IACA 2017 General Session

Similar documents
European Commerce Registers Forum IdenEty Assurance

AND ACCESS MANAGEMENT

UBISECURE CUSTOMER SURVEY ORGANISATIONAL VIEWS ON: STRONG CUSTOMER AUTHENTICATION, CUSTOMER EXPERIENCE & GDPR

Identity Relationship and Access Management for the Extended Enterprise

A UNIFIED APPROACH TO DELIVERING EXCEPTIONAL CUSTOMER EXPERIENCES

BUYER S GUIDE: CUSTOMER IDENTITY & ACCESS MANAGEMENT (CIAM)

LEADERSHIP COMPASS. CIAM Platforms. KuppingerCole Report

E-BOOK SECURITY BY DESIGN HOW IDENTITY HELPS YOU BALANCE SECURITY AND CUSTOMER EXPERIENCE

GENERAL DATA PROTECTION REGULATION & CUSTOMER IDENTITY AND ACCESS MANAGEMENT. UBISECURE WHITE PAPER November 2017

Ping Identity solutions for Customer Identity and Access Management

TOP 20 QUESTIONS TO ASK BEFORE SELECTING AN ENTERPRISE IAM VENDOR

CUSTOMER ENGAGEMENT STARTS WITH SINGLE SIGN-ON

Equip your field teams and customers with the ability to do business from anywhere.

WHITEPAPER. Mobile SSO & the Rise of Mobile Authentication

Trusted KYC Data Sharing Standards Scope and Governance Oversight

GIGYA: Connect, Collect, Convert

LEADERSHIP COMPASS. CIAM Platforms. KuppingerCole Report

S Group: Retail Chain

Blockchain Unleashed TM Forum 1

is an award-winning online events platform provides a better way to create stimulating, measurable, and secure online event experiences.

2016 Silanis Technology Inc. All rights reserved.

TISA Digital ID Pilot High Level Approach September

KuppingerCole Consumer Identity World Katryna Dow, CEO & Founder, Meeco Seattle September 2017

Digital experiences in government: the need for speed.

Recipes for Success in Creating Customer Identity. An API Approach To Building the Identity, and Identity Data, Ecosystem

Securely Manage the Complete Identity Lifecycle of People, Services, and Things

Remote e-identification and e-signatures Trusting someone you have never seen

ForgeRock Identity Management

THE RISE OF DIGITAL IDENTITIES: Plugging the digital gap in financial services onboarding

Transform Wealth Management Client Interactions with Digital Onboarding and E-Signatures

PkBox as simple and secure cloud electronic signature creation and validation solution

Blockchain for Business

Product Feature.

SECURE SSO TO OFFICE 365 & OTHER CLOUD APPLICATIONS WITH A CLOUD-BASED AUTHENTICATION SOLUTION

Your Guide to the Identity of Things

2-Step Process to Boost Business Productivity using Real-time Data Virtualization MDM

FINACLE SERVICES: API MANAGEMENT USING CA API GATEWAY

INTEGRATING PING IDENTITY SOLUTIONS WITH GOOGLE IDENTITY SERVICES

Securing the Mobile, Cloud-connected Enterprise

emudhra - PKI Based Applications

E-Forms and Digital Signature. September 13, 2012

Utilizing Oracle Standard Functionality and other Oracle tools to comply with Sarbanes- Oxley By Olga Johnson City of Detroit

DELIVER A TRULY DIGITAL WALLET EXPERIENCE. Powering customer engagement and business growth. Finacle Digital Wallet Solution

On-Demand Solution Planning Guide

Effective Data Governance & GDPR Compliance for the Nonprofit CFP

Wireless Connectivity That Offers Insights Into Customer Behaviours.

<Insert Picture Here> Externalizing Identity

Security and Compliance: Taking a Business Perspective. Yolanda Ma, Senior Product Marketing Manager, RSA Professional Strategies S24

Secure Online Collaboration & Teamwork. Store & Share Documents Secure and Convenient. idgard.de/en. Project work spaces & audit proof data rooms

Security overview. 2. Physical security

Customized Client Onboarding for Clearing Firms with OpenAdvantage From Doxim

Case Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform

Digital Passport. Transforming SME banking through customer-permissioned data exchange

2018 ERP/EPM Customer Success Day Cloud Portal and My Services

Better Together: SAP Customer Data Cloud from Gigya and SAP Marketing Cloud

Discover why Veco is the best property software for your company BY EUROLINK TO LET SOLD! FOR SALE LET!

