Biometrics & Trusted Identity Combating Identity Theft
|
|
|
- Valentine Collins
- 10 years ago
- Views:
Transcription
1 Biometrics & Trusted Identity Combating Identity Theft ID World Conference 2003 November 2003 Paris c. maxine most acuity market intelligence
2 bridges the gap between information & insight Technology-neutral and Vendor-independent insight, market analysis and solutions assessment for emerging technology markets. Markets Clients Services Biometrics, ID Management, Authentication Vendors, Integrators, End Users Authentec, Ball Aerospace, Biocom, Booz Allen Hamilton, CIA, CIC, Datastrip, DOD, Digital Persona, Digimarc, ETRI, IBM GS, Imagis, Identix, Morpheus,, NIST, TASC, On Guard Plus, PingID, SAFLINK, SAGEM, SoftPro, TI, Ultra-Scan Executive Briefings, Consulting, Segment Tracking, Reports, Research, Workshops Expertise - Opportunity Identification & Sizing - Targeted Vertical Solutions Analysis - Technology Adoption & Deployment Evaluation - Sustainable Market Dominance Strategies Acuity Market Intelligence 2
3 Combating Identity Theft Definitions The Identity Theft/Fraud Problem Size Scope Market Forces Solving The Problem Digital Identity Opportunity for Biometrics Acuity Market Intelligence 3
4 Definitions Biometrics Measurements of physical or biological characteristics of an individual to create a unique identifier which can be electronically stored, retrieved, and compared for positive identification purposes Trusted Identity An identity that has been proved to the level of certainty required by the criteria defined for a specific transaction, operation or process. Digital Identity A virtual representation of a real identity that can be used in electronic interactions with other machines or people. Acuity Market Intelligence 4
5 Fast Growing Crime in US Aberdeen (5/03) Aberdeen (5/03) 300% compound annual growth 2003 Financial loss Consumer, Business, Government $221.2 billion worldwide $73.8 billion in the U.S Trajectory > $2 Trillion in 2005 FTC Survey (9/03) 4.6% US Victims in the last year ~10M $5B in losses 300M hours 12% US Victims in last 5 years ~28M Acuity Market Intelligence 5
6 UK s s Fasted Growing Fraud UK Fraud Prevention Report (7/02) Identity fraud increased 462% from 1999 to % from 2000 to % First 3 months of 2002 Confirmed Link to Organized Crime Illegal Immigration Money Laundering Drug Running in Economic Cost 1.3B per Annum Minimum Quantifiable Cost Reported as Significant Underestimate Acuity Market Intelligence 6
7 Scope of The Problem Linking ID Theft and ID Fraud Linking Real and Digital Worlds Old Problem Recently Exacerbated Low Tech Identity Acquisition High Tech Identity Exploitation Traditional Targets Expanding Government - Benefits > Tax Fraud Consumer - Credit Card > Mortgages Commercial Petty Theft > High Value Crime Beneath Financial Services Radar Acuity Market Intelligence 7
8 Scope of The Problem Nation Security Context Our Challenge is to make it impossible for would be terrorists to garner funds, access and other resources they need to carry out their horrific mission. SVP Risk Solutions LexisNexis in a Feb 2002 speech to UN Global ecommerce and egovernment Conference Acuity Market Intelligence 8
9 Market Forces Proliferation of SSN as Identifier Ubiquity of Web Services Sophistication of Hackers Inevitability of egovernment DOD s Global Information Grid Consumer Fear Legislative Response Federated Identity Management Convenience Factor Acuity Market Intelligence 9
10 Solving The Problem The nature of identity theft is to exploit the network effect. Education/Awareness Consumer, Commercial, Government Policies/Procedures Legal Framework Regulations Legislation Breeder Documents Digital Identity Infrastructure and Authentication Acuity Market Intelligence 10
11 Digital Identity Network Infrastructure Evolution Halt.. Who goes there? Personal Knowledge Environment of Trust Anonymity versus Privacy Network Based Identity Federated Identity Acuity Market Intelligence 11
12 Network Based Identity Acuity Market Intelligence 12
13 Federated Identity Acuity Market Intelligence 13
14 Authentication Models Evolution of Digital Authentication Centralized Control Centralized Authentication Virtual Centralized Authentication Business Control Business Authentication Business Authentication Acuity Market Intelligence 14
15 Opportunity for Biometrics Shift Focus: Security > Identity Protection Identity Context for Solutions BIG Problem Growing Rapidly Severe Point of Pain Commercial, Consumer, Government Link Consumer Protection to Sustainable ecommerce (B2B, B2C), egovernment (G2B, G2c) and National Security Acuity Market Intelligence 15
16 c. maxine most principal 929 maxwell avenue boulder, co phone fax for additional market analysis for free downloads of Acuity Market Intelligence 16
Consumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
For personal use only
T: + 61 2 8251 9600 F: + 61 2 9299 7703 ASX Announcement 22 July 2014 Business Update Invigor Group Limited (ASX: IVO) ( Invigor ) has released the accompanying Business Update presentation providing additional
Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts (2015-2020)
Brochure More information from http://www.researchandmarkets.com/reports/3421400/ Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts (2015-2020) Description: Increasing penetration
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Device Fingerprinting and Fraud Protection Whitepaper
Device Fingerprinting and Fraud Protection Whitepaper 1 of 6 Table Of Contents 1 Overview... 3 2 What is Device Fingerprinting?... 3 3 Why is Device fingerprinting necessary?... 3 4 How can Device Fingerprinting
How To Protect Your Computer From Attack
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
Global Cyber Security Market: Trends & Opportunities (2014-19)
Brochure More information from http://www.researchandmarkets.com/reports/2872878/ Global Cyber Security Market: Trends & Opportunities (2014-19) Description: The report provides an insight into the market
BIG SHIFTS WHAT S NEXT IN AML
Commercial Solutions Financial Crimes Commercial Solutions BIG SHIFTS WHAT S NEXT IN AML The next big shift in the fight against financial crime and money laundering is advanced machine learning and sophisticated
E-Commerce at Wells Fargo. SF IIA/ISACA Presentation
E-Commerce at Wells Fargo SF IIA/ISACA Presentation By Wells Fargo Audit Services October 17, 2000 2 Discussion Topics E-Commerce at Wells Fargo - Our Story E-Commerce Risks General Conclusions Q&A Afternoon
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Fraud Solution for Financial Services
Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
Industry models for insurance. The IBM Insurance Application Architecture: A blueprint for success
Industry models for insurance The IBM Insurance Application Architecture: A blueprint for success Executive summary An ongoing transfer of financial responsibility to end customers has created a whole
Digital Identity in Healthcare: What's Coming Down the Pike. Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS
Digital Identity in Healthcare: What's Coming Down the Pike Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS Discussion What is the Problem? What is Digital Identity and How Does
For most countries, money laundering and terrorist financing raise significant
01-chap01-f.qxd 3/30/03 13:44 Page I-1 Chapter I Money Laundering and Terrorist Financing: Definitions and Explanations A. What Is Money Laundering? B. What is Terrorist Financing? C. The Link Between
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance
The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Ann Patterson Medical Identity Fraud Alliance Medical Identity Theft Primer Includes theft of Protected
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
THE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
How To Use Usher For Business
MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data
Application of Biometric Technology Solutions to Enhance Security
Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
Brochure More information from http://www.researchandmarkets.com/reports/3445946/
Brochure More information from http://www.researchandmarkets.com/reports/3445946/ Mobile Analytics Market by Type (Mobile Advertising and Marketing Analytics, In-app Behavioral Analytics, Application Performance
Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud
Online Payment Fraud IP Intelligence is one of the top five techniques used to detect and prevent online fraud Online Payment Fraud 2 Contents IP Intelligence is one of the top five fraud tools 3 Not all
Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
Admiral Markets. ID Verification solution: Overview. Case Study
ID Verification solution: Admiral Markets Overview Company Admiral Markets is a leading forex trading provider. Challenge To protect itself from fraud and comply with regulations, Admiral Markets must
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through
Biocryptology is an encryption-based authentication technology that represents a generational step forward in online security and a transformative approach to combating cybercrime. entry to a network or
IBM Security X-Force Threat Intelligence
IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
These jobs are posted in accordance with the CUPE 3902 Unit 3 Collective Agreement
DIPLOMA IN INVESTIGATIVE & FORENSIC ACCOUNTING PROGRAM University of Toronto Mississauga SESSIONAL INSTRUCTIONAL ASSISTANT S CUPE 3902, UNIT 3 SUMMER/FALL/WINTER 2013- These jobs are posted in accordance
AML & CFT Innovations to Mitigate Risks Lessons from the e-money
AML & CFT Innovations to Mitigate Risks Lessons from the e-money industry Presentation to the World Bank Workshop in Bangkok 25 June 2008 Dr Thaer Sabri Chief Executive Electronic Money Association 05
one admin. one tool. Providing instant access to hundreds of industry leading verification tools.
2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74
Theme 1: IT Governance and Audit Methodologies
Theme 1: IT Governance and Audit Methodologies Recent rapid development of new IT technologies was followed up by an instantaneous integration of them at the organizational level. The management of the
Security Intelligence Solutions
Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 [email protected] What is Security
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
Slide 1.1. E-business Lecture 1. Introduction to e-business and e-commerce
Slide 1.1 E-business Lecture 1 Introduction to e-business and e-commerce Slide 1.2 E-business lecture 1 - Outline Practicalities Chapter 1 (Introduction and overview) Slide 1.3 E-business practicalities
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having
Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists
Statement of Michael Johnson Former Special Agent in Charge, Miami Field Office, Diplomatic Security Service United States Department of State Before the U.S. Senate Homeland Security and Governmental
Global Big Data Market: Trends & Opportunities (2014-2019) June 2015
Global Big Data Market: Trends & Opportunities (2014-2019) June 2015 Scope of the Report The report titled Global Big Data Market: Trends and Opportunities (2014-2019), analyzes the potential opportunities
FAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration
Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration Security Network East Washington, D.C. May 2012 Anthony Ashley, PhD Director General Defence R&D Canada Centre
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities
IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities Morpho Driver s license Solution for governments and road traffic authorities Governments are looking for an
HomeConvenience.com. Creating Trust Online CASE STUDY. Comodo Identity and Trust Assurance Suite. Content Verification Certificate.
TM Creating Trust Online CASE STUDY HomeConvenience.com Comodo Identity and Trust Assurance Suite Content Verification Certificate Hacker Guardian SSL Certification Corner of Trust Logo Who are HomeConvenience?
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Global Lending & Leasing Survey. Back to a new normal? A survey carried out by Linedata - 2014 Edition
Global Lending & Leasing Survey Back to a new normal? A survey carried out by Linedata - 2014 Edition Executive Summary Economic figures and analyst surveys show that growth is back in the lending & leasing
Recognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination
GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY
Surveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
