Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.



Similar documents
Data Protection and Mobile Payments. Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security

Strong data protection. Strategic business value.

INFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW

Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Mobile Security BYOD and Consumer Apps

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

MPOS: RISK AND SECURITY

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Kaspersky Lab s Full Disk Encryption Technology

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

Secure SSL, Fast SSL

OVERVIEW OF MOBILE PAYMENT LANDSCAPE

OVERVIEW OF MOBILE PAYMENT LANDSCAPE Marianne Crowe Federal Reserve Bank of Boston NEACH September 10, 2014

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Creating a trust infrastructure to support mobile payments

Key & Data Storage on Mobile Devices

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

EMV-TT. Now available on Android. White Paper by

Hands on, field experiences with BYOD. BYOD Seminar

Kaspersky Security for Mobile

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

How To Protect Your Restaurant From A Data Security Breach

Global Encryption and Key Management Trends Study

RETHINKING CARDS BUSINESS. Erick Ho, Head of Payment Services, SunGard 17 September Break through.

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Executive Summary P 1. ActivIdentity

Android pay. Frequently asked questions

Software Token Security & Provisioning: Innovation Galore!

Enhancing Organizational Security Through the Use of Virtual Smart Cards

PCI Security Standards Council

Mobile Security: Controlling Growing Threats with Mobile Device Management

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

How To Understand The Power Of The Internet Of Things

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Defending the Internet of Things

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Making Cloud-Based Mobile Payments a Reality with Digital Issuance, Tokenization, and HCE WHITE PAPER

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Secure Bridge to the Cloud

Security and the Internet of Things (IoT)

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Trust. Every day. Anna Rewers, Regional Channel Sales Manager, Identity & Data Protection April 2015

Tokenization: FAQs & General Information. BACKGROUND. GENERAL INFORMATION What is Tokenization?

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers

Managing BitLocker With SafeGuard Enterprise

Information Security

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Key Topics in Mobile Payments. Marianne Crowe Federal Reserve Bank of Boston m-enabling Summit June 10, 2014

Contactless Payments. Björn Salomon-Sörensen, Account Director - Swedbank November 11, 2015

White Paper. Data Security. The Top Threat Facing Enterprises Today

The future of contactless mobile payment: with or without Secure Element?

Risks and Challenges

Samsung SED Security in Collaboration with Wave Systems

IoT market analysis: Sizing the opportunity

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

The Maximum Security Marriage:

Mobility Challenges & Trends The Financial Services Point Of View

The Future of Mobile Payment. Christopher Boone President & CEO, Cimbal Inc. E: chris@cimbal.com T: (650)

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Credential Management for Cloud Computing

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Tom Schauer TrustCC cell

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

INTRODUCTION AND HISTORY

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems

Mobile Payment Solutions: Best Practices and Guidelines

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

Guideline on Safe BYOD Management

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

Thales e-security Key Isolation for Enterprises and Managed Service Providers

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen

The Race to Secure the Cloud 2.0

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security

Optimizing the Mobile Cloud Era Through Agility and Automation

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015

The New Key Management:

How to Select the Right Remote Support Tool

The State of Pay. A mobile revolution. semble.co.nz

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

State of Mobility Survey. France Results

Enterprise Application Enablement for the Internet of Things

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

The Big Bang: cloud resiliency and the data explosion

Mobile Security - Mobilidade Bancária e Digital Workers. Américo Alonso, CISSP, CIS LATAM Offering Manager for CyberSecurity

Mobile Security. IIIIII Security solutions for mobile as an endpoint. financial services & retail. enterprise. public sector. telecommunications

Protecting Your Data On The Network, Cloud And Virtual Servers

Setting BYOD Policy: A New Partnership for IT and HR

Transcription:

Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number of detected incidents - growth of 66% CAGR www. pwc.com/gx/en/consulting-services/information-security-survey/download.jhtml

3 And more targeted www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ 2015 2014

4 How Much is Data Worth? At the end of April, there were 270 reported breaches with 102,372,157 records compromised! Thales e-security CONFIDENTIAL Source- Identity Theft Resource Center

