enterprises, for social media platforms to prevent account hijacking, and for mobile devices to add biometric locks without extra hardware. Demos of behavioral biometric solutions for web and mobile are also referenced.
TDWI Inda BI on Cloud Future State Visiontdwiindia
The document discusses 4 technology trends through 2018: 1) Always-on connectivity will make the internet integral to daily life via billions of connected devices; 2) Intelligent information via semantic web searches will provide personalized solutions; 3) Richer interactions using voice, gestures, touch, holograms and robotics will engage customers in more meaningful ways; 4) Simple, intuitive devices and seamless shifting between screens will be the main way consumers interact with information and complete tasks.
New electronic platforms using tiny devices and sensors will provide more child-friendly ways for helplines to reach children, potentially including automatic alarms and virtual support environments. Helplines should utilize these emerging technologies to provide widespread coverage while reducing pressure on frontline staff. Advances in areas like augmented reality, wearable devices, and virtual environments may allow helplines to better support children's social and emotional needs.
This document discusses managing the Personal Identity Verification (PIV) life-cycle and converging physical and logical access control systems. It explores the challenges of the PIV life-cycle from issuance through retirement. Key challenges include managing identity information across different systems, establishing administrative controls and workflows, and provisioning/de-provisioning with disparate solutions. The document also examines challenges of enabling PIV credentials to authenticate physical and logical access systems and managing authentication processes. Finally, it presents a logical PIV architecture solution to integrate identity enrollment, life-cycle management services, and physical/logical access control.
Your trusted identity authentication and verification partner for financial institutions, enterprises, and governments in protecting users’ identities with a mobile-first frictionless experience
This presentation by Terence Craig and Mary Ludloff of PatternBuilders was delivered at the pii2011 Venture Forum in Menlo Park, CA on November 15, 2011. For more information on the conference, visit http://pii2011.com.
This presentation was given by Disconnect co-founders Casey Oppenheim and Brian Kennish at the pii2011 Venture Forum in Menlo Park, CA on November 15, 2011. For more information on the conference, visit http://pii2011.com.
The document discusses how individuals can take control of their personal data through tools that collect diverse personal data from various sources, enrich it using a simple smart platform, and allow developers to build apps that respect data ownership. It promotes the Locker Project, an open source community effort that aims to give individuals ownership and control over their powerful personal data exhaust now and in the future through tools that collect, enrich, and enable apps built on personal data stores.
Digital Identity Wallets: What They Mean For BanksEvernym
This document discusses digital identity wallets and their potential benefits for banks. Digital identity wallets allow individuals to store credentials that can be securely and privately shared with organizations to verify attributes like identity, age, membership status. They minimize data collection and use privacy techniques. Banks could use them to streamline know-your-customer processes, replace passwords with secure authentication, and improve customer experiences through personalized services and messaging. The technology relies on cryptographic proofs and keeping data decentralized and off-chain for privacy and security according to global standards like GDPR.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
This document discusses how Natural ID can be used for security, usability, and commerce. It outlines several use cases such as payment, travel, access control, and digital goods. It also discusses how Natural ID can help reduce cart abandonment and fraudulent transactions when integrated with mobile commerce. Finally, it positions Natural ID and fingerprint authentication as playing a key role in reinventing strong user authentication across devices and platforms through standards like FIDO.
There is no debate that companies large or small are more or less have put a lot of efforts in protect digital security and privacy with “best practice” recommendations, often use solutions from branded security vendors or built by best in-house/outsourced experts, yet they are falling prey of cyber and insider attacks, because “compliance” or “best practice” do not equal to security. The reality has shown us that traditional security approaches have fall behind the increased system complexity and advanced technical capabilities that have been mastered by adversaries.
The key weakness in our security defenses lies with the weakness of digital identities systems have been used to authenticate users (no system could defends against attacker impersonates legitimate user); follow by inability to validate the authenticity and integrity of communication (If attacker can temper with the data freely, then no need to crack the one time password) and finally incapable of protecting information from unauthorized accesses in an event of inevitable security breach because unknown system or application security vulnerabilities.
FrontOne’s information security solution addresses all security weakness listed above:
First, FrontOne uses its own digital identity that is harden to withstand advanced hackers using sophisticated real time attacks and help all its users from falling prey of identity thieves from phishing and malware attacks at client side to advanced persistent threats at the server side, because FrontOne’s digital identity is dynamic and non-transferable.
Second, FrontOne provides 100% message integrity by using dedicated and destination aware messaging system and ensure each and every message is completely unique; reducing the chance of attackers from being able to identifying and manipulating it for their benefit.
Finally, FrontOne uses its own method of protecting information at rest, in transit or in use, by focusing our innovation at the security and integrity of encryption key while using industry standardized cryptography. FrontOne’s user centric data protection solution uses dual control for its encryption keys. Random encryption key is protected with security key that has two parts, one part from the client side and other from the centralized key server. This arrangement ensures that access to protected data is available with the presence of the user device of the authorized user.
The security approaches FrontOne have taken above are further strengthened with its own patented technologies that introduce a dynamic element is each and every message and transaction, mutually authenticate both parties before a request is served and providing user with ultimate control that is not accessible digitally.
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
To understand the methodologies of the authentication world, CIO LOOK Featured a journey to find The 10 Most Trusted Authentication Solution Providers 2021.
Presented during the Open Source Conference 2012, organized by Accenture and Redhat on December 14th 2012. This presentation discusses Identity Analytics.
By Cyrille Bataller, Managing Director, Accenture Technology Labs
The document discusses identity and authentication on the internet. It notes that there is currently no good standard for entities to assert their identity online, which allows for identity exploitation and fraud. It proposes a model using an immutable binding between a core identity and core identifier to establish trust. This would allow for multiple secure personas to interact online without risk of attribute aggregation, following the model of how humans use different identities in different contexts.
OpenID is a decentralized single sign-on system that allows users to log into multiple websites using their existing identities, such as a URL like "username.openid.com". It provides benefits like reducing the need to create and remember multiple usernames and passwords. However, OpenID also faces challenges like potential identity theft if the authentication provider is hacked, and that its technical workings can be difficult to explain to average users. Overall, OpenID shows promise as a solution to many of the frustrations of the current web authentication system, but also needs continued development to address security and usability issues.
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
apidays LIVE Paris 2021 - APIs and the Future of Software
December 7, 8 & 9, 2021
Identification & Authentication for Individuals with API at eIDAS Substantial Security Level
Nicolas Bigand, CTO & COO at L'identité Numérique La Poste at Groupe La Poste
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
TrustBearer's Brian Kelly gave this presentation during the Identity Management track at the Virginia Security Summit in Richmond, VA. It compares SAML to OpenID and explains how different authentication methods can be used with either of these Single Sign On standards.
Adam Lewis discusses identity, credential, and access management (ICAM) standards. He compares physical badges to digital credentials, noting that digital credentials can be [1] secure by resisting compromise without a central repository, [2] usable through frictionless biometrics authentication without passwords, and [3] interoperable by using a single credential across multiple services. Lewis recommends standards like Fast ID Online (FIDO), OAuth 2.0, and OpenID Connect to enable secure, usable, and interoperable digital credentials for applications like public safety.
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
This document discusses decentralized identifiers (DIDs) and verifiable credentials. It begins by explaining problems with current online identifiers, such as being controlled by centralized entities and not belonging to individuals. It then introduces DIDs as a new type of globally unique identifier that is owned by individuals, stored on a decentralized ledger, and cryptographically verified. DIDs resolve to DID documents containing public keys and authentication mechanisms. The document discusses the W3C efforts to standardize DIDs and verifiable credentials that can be issued and verified using DIDs. It provides examples of DID syntax and components of DID documents.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Go Trust provides an authentication platform that uses a smart card badge with Bluetooth and NFC connectivity to enable passwordless login and two-factor authentication for corporate and cloud applications on computers and smartphones. The badge can also be used for wireless user authentication and physical access control. It works anywhere without network issues and provides reliable, secure credential protection for up to 60 days on a single charge.