ADOBE EXPERIENCE MANAGER MOBILE. for Media and Entertainment

Modernizing Cyber Defense: Embracing CDM. Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA

STREAMLINING USER PROVISIONING WITHIN JIVE USING ACTIVE DIRECTORY

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions

Mobile ID (Asan Imza) secure key to the Digital Trade Hub in Azerbaijan and cross-border e-services

1 st IMOLA Seminar. Madrid, 4 th April Gerard Leenders.

Capgemini s Open Banking Marketplace

From necessity to opportunity: How Mobile Network Operators stand to benefit from trusted digital IDs

Enabling Cross-University Collaboration with Harvard IAM: TIER, InCommon, and Grouper. IT Summit 2015 June 4, 2015 Thursday 1:10-2:00 p.m.

Global Identity Resolution & Verification

Developing customer-centric online services in Finnish administration

The ecommerce Guide to GDPR. How to Ensure Compliance and a Competitive Edge

How to build and execute a marketing plan

EXECUTIVE VIEW. NetIQ SecureLogin. KuppingerCole Report. by Martin Kuppinger April by Martin Kuppinger

SafeNet Authentication Portfolio, Trends & Future. Eric Avigdor Director, Product Management

Workspace ONE. Insert Presenter Name. Empowering a Digital Workspace. Insert Presenter Title

LEADERSHIP COMPASS by John Tolbert December CIAM Platforms. KuppingerCole Report

MANAGE THE LIFECYCLE OF EVERY DIGITAL USER

Identity and Access Management

Employee Lifecycle Management in an R12 World

Nexus Smart IDs for your workforce. issue, manage and use trusted employee identities

2018 MOBILE CARRIERS SHOW March 27 29, 2018 Caesar s Palace; Las Vegas

HOW TO CONFIGURE SINGLE SIGN-ON (SSO) FOR SAP CLOUD FOR CUSTOMER USING SAP CLOUD IDENTITY SERVICE

Identity and Access Managementas-a-Service: Protecting Digital Relationships

The Next Generation of National Electronic Identity and Signing in Denmark. April 2016

ADOBE EXPERIENCE MANAGER MOBILE. for Retail

INFINITY ECM PLATFORM. Unique multifunctional Cloud SW platform that every World Company needs.

Identity Provider Policy. Identity and Authentication Services (IA Services)

Certified Regional Partner Program Overview

PART II: Generate Awareness: Marketing and Lead Generation SafeNet Authentication Service: Benefits for Your Customers

Identity in the Cloud IAM for the new Digital Age. Corné van Rooij - VP Product Management May 16 th 2017 SIGS Technology Conference 2017

SafeNet Authentication Service:

Securely Yours LLC. Identity and Access Management (IAM) IAM in a Cloud Auditing Guidelines IIA Detroit Chapter September 8, 2009

Making Business Intelligence Easy

Managing explosion of data. Cloudera, Inc. All rights reserved.

GETTING CUSTOMER IAM RIGHT

GDPR and Active Directory Integration in Microsoft Dynamics 365 and AX GDPR and IAM Automation. Elevate HR, Inc. Published: September 2018

Modern Finance Transformation: An Integrated Approach to Travel & Expense Management

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions

Attendee Announcements

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and Getting Started with Multi-factor Authentication Solutions

eidas Regulation (EU) 910/2014 "Boosting trust in the digital market"

CASE STUDY Delivering Real Time Financial Transaction Monitoring

Transcription:

IACA 2017 General Session Clear Sailing: Identity Assurance in Electronic Transactions Tuesday May 23rd 2017

An Introduction to Steve Roylance Regular Attendee & Speaker at IACA, CRF & ECRF conferences, as well as technical seminars (Winhec, Infosec, RSA etc.) Senior VP Identity Services. Responsible for our (Legal Entity Identifier) project RapidLEI 15+ years of experience in Identity Assurance & Authentication within business eco systems Founder of the CABForum (Ultimately Responsible for bringing Higher levels of Identity Assurance to browsers Extended Validation) As the subject is Identity Assurance Actual Identity: Stephen Roylance