5 Trust in a digital world ecommerce egovernment ecitizen Smart phones Smart grid Smart vehicles

6 Trust Management is a central problem to solve Organizations are losing control over their application environment Clouds, consumer devices (BYOD), remote connected devices, fragmented workforce - emphasis moves from control to trust Targeted attacks drive need for data neutralization Mobile, remote devices and cloud services increase attack surface Privacy requirements drive need for data protection wherever it resides Increased scrutiny and governance drives need to prove trust as well as simply establish it Dynamic business relationships requires trust to be dynamic Federated, transitory and anonymous relationships create the need for new trust models and technologies Virtualized and shared environments Need for trust varies by application but infrastructure is increasingly shared Scale and dynamics of connected everything forces automation of trust properties Manual controls are no longer practical or cost effective

7 Crypto is the key to establish and enforce trust Identity and Access Controls Data Confidentiality and privacy Data Integrity and Non-Repudiation

8 The role of cryptography Identity and Access Controls Password protection Key Management Credential management Strong authentication Payment card issuance Document signing Signed email DNSSEC SSL Payments processing Application-level encryption Public Key Infrastructure Audit & log signing Code signing Tokenization Email encryption Digital rights management Data Confidentiality and privacy Database encryption Disk encryption Tape encryption Point of sale encryption (P2PE) Server-file encryption Network encryption SAN switch encryption Data Integrity and Non-Repudiation

9 Thales e-security CONFIDENTIAL

10 The pain of key management Please rate the overall pain associated with key and certificate management in your organization 35% 30% 25% 20% 15% 10% 5% 0% 1-2 (Minor) 3-4 5-6 7-8 9-10 (Severe) Source: 2015 Global Encryption and Key Management Trends Study - Ponemon Institute (April 2015) 55%

11 What makes key management hard? Source: 2015 Global Encryption and Key Management Trends Study - Ponemon Institute (April 2015)

12 What s at stake? The secrecy of keys underpins trust if keys are stolen or misused, data is compromised The availability of keys keeps systems running lost keys can destroy data and bring services to a standstill Lifecycle management of keys is costly complexity, delays and errors can quickly escalate Key management is under intense scrutiny policies, controls and reporting simplify audits and compliance

13 Hardware secures applications everywhere Trusted Platform Modules (TPM) protect desktop apps Secure Elements and SIMs protect mobile apps Hardware Security Modules (HSM) protect server based apps

14 So, what s changing?

15 Mobile payments

16 Mobile Payments from Buzzwords to Business Mobile Payments HCE mpos Mobile Commerce EMV NFC TSM SE The race is finally on! Mobile acceptance versus mobile payments Retail versus Person to Person Disruptors versus incumbents

17 Knocking down the barriers 1. Convincing consumers to give it a try 2. Preparing the cardholder data 3. Equipping phones to protecting the data 4. Delivering the data to the phone 5. Enabling merchants to read the phones 6. Enabling user to easily authorize transactions 7. Encouraging consumers to make it a habit

18 Simple ecosystems are good Barrier Apple Android Apple Pay SE/TSM HCE 1. Convincing consumers to give it a try Apple Phone manufacturer, wallet provider 2. Preparing the cardholder data Card brands 3. Equipping phones to protecting the data Apple Issuer Phone manufacturer or carrier (SIM) 4. Delivering the data to the phone Apple Carrier or 3 rd 5. Enabling merchants to read the phones 6. Enabling user to easily authorize transactions 7. Encouraging consumers to make it a habit party Issuer Issuer Issuer (cloud) Issuer NFC NFC NFC Apple Wallet provider Issuer Apple? Issuer

19 Mobile Payments Thales PayShield HSM s significant player across the mobile payments ecosystem International roll-out in 2015 2015 campaign to target Android market through new HCE capability in payshield and ASAP partners Our blog www.thales-esecurity.com/blogs/2014/september/apple-enables-mobile-payments

20 Keys in the cloud Thales e-security CONFIDENTIAL

21 Amazon Key Management $1 per key per month $0.03 per 10,000 operations

22 HSMs in the cloud The Key Vault service performs all cryptographic operations on HSM-protected keys inside Hardware Security Modules. The service uses Thales nshield HSMs Dan Plastina - Microsoft Our blog www.thales-esecurity.com/blogs/2015/february/trust-anchors-in-the-azure-cloud