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
This document discusses multi-factor authentication strategies for enterprise applications using PKI, smart cards, and biometrics. It provides an agenda that covers the identity dilemma, identity assurance vs security, multi-factor authentication strategies using OTPs, smart cards, PKI and biometrics, understanding real-world implementations including tools, standards, and the role of JAAS. It also discusses the role of Sun OpenSSO for single sign-on and multi-factor authentication, deployment architectures, and provides a demonstration of multi-factor SSO using PKI, smart cards and biometrics.
Jan Keil - Identity and access management Facts. Challenges. SolutionTimetogrowup
This document discusses identity and access management. It begins by introducing the author and providing background on blockchain technology. It then discusses challenges with existing identity management systems like centralized servers and human errors. Blockchain is presented as a solution to issues like weak credentialing and data manipulation. The document outlines how blockchain could provide online passports for identification and give users control over their identity data. It also discusses using biometrics and knowing customer processes for identity verification. The role of access management in regulating user access is explained. Case studies on OAuth and Remme.io and how they utilize blockchain and tokens for decentralized identity and access management are presented.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
The document discusses electronic ID cards, providing the example of Georgia's system. It explains that eID cards can be used for identification, travel documents, and proximity payments. The Georgian eID card uses a single chip with both contact and contactless interfaces. It stores digital certificates that enable online identification and digital signatures. Over 100,000 readers have been installed across Georgia for citizens to use their eID cards for various government and commercial services anytime, reducing costs and improving citizen satisfaction.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Startup Spotlight: OneID
1. Meet your
new online identity
Steve Kirsch
CEO
OneID, Inc.
2216 O'Toole Avenue
San Jose, CA 95131
(408) 571-6317
stk@oneid.com
2. About me
Steve Kirsch, CEO
5 startups over 30 years
$2B+ market cap
Visionary products
352
3 kids
1 wife
1 car
cat
usernames
and passwords
2
3. OneID is digital identity done
right
Websites
Enterprise Apps
Steve Desktop, Mobile Apps
Offline (QR or NFC ID)
Convince your Your devices digitally assert your
device URU ID to everyone else
(with your express approval)
3
4. + OneID = Frictionless
e-commerce
Invalid format
Phone/fax numbers Steve Kirsch
Say “goodbye” to…
CEO
must be in the formatOneID, Inc.
stk@oneid.com
(xxx) xxx-xxxx.
4
6. “How do I
know it is
safe to
login to my
bank or
PayPal?”
6
7. Her Fears Are Justified
Ramnit Worm Variant
August 25, 2011
“…morphed into a serious
threat…capable of draining
bank accounts…”
Banks are not well-prepared.
Ramifications are enormous.
We have the world’s best Link to Article
solution to this problem.
7
8. Digital identity
“It is, I believe, the #1
most important problem
to be solved as we move
more and more into an
online world.”
Steve Gibson
Creator of the first anti-
spyware program
8
9. There is only one way to
solve this problem
Think different
9
10. User authentication: Today
Enterprise Apps
External Websites
Steve Desktop, Mobile Apps
Offline (QR or NFC ID)
I have >300 different usernames and passwords!
This is unsustainable
10
11. Our Solution – Identity 2.0
OneID defines a new digital ecosystem for solving nearly all of
these problems... Nothing else comes close.
Single Identity,
Designed
User Owned Multiple
From Scratch
Personas
User adjusts
Works On All Public key
security v.
Devices crypto
convenience
OneID is a single identity that spans consumer and enterprise.
See slide notes for more info
11
12. OneID is digital identity done
right
Websites
Enterprise Apps
Steve Desktop, Mobile Apps
Offline (QR or NFC ID)
Convince your Your devices digitally assert your
device URU ID to everyone else
(with your express approval)
12
13. What is OneID?
Next generation digital identity
A digital identity ecosystem/federation
OneID is how you would solve the digital identity
problem if you wanted to solve it “right”
It’s “sort of like” facebook Connect, but:
Easier to use
Extremely secure
Nearly unbreakable w/o sacrificing convenience!
Much more comprehensive in scope
User-centric with PK: secure, private, …
13
14. What can OneID be used for?
Authentication
Eliminates need for username/password, SecurID
Extremely high LoA available
Information sharing
Enter information only once, including credit card information
Authorization
Digitally sign a tokenized credit card to make a purchase: “Pay
Amazon $12.23 USD using my Wells Fargo Personal VISA – signed
Steve”
Digital claims
AAA member, Hertz #1 club member, Passport, Driver’s license,
Cisco employee to get proper discount or to get access
Tickets, digital rights (music, software), physical good receipts 14
15. Why is OneID important?
We have the world’s best answer to solving
the digital identity problem
Most user-friendly and most secure ….both at the same time!
We make it IMPOSSIBLE to phish or keylog your password to get
access to your account. Users can misbehave and they are still
safe
“Have it your way”…Users LOVE it.
Most advanced technology; most customer traction; most
powerful; most flexible
With OneID a user can stay logged in to websites with near zero
financial risk
Only one password to remember and it is RARELY used
15
16. OneID …
…is the most significant development in
authorization since the invention of the
username and password
… will nearly completely replace the use of
usernames and passwords within 5 years
16
18. Two-Factor Auth: More secure
& convenient than SecurID
“Blank check”
vs
Outgoing Wire Transfer
Insecure
Recipient: Sasha Orloff
• In-band (vulnerable to MITM)
Amount: $5,000 USD
• Vulnerable shared secret
Bank: CitiBank
• Can’t see what you are approving
Inconvenient
• Another device to carry
• Hard to use
• Wastes time
• Everyone hates them
OneID mobile phone app • Terrible GUI/UX 18
19. World’s most secure identity
2 or 3 independent digital signatures required
Say goodbye to identity theft
Browser Cloud Mobile App
Optional
Active device Identity repository OOB device 19
20. OneID Login Signature Flow
After verification,
✓ Signature C
✓ user is logged in
✓ Website
1
Verifies
6
Signatures
5
2
3
✓ Signature A 4 ✓ Signature B
✓
20
21. Unbreakable security
$1M if you can break into my OneID account
I’ll even tell you
my username and password
to make it easier
21
23. Key benefits
For consumers For Service Providers
Convenient Higher customer
Easy to use satisfaction
Secure Higher security
Reduce dropoff
Reduce fraud
Easy integration
23
24. Why user centric?
It is the ONLY way to eliminate
the risk of a centralized breach
Guarantees security and privacy
Only you can decrypt your data (on your devices)
Only you can assert your identity
With OneID, centralized breaches (like SONY) are not
possible; there is nothing to steal. Even if an RP’s
password file is published, there is zero risk.
Google, Facebook, etc. are NOT user centric
24
25. Partner interest in every
segment
Financial services Consumer
Enterprise
Government
Education
26. Sales cycle
T=0 “who are you and why are you here?”
T=30 minutes “OK, I’d like to deploy this in a
project we are doing.”
26
27. Is it easy to implement?
Can be done in < 5 minutes!
AutoFill = Add 2 lines of HTML (no server side
changes required).
Login = about 4 lines of code.
Signed tokenized purchases = about 4 lines of
code.
27
28. Team: 12 people
CEO: Steve Kirsch
Founder, former CEO of 5 successful startups with combined
market cap >$2B
VP Marketing: Rose Hartwig
Former VP Marketing Palm
Turned down CMO job at B&N
Identity systems architect: Jim Fenton
Cisco’s top identity expert.
Crypto expert: Adam Back
“THE best guy for this job” – Stefan Brands
“He’s brilliant” –Jon Callas
Director Product Marketing: Brian Kelly
Co-founded TrustBearer Labs, acquired by VeriSign in 2010
User Authentication Product Manager at Symantec/VeriSign
CIO: Mr. X
? Managed staff of 2,800 people and IT budget of $2.7B
“Federal CIO of the Year” –Federal Computer Week
28