Biometrics & Trusted Identity Combating Identity Theft



Similar documents
Consumer ID Theft Total Costs

Phone: Fax:

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

For personal use only

Global Fraud Detection and Prevention (FDP) Market - Trends and Forecasts ( )

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Device Fingerprinting and Fraud Protection Whitepaper

How To Protect Your Computer From Attack

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

Presidential Summit Reveals Cybersecurity Concerns, Trends

Cyber Security Market by Solution - Global Forecast to 2020

Global Cyber Security Market: Trends & Opportunities ( )

BIG SHIFTS WHAT S NEXT IN AML

E-Commerce at Wells Fargo. SF IIA/ISACA Presentation

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Fraud Solution for Financial Services

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

The IBM data governance blueprint: Leveraging best practices and proven technologies

Voice Authentication On-Demand: Your Voice as Your Key

Industry models for insurance. The IBM Insurance Application Architecture: A blueprint for success

Digital Identity in Healthcare: What's Coming Down the Pike. Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS

For most countries, money laundering and terrorist financing raise significant

A strategic approach to fraud

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

THE LEADING EDGE OF BORDER SECURITY

Middle Class Economics: Cybersecurity Updated August 7, 2015

FINAL // FOR OFFICIAL USE ONLY. William Noonan

How To Use Usher For Business

Application of Biometric Technology Solutions to Enhance Security

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Brochure More information from

Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Admiral Markets. ID Verification solution: Overview. Case Study

Can We Reconstruct How Identity is Managed on the Internet?

Top 5 Reasons to Choose User-Friendly Strong Authentication

Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through

IBM Security X-Force Threat Intelligence

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

These jobs are posted in accordance with the CUPE 3902 Unit 3 Collective Agreement

AML & CFT Innovations to Mitigate Risks Lessons from the e-money

one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

Theme 1: IT Governance and Audit Methodologies

Security Intelligence Solutions

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

Slide 1.1. E-business Lecture 1. Introduction to e-business and e-commerce

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists

Global Big Data Market: Trends & Opportunities ( ) June 2015

FAQs Organised Crime and Anti-corruption Legislation Bill

Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration

Preemptive security solutions for healthcare

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities

HomeConvenience.com. Creating Trust Online CASE STUDY. Comodo Identity and Trust Assurance Suite. Content Verification Certificate.

An Overview of Cybersecurity and Cybercrime in Taiwan

Global Lending & Leasing Survey. Back to a new normal? A survey carried out by Linedata Edition

Recognize the many faces of fraud

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

Surveillance and Security Systems

Transcription:

Biometrics & Trusted Identity Combating Identity Theft ID World Conference 2003 November 2003 Paris c. maxine most acuity market intelligence cmaxmost@acuitymi.com

bridges the gap between information & insight Technology-neutral and Vendor-independent insight, market analysis and solutions assessment for emerging technology markets. Markets Clients Services Biometrics, ID Management, Authentication Vendors, Integrators, End Users Authentec, Ball Aerospace, Biocom, Booz Allen Hamilton, CIA, CIC, Datastrip, DOD, Digital Persona, Digimarc, ETRI, IBM GS, Imagis, Identix, Morpheus,, NIST, TASC, On Guard Plus, PingID, SAFLINK, SAGEM, SoftPro, TI, Ultra-Scan Executive Briefings, Consulting, Segment Tracking, Reports, Research, Workshops Expertise - Opportunity Identification & Sizing - Targeted Vertical Solutions Analysis - Technology Adoption & Deployment Evaluation - Sustainable Market Dominance Strategies Acuity Market Intelligence 2

Combating Identity Theft Definitions The Identity Theft/Fraud Problem Size Scope Market Forces Solving The Problem Digital Identity Opportunity for Biometrics Acuity Market Intelligence 3

Definitions Biometrics Measurements of physical or biological characteristics of an individual to create a unique identifier which can be electronically stored, retrieved, and compared for positive identification purposes Trusted Identity An identity that has been proved to the level of certainty required by the criteria defined for a specific transaction, operation or process. Digital Identity A virtual representation of a real identity that can be used in electronic interactions with other machines or people. Acuity Market Intelligence 4

Fast Growing Crime in US Aberdeen (5/03) Aberdeen (5/03) 300% compound annual growth 2003 Financial loss Consumer, Business, Government $221.2 billion worldwide $73.8 billion in the U.S Trajectory > $2 Trillion in 2005 FTC Survey (9/03) 4.6% US Victims in the last year ~10M $5B in losses 300M hours 12% US Victims in last 5 years ~28M Acuity Market Intelligence 5

UK s s Fasted Growing Fraud UK Fraud Prevention Report (7/02) Identity fraud increased 462% from 1999 to 2000 122% from 2000 to 2001 53% First 3 months of 2002 Confirmed Link to Organized Crime Illegal Immigration Money Laundering Drug Running in Economic Cost 1.3B per Annum Minimum Quantifiable Cost Reported as Significant Underestimate Acuity Market Intelligence 6

Scope of The Problem Linking ID Theft and ID Fraud Linking Real and Digital Worlds Old Problem Recently Exacerbated Low Tech Identity Acquisition High Tech Identity Exploitation Traditional Targets Expanding Government - Benefits > Tax Fraud Consumer - Credit Card > Mortgages Commercial Petty Theft > High Value Crime Beneath Financial Services Radar Acuity Market Intelligence 7

Scope of The Problem Nation Security Context Our Challenge is to make it impossible for would be terrorists to garner funds, access and other resources they need to carry out their horrific mission. SVP Risk Solutions LexisNexis in a Feb 2002 speech to UN Global ecommerce and egovernment Conference Acuity Market Intelligence 8

Market Forces Proliferation of SSN as Identifier Ubiquity of Web Services Sophistication of Hackers Inevitability of egovernment DOD s Global Information Grid Consumer Fear Legislative Response Federated Identity Management Convenience Factor Acuity Market Intelligence 9

Solving The Problem The nature of identity theft is to exploit the network effect. Education/Awareness Consumer, Commercial, Government Policies/Procedures Legal Framework Regulations Legislation Breeder Documents Digital Identity Infrastructure and Authentication Acuity Market Intelligence 10

Digital Identity Network Infrastructure Evolution Halt.. Who goes there? Personal Knowledge Environment of Trust Anonymity versus Privacy Network Based Identity Federated Identity Acuity Market Intelligence 11

Network Based Identity Acuity Market Intelligence 12

Federated Identity Acuity Market Intelligence 13

Authentication Models Evolution of Digital Authentication Centralized Control Centralized Authentication Virtual Centralized Authentication Business Control Business Authentication Business Authentication Acuity Market Intelligence 14

Opportunity for Biometrics Shift Focus: Security > Identity Protection Identity Context for Solutions BIG Problem Growing Rapidly Severe Point of Pain Commercial, Consumer, Government Link Consumer Protection to Sustainable ecommerce (B2B, B2C), egovernment (G2B, G2c) and National Security Acuity Market Intelligence 15

c. maxine most principal 929 maxwell avenue boulder, co 80304 phone 303.449.1897 fax 208.730.8924 cmaxmost@acuity-mi.com www.acuity-mi.com for additional market analysis www.biometricsmi.com for free downloads of Acuity Market Intelligence 16