23 Microsoft Azure Key Vault

24 Evolving cloud landscape Users (service consumers) Software Applications & content Platform OS, tools & services Infrastructure Hardware & networks

25 Evolving cloud landscape Users (service consumers) Enterprises running private clouds Enterprises with workloads in the cloud Service providers operating from the cloud Software Applications & content Platform OS, tools & services Infrastructure Hardware & networks

26 Evolving cloud landscape Users (service consumers) Enterprises running private clouds Enterprises with workloads in the cloud Service providers operating from the cloud Software Applications & content CSP CSP CSP CSP Platform OS, tools & services Infrastructure Hardware & networks Private infrastructure Public infrastructure Private infrastructure

27 Evolving cloud landscape Users (service consumers) Enterprises running private clouds Enterprises with workloads in the cloud Service providers operating from the cloud Software Applications & content CSP CSP CSP CSP Platform OS, tools & services Infrastructure Hardware & networks Private infrastructure Public infrastructure Private infrastructure

28 Evolving cloud landscape Users (service consumers) Enterprises running private clouds Enterprises with workloads in the cloud Service providers operating from the cloud Software Applications & content CSP CSP CSP CSP Platform OS, tools & services Infrastructure Hardware & networks Private infrastructure Public infrastructure Private infrastructure

29 Crypto-currency Thales e-security CONFIDENTIAL

30 Cryptocurrency We looked at every HSM on the market to find one that could support Bitcoin wallets, and none of them could do it, so we built it ourselves {using codesafe}. Thales really came through for us, and the level of enthusiasm they have for our growing industry is incredible. Micah Winkelspecht - Gem CEO and Founder Our blog www.thales-esecurity.com/blogs/2015/january/bitcoin-steps-up-to-bank-grade-security

31 Digital currency Bitcoin Wallets to store private keys Public key crypto Bitcoin mining Interface to traditional payment rails

32 Bitcoin Hacks Reports suggested the site shut down after it discovered that an estimated 744,000 bitcoins - about $350m ( 210m) - had been stolen due to a loophole in its security.

33 Bitcoin Hacks

34 What is our value proposition Private key protection Key derivation for privacy and scale Multi-signature for dual control security

35

36 IoT Touches EVERYTHING Asset tracking Consumer Smart homes & cities Energy Agriculture Automotive Security Building management National infrastructure Embedded Healthcare Mobile

37 Big Numbers Big Challenge

38 Market Potential - The Internet of Things A development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data. Oxford Dictionary

39 The IoT Has Passed an Inflection Point According to Cisco Internet Business Systems Group (IBSG), the Internet of Things was born in 2008 when more things were connected to the Internet than people. According to Gartner, By 2020, the number of smart-phones, tablets, and PCs in use will reach about 7.3 billion units. In contrast, the IoT will have about 26 billion units at that time. IDC Predicts that IoT will reach $3 Trillion by 2020.

40 Impact of those things Economic value-add by vertical in 2020 (total value-add $1.9 Trillion) Source - The Internet of Things, Worldwide Forecast (Gartner Nov 2013)

41 Problems are we trying to solve Establishing trust between distributed entities Mutual authentication of devices, processes and users Credential creation, management, provisioning, validation and revocation Validating integrity of remote systems Secure configuration Secure communications between systems and devices Network and message level encryption Message signing and validation non-repudiation Protection of data at rest and in use in command/control systems Storage, file, database and application level encryption and tokenization Multi-platform support for multiple application environments Datacenter, cloud, mobile and embedded systems (e.g. Internet of Things) Support for a wide range of scale and assurance levels

42 The Automobile the Ultimate Connected Thing While a lot of the discussions surrounding connected vehicles focus on safety and anti hacking measures, several industry strategic positions are clear: Autonomous vehicles are Job One Infotainment systems will converge with mobile phones The connected car will become a payments platform

43 There is an App for that! Unlock and Lock Doors Track status of vehicles systems Schedule automated commands Control the heater/ air conditioner Open the sunroof Gather GPS data And its an OPEN SOURCE APP! Thales e-security CONFIDENTIAL

44 What about Paying Cars? BumperPay Announces $100 Million Series A Funding High Speed P2P payments Drive Through Services Thales e-security CONFIDENTIAL

45