An Introduction to Ubisecure Part 1 timeline 2008: Liberty Alliance certification 2015: GlobalSign Oy joins GSMA 2002: Ubisecure Solutions Oy is established 2006: Tietoyhteiskunta Award, KATSO project 2009: Ubisecure joins Kantara Initiative 2014: Ubisecure joins GlobalSign 2016: Ubisecure becomes independent again 2003: First Customer, Tax Administration 2007: First Customer IAM delivery, Tekes 2011: Our customer wins the European Identity Award 2015: Our customer wins the European Identity Award

An Introduction to Ubisecure Part 2 IAM Products Role Based Access SSO Federation Customer Identity Access Management (CIAM) Solving GDPR & Consent Management (100K+) On Premise or ISO27001 Cloud options MFA Delegated Admin Self Service IDENTITY PLATFORM Social > Verified Identities Step Up Authentication Consent & Attribute Management Mobile Connect Identity Gateway Accelerator MNOs Consumer Identities & Single Sign On Revenue from Registration Attribute Enrichment Identity as a service (IDaaS) Allowing Identity Providers to monetize their DBs Facilitating delivery of KYC services CRM Enrichment

Identity Assurance within Electronic Transactions? Understand the Business Requirements of your Customers and their Relying Parties. Understanding the possible ways forward to drive business value from Regulatory Requirements (KYC, AML), avoiding sandbanks and approaching storms! GDPR in 2018 Understanding Key Terminology. IAM TLAs (Identity & Access Management Three Letter Acronyms) As an IdP, Capture additional revenue $$$ opportunities by monetizing your database! Talk to Ubisecure to ascertain and confirm business and compliance needs to deliver effective solutions suited to your country, or state, eco system.

What is IAM? Identity & Access Management IAM ACCESS MANAGEMENT How users log on? How users present ID s? Who are they? Single sign on, federation IDENTITY MANAGEMENT How users register,? How users obtain ID s? What users can do? Who can they delegate to?

Your No 1 question! How do we authenticate applicants New Applicant Business Registry Business Registry eidas Strength of Assurance Do you allow social login for basic access then Step Up later in the process? What Personally Identifiable Information (PII) do you accept/store? GDPR for EU Citizens! Do you allow applicants to perform their own delegation & administration? Do you invest in continually updating your onboarding processes to avoid risk and provide alternative methods of Authentication or do you outsource? If you do, what s the ROI or opportunity for incremental revenue??

A win win Business Model The Business Registry as an IdP. Business Registry Business Registry Registered Entity Relying Party Bank A Relying Party Bank B The Traditional (Outdated) Model Everyone pays to authenticate the same entity. Inefficient/slow/expensive Business Registry (Identity Provider) IDENTITY PLATFORM Registered Entity (Principle) Bank A (Service Provider) Bank B (Service Provider) The Modern Model efficient KYC as attributes, Company name, Number etc are presented by the Business Registry as an IdP.

In summary Become an Identity Provider (IdP) Enable automation and accuracy across all associated eco systems which rely on business data. Create an additional revenue stream for authentication of business attributes Improve Ranking within the World Bank s, ease of doing business tables: Using Social Login to speed up initial registration and Step up Authentication for high trust activities Support a growing suite of Federated Identity Providers for Individuals to address trust issues Reduce risk from GDPR legislation around Personally Identifiable Information Offload delegation of internal roles to applicants Reduce system complexity. Enjoy the benefits that an effective IAM policy can bring in terms of brand protection, closer collaboration with Connected Government and the Financial Services Community.

A final clarification It s a standards based approach...

Join a growing community of Trust Networks SOCIAL MEDIA BUSINESS MULTI FACTOR FEDERATED NETWORKS TUPAS WS Federation... eidas LDAP SQL SMS OTP OTP Printout Capture and convert visitors with social media identities. Decrease abandonment rate with effortless registration and increase loyalty by allowing the customers use what they already have. Allow your business customers to Single Sign On to your online services from their own corporate network and thus taking the customer experience to a whole new level. Provide strong or step up authentication where needed from one time passwords to mobile & biometrics. Protect your online assets with appropriate authentication. Enjoy the plug and play support for several established federation networks and standards.