Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial.

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

Achieving online trust through Mutual Authentication.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
E-Commerce: The Revolution Chapter 1 Electronic Commerce Course BADM 561, Dr. Cara Peters.
1 John Harries Managing Director, ANZ Banking Products National Consumer Congress 14 March 2007.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
Mobile Based Two Factor Authentication For Online Transactions Authentication For Online Transactions.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
10.1 © 2007 by Prentice Hall 10 Chapter E-Commerce: Digital Markets, Digital Goods.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
By Dominique Piotet, CEO of L’Atelier North America Trends from the Silicon Valley.
Changing Global Communications through Participatory Media Steven Jackson Madoka Higuchi Marti Grimminck.
“Topo centras” E- Marketing plan Presented by Gediminas Sumyla.
Andrew Schroeder Networking Aspects of Cloud Computing.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
10.1 © 2007 by Prentice Hall 10 Chapter E-Commerce: Digital Markets, Digital Goods.
CertAnon A Proposal for an Anonymous WAN Authentication Service David Mirra CS410 January 30, 2007.
* The e-commerce revolution has changed business practices around the world and traditional retailers have had to learn how best to operate in the new.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Understand the effects of e-commerce on society
Credit Card Fraud, Jan Prochazka, Credit Card Fraud on the Web Jan Prochazka.
Electronic Transaction Use & Risk of Identity Theft.
Internet Fraud By: Noelle Woodman.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The “Any Era” Has Arrived… And Everyone Has Noticed Stratton Sclavos CEO and Chairman of the Board.
Ecommerce … or electronic commerce refers to systems that support electronically executed business transactions. B2C B2B C2C In this section: Ecommerce.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Chapter 15 Using Digital Interactive Media William F. Arens Michael F. Weigold Christian Arens McGraw-Hill/IrwinCopyright © 2013 by The McGraw-Hill Companies,
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Chapter Objectives E-Business in Contemporary Marketing CHAPTER Define e-business and discuss how marketers use the Internet to achieve business.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
9.4M online U.S. adults were victimized by identity theft in year ending April 2004 –Losses amounted to $11.7 billion Online theft is escalating The solution.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Lecture 2 Title: E-Business Advantages By: Mr Hashem Alaidaros MIS 326.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Laudon & Laudon: Canadian Edition
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Secure Mobile Banking Enabling the Collaborative Customer Experience.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Payment workshop Identity, Security and Privacy Timothy Ng
Convergence: Consumers and Opportunities for Mobile Media Thomas Ryan 3GSM World Congress Government Mobile Forum Barcelona, 13 th February 2007.
Ecommerce Applications 2007/8 Session 70 E-Commerce Applications Mobile commerce.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Internet technology & the Digital Firm
Identity Assurance Emory University Security Conference March 26, 2008.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Global Digital Security Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Broadband Challenges 2017 Christopher Tamarin
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
E-Commerce: Digital Markets, Digital Goods
Strong Security for Your Weak Link:
E-Commerce and Economic Forces
Presentation transcript:

Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial

Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial

3 The Internet Is Real and Global m global broadband subscribers 1 1b cumulative iTunes m Skype users 70%+ 70%+ Korean broadband penetration 60 60m iPods m MySpace users 34 34m active blogs 1 1b Internet users, 75% non-U.S. Source: Morgan Stanley 70 70m Chinese Internet users < b wireless subscribers

4 6.4b Total Population 7.1b Total Lines Yet, It’s Only the Beginning Sources 2006: Forrester, PwC, IDC, In-Stat, eMarketer, TIA and VeriSign % 29.4% Internet Wireless Advertising Retail Commerce $381.7b $2.2t % 6.0% Digital (%)Total Media & Entertainment Supply Chain VoIP Access Lines $17.8b $1.3t 5.5% 1.3% 4.5% m Lines

5 What Could Go Wrong? 72% 62% 33% More cautious where purchasing goods online More careful entering sensitive data on sites Buying fewer items than otherwise would 42% online shoppers more nervous about attacks: Meet “Wicked Rose” Young Methodical Global for Hire! Fraud and the Fear of Fraud

6 The Internet Makes It Easier to Steal From dumpster diving to global and massive ID thefts

7 Consumers Make It Harder to Secure More convenience…Less Security! + Anywhere + Any Device + Any Channel + Any Product + Any Me + Anytime Mobility Information Communication Entertainment Consumption Lifestyle

8 The Good Guys Are Not Working Together + Geo-Political Boundaries + Identity Silos + Point Solutions + Global Threat + Target Rich Environment + Multi-Faceted Attacks

9 Meanwhile, The Bad Guys Are Innovating WEB (Google Adwords Phishing) (Pump and Dump) DESKTOP (MetaFisher Bot) Take Home: Multi-Faceted

10 Operating Intelligent and Global Infrastructures + Professional grad command center + Controls bots across the world and allows targeted attacks + Infrastructure can be rented by the hour! Take Home: Highly Sophisticated

11 Take Home: Highly Organized Running Well-Oiled “Businesses” Discount PricingOnline Marketplace Money Mules

12 And They’re Coming After You! + ID Theft Rapidly Growing ▪ 10M Adults victimized ▪ $15B in total losses ▪ 50 Million accounts compromised ▪ 25% Year to year Growth Are You Scared Yet?

13 Raising the Identity Security Bar #4. COLLABORATIVE#3. COMPREHENSIVE + No one can do it alone. The industry needs to take a collaborate and fraud intelligence must be shared across boundaries + Bad guys always move to the weakest link. The user, the desktop, site front-end and backend must be strengthened #1. CONVENIENT + The security that we introduce must not disrupt the convenience of the Internet + We need to move away from point solution and apply a global infrastructure approach #2. GLOBAL The Four Pillars of Successful Identity Security Solutions

14 Anyone Would Dare Trying? + Critical internet infrastructure operator (DNS and SSL) + Recognized and trusted by millions of Internet users + Security provider to financial institutions and online merchants

15 Introducing VeriSign Identity Protection (VIP) Two complementary services enhanced by a “Network Effect” Intelligent Infrastructure for ID Protection VIP Network VIP Authentication VIP Fraud Detection

16 + An ATM card works across all the Banks on the Cirrus Network An Idea Inspired by the Offline World + An ATM card works across all the Banks on the Cirrus Network + A VIP Device Works Across all the Web sites on the VIP Network Need fraud intell sharing

17 A Demo Speaks More than Thousand Words 1.Convenient 2.Comprehensive 3.Global 4.Collaborative Identity Protection Infrastructure

18 Global and Sharing Communities Shared VIP Authentication Network 3M Accounts 100M Accounts 200M Users181M Registered

19 Industry Collaboration

20 Conclusion: It Is Time to Share! + Fraud and the fear of fraud are significant long-term threats to Internet growth + News solutions must emerge that are adapted to the challenge ▪ Consumer-centric ▪ Layered defense ▪ Global approach + The identity silos and the industry must come together

Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial

Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial