SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
Entities, Identities, & Registries
Heather Vescent
SSI Meetup | September 2019
Gaps in Corporate and IoT Identity
Creative Commons license. (CC BY-SA 4.0).
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
Who am I
Heather Vescent
• CEO, The Purple Tornado
Strategic Intelligence Consultancy
• Author, Cyber Attack Manual
• Author, SSI Report
• Filmmaker, 14 Films (IIW Films)
• IIW, CCG VC WG Communities
• @heathervescent
Creative Commons license. (CC BY-SA 4.0).
Research Background
• Private Sector Digital Identity
• Funded by DHS Science & Technology
Cybersecurity Division
• Researchers: Heather Vescent & Kaliya
Young
• Download: bit.ly/NPEreport
Objective: Research private sector companies digital identity and data
privacy processes, with an emphasis on identifying market failures.
Creative Commons license. (CC BY-SA 4.0).
Current State
• Past solutions create today’s problems
• New technologies create new opportunities
• Onboard of billions of new identities
– Humans
– Companies
– IoT objects (smart things)
– Tracking (dumb things)
– Robots
• New regulations
Creative Commons license. (CC BY-SA 4.0).
What is a Non-Person Entity Identity?
Creative Commons license. (CC BY-SA 4.0).
What is a Non-Person Entity Identity?
Company
(legal entity)
Creative Commons license. (CC BY-SA 4.0).
Thing
(IoT device)
What is a Non-Person Entity Identity?
Company
(legal entity)
Creative Commons license. (CC BY-SA 4.0).
System
(network)
Thing
(IoT device)
What is a Non-Person Entity Identity?
Company
(legal entity)
Creative Commons license. (CC BY-SA 4.0).
How many identities?
180 Million Companies
2 Gov + 3 Business IDs
900 million identities
7.7 Billion Humans
34-48% online
2 Gov + 5 Online ID
18-26+ billion identities
(FB: 2.38B, G:2+B users)
25-75 billion IoT devices
(by 2021)
35 million packages
daily shipped/tracked
(UPS & FedEx)
9 billion yearly
Creative Commons license. (CC BY-SA 4.0).
How many identities?
180 Million Companies
2 Gov + 3 Business IDs
900 million identities
7.7 Billion Humans
34-48% online
2 Gov + 5 Online ID
18-26+ billion identities
(FB: 2.38B, G:2+B users)
25-75 billion IoT devices
(by 2021)
35 million packages
daily shipped/tracked
(UPS & FedEx)
9 billion yearly
~100 Billion
Identities
Creative Commons license. (CC BY-SA 4.0).
+ robot identity?
Creative Commons license. (CC BY-SA 4.0).
NPEs are given identity (Registries)
Creative Commons license. (CC BY-SA 4.0).
• Identity is used to create
more identifiers
Web of Organizational Trust
Creative Commons license. (CC BY-SA 4.0).
NPE identity requires human identity
• Ownership / Liability
• Responsibility
• Humans take actions for NPEs
• NPEs take action for humans
• (And collect & share data)
Creative Commons license. (CC BY-SA 4.0).
Why important to Government?
• Governments give legal entities identity
• Legal identity is important in many industries
o Banking & Finance (KYC, AML, UBO, Beneficiary)
o Global Trade
• Customs
o Internet of Things is growing exponentially
• Security of sensors
• Authenticity of sensor collected data
• Who is responsible/liable when things go wrong?
Creative Commons license. (CC BY-SA 4.0).
NPE is complex
NPE Identities
• Relate to each other
• Interact with each other
• Depend on each other
Creative Commons license. (CC BY-SA 4.0).
Report identified 11 Market Gaps
Corporate NPE Gaps IOT NPE Gaps
1. Legal Identity of Corporations 1. Legal Identity of IoT Things
2. Conclusive Ultimate Beneficial Owner 2. Tracking and Auditing in the Supply Chain
3. Conclusive Verified Corporate Data 3. IoT Security Standards
4. Corporate Delegation 4. IT Self-Authentication
5. Real-Time Verified Identity 5. Data Integrity from IoT Sensors
6. NPE Responsibility
Creative Commons license. (CC BY-SA 4.0).
1: Legal Identity of Corporations
• PROBLEM: Digitally native identity credentials don’t exist, nor
do ways to receive and give verified credentials about an
organization’s identity from an authoritative source.
• IMPACT: KYC checks are costly and take time.
“KYC and associated processes cost the average bank
$60m annually.” - Consult Hyperion report
Creative Commons license. (CC BY-SA 4.0).
2: Conclusive Ultimate Beneficial Owner
• PROBLEM: Finding the Ultimate Beneficial Owner (UBO) of a
company is difficult and sometimes impossible. Banks aren’t
required by statute to conclusively find a UBO before
proceeding, but to make a reasonably good-faith effort to do so.
• IMPACT: Hard to quantify the cost but not knowing who a UBO
can result in tax fraud, enable criminal and terrorism activities
and transactions designed to circumvent sanctions.
Creative Commons license. (CC BY-SA 4.0).
3: Conclusive Verified Corporation Data
• PROBLEM: There is no standard way to find verified corporate
identity data, like legal name, address and jurisdiction along
with the identification of authorized delegates who have
authority to sign contracts, transfer funds, and take action on
behalf of the company – in a digitally native format.
• IMPACT: Initial costs (similar to KYC costs) for corporate
identity proofing. These costs include accessing outside
databases for information, confirming that data, as well as
ongoing costs to keep this data current.
Creative Commons license. (CC BY-SA 4.0).
4: Corporate Delegation
Humans enter into contracts, make
financial transactions, and take other
actions on behalf of the corporation.
There are processes to initiate this
delegation, and the need for
up-to-date information of who remains
authorized.
GAP: Real-time verified delegation
Creative Commons license. (CC BY-SA 4.0).
5: Real-Time Verified Identity
• PROBLEM: Real-time updated identity information associated
with corporate accounts, specifically which humans have the
authority to take action on behalf of a company on a real-time
basis. Current corporate delegation data is updated anywhere
from 30 days to 2 years.
• IMPACT: One subject matter experts shared a story of CEO fraud,
where criminals spear phished a corporate account and convinced
CEOs to transfer millions of dollars to the criminal account.
Creative Commons license. (CC BY-SA 4.0).
6: NPE Responsibility
• PROBLEM: A company (which is an NPE) owns robots (which are
NPEs) that work in a factory. A company (an NPE) manufactures
an autonomous vehicle (an NPE). A company (an NPE)
manufactures a pacemaker (an NPE) and also collects data about
the pacemaker’s system as well as data about the human system
whose the device is embedded in.
• IMPACT: This could become an issue in the future, for example the
case of liability of self-driving car, or a factory robot, that isn’t
directly mapped to an individual supervisor or “driver” but under
corporate or algorithmic control.
Creative Commons license. (CC BY-SA 4.0).
7: Legal Identity of IoT Things
Identity is built into very few IoT devices. There are
no universal standards or regulations around which
IoT objects have an identity assigned at “birth,”
unlike a baby registry or corporate registry.
• Some companies give IoT devices an identity – but legal
identity is not required.
• Some companies keep registries for devices like
pacemakers or jet engines.
GAP: Legal IoT Identity
Creative Commons license. (CC BY-SA 4.0).
8: Tracking & Auditing the Supply Chain
• PROBLEM: Many goods are tracked and audited as they
flow from manufacturer through the supply chain to the
destination. While many goods are tracked with a barcode or
serial number, there is the desire to more thoroughly track
goods in the supply chain, including their components,
sources of raw material, and the chain of custody.
• IMPACT: Lost income due to IP theft. Lost tax revenue.
Potential terrorist financing.
Creative Commons license. (CC BY-SA 4.0).
9: IoT Security Standards
• PROBLEM: Smart homes, surveillance devices, connected
appliances, and vehicles have persistent and structural vulnerabilities
that makes them difficult to secure for many real-world situations.
Many tools are designed with weak security and are vulnerable to “IoT
takeovers.”
• IMPACT: The liability ramifications are largely a matter of speculation,
however we can get an idea of some economic impacts by the size of
the ransomware market estimated at $1b in 2016 and $2b in 2017.
“Securing IoT devices is a major challenge, and manufacturers tend to focus on
functionality, compatibility requirements, and time-to-market rather than security.”
—Interagency Report on Status of International Cybersecurity Standardization
Creative Commons license. (CC BY-SA 4.0).
10: IoT Self-Authentication
• PROBLEM: The technical process of
authenticating the veracity of the IoT device
and any data collected by the IoT device.
• IMPACT: Limits utility to high-exposure IoT
applications, due to economic cost. Attack
surfaces remain due to high cost to implement
broadly.
Creative Commons license. (CC BY-SA 4.0).
11: Data Integrity from IoT Sensors
• PROBLEM: How do I know the data coming off the sensor data is
accurate? There needs to be mechanisms to know data coming off
sensors, drones, and other IoT data-generating devices is reliable
for high-security applications.
• IMPACT: Contamination or distortion of data from smart city
sensors, lightweight devices that control utility grids or operations,
and other cyber-physical systems could do serious real-world
damage if an attack occurred and it took significant time to detect
due to failed monitoring sensors.
Creative Commons license. (CC BY-SA 4.0).
Other Impacts
• Regulation
• Global landscape
• Scale
• Formal ownership
One of the major reasons the Internet+ is so insecure today is the absence of government
oversight. Government is by far the most common way we improve our collective
security, and it is almost certainly the most efficient.
—Bruce Schneier, Click Here to Kill Everyone
Creative Commons license. (CC BY-SA 4.0).
Future: Augmented Identity
• Software taking action on your behalf
• Devices doing things on your behalf
• Data collecting/sharing on your behalf
Do we need more nuanced identity?
Creative Commons license. (CC BY-SA 4.0).
Future: Combined Identity
People create a collective identity that acts in a
unified way as more than the sum of its parts.
• Today’s systems are set up for a single or legal
identity.
• There is no way for a group to create a collective
identity with financial and log in authentication.
• This use case could be used for ad-hoc, temporal
business collaborations like film productions and
creative project based partnerships.
• Could include NPEs.
Creative Commons license. (CC BY-SA 4.0).
Why do we care?
• Liability: who pays when something goes wrong?
• Responsibility: who is responsible at a particular time?
• Regulation: global trend for more regulation
• Collaboration: rising trend to work together
• Future Proof: envision the true scale of the problem
Creative Commons license. (CC BY-SA 4.0).
Future Identity System Goals
• Manage a trillion identities
– And all their relationships
• Thrive in dynamic environment
• Enable delegation
– Between humans & NPEs
• Involve automated systems
• Solve current data, privacy problems
Creative Commons license. (CC BY-SA 4.0).
Thank you + Questions
Heather Vescent
• www.ssiscoop.com
• www.thepurpletornado.com
• heathervescent@gmail.com
• vescent@thepurpletornado.com
• @heathervescent Download NPE: bit.ly/NPEreport
Download VDS: bit.ly/vdsreport
Creative Commons license. (CC BY-SA 4.0).
Entities, Identities, & Registries
Heather Vescent
SSI Meetup | September 2019
Gaps in Corporate and IoT Identity
Creative Commons license. (CC BY-SA 4.0).

Mais conteúdo relacionado

Mais procurados

Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
SSIMeetup
 

Mais procurados (20)

Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 

Semelhante a All you need to know about SSI for Corporates and IoT – Heather Vescent

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
 
Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01
Red Morley Hewitt
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
sheronlewthwaite
 

Semelhante a All you need to know about SSI for Corporates and IoT – Heather Vescent (20)

Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01Applied Blockchain - May 2020 - Issue 01
Applied Blockchain - May 2020 - Issue 01
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
 
Strategic Patent Monetization 4Q 2015
Strategic Patent Monetization 4Q 2015Strategic Patent Monetization 4Q 2015
Strategic Patent Monetization 4Q 2015
 

Último

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 

All you need to know about SSI for Corporates and IoT – Heather Vescent

  • 1. Entities, Identities, & Registries Heather Vescent SSI Meetup | September 2019 Gaps in Corporate and IoT Identity Creative Commons license. (CC BY-SA 4.0).
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives
  • 3. Who am I Heather Vescent • CEO, The Purple Tornado Strategic Intelligence Consultancy • Author, Cyber Attack Manual • Author, SSI Report • Filmmaker, 14 Films (IIW Films) • IIW, CCG VC WG Communities • @heathervescent Creative Commons license. (CC BY-SA 4.0).
  • 4. Research Background • Private Sector Digital Identity • Funded by DHS Science & Technology Cybersecurity Division • Researchers: Heather Vescent & Kaliya Young • Download: bit.ly/NPEreport Objective: Research private sector companies digital identity and data privacy processes, with an emphasis on identifying market failures. Creative Commons license. (CC BY-SA 4.0).
  • 5. Current State • Past solutions create today’s problems • New technologies create new opportunities • Onboard of billions of new identities – Humans – Companies – IoT objects (smart things) – Tracking (dumb things) – Robots • New regulations Creative Commons license. (CC BY-SA 4.0).
  • 6. What is a Non-Person Entity Identity? Creative Commons license. (CC BY-SA 4.0).
  • 7. What is a Non-Person Entity Identity? Company (legal entity) Creative Commons license. (CC BY-SA 4.0).
  • 8. Thing (IoT device) What is a Non-Person Entity Identity? Company (legal entity) Creative Commons license. (CC BY-SA 4.0).
  • 9. System (network) Thing (IoT device) What is a Non-Person Entity Identity? Company (legal entity) Creative Commons license. (CC BY-SA 4.0).
  • 10. How many identities? 180 Million Companies 2 Gov + 3 Business IDs 900 million identities 7.7 Billion Humans 34-48% online 2 Gov + 5 Online ID 18-26+ billion identities (FB: 2.38B, G:2+B users) 25-75 billion IoT devices (by 2021) 35 million packages daily shipped/tracked (UPS & FedEx) 9 billion yearly Creative Commons license. (CC BY-SA 4.0).
  • 11. How many identities? 180 Million Companies 2 Gov + 3 Business IDs 900 million identities 7.7 Billion Humans 34-48% online 2 Gov + 5 Online ID 18-26+ billion identities (FB: 2.38B, G:2+B users) 25-75 billion IoT devices (by 2021) 35 million packages daily shipped/tracked (UPS & FedEx) 9 billion yearly ~100 Billion Identities Creative Commons license. (CC BY-SA 4.0).
  • 12. + robot identity? Creative Commons license. (CC BY-SA 4.0).
  • 13. NPEs are given identity (Registries) Creative Commons license. (CC BY-SA 4.0).
  • 14. • Identity is used to create more identifiers Web of Organizational Trust Creative Commons license. (CC BY-SA 4.0).
  • 15. NPE identity requires human identity • Ownership / Liability • Responsibility • Humans take actions for NPEs • NPEs take action for humans • (And collect & share data) Creative Commons license. (CC BY-SA 4.0).
  • 16. Why important to Government? • Governments give legal entities identity • Legal identity is important in many industries o Banking & Finance (KYC, AML, UBO, Beneficiary) o Global Trade • Customs o Internet of Things is growing exponentially • Security of sensors • Authenticity of sensor collected data • Who is responsible/liable when things go wrong? Creative Commons license. (CC BY-SA 4.0).
  • 17. NPE is complex NPE Identities • Relate to each other • Interact with each other • Depend on each other Creative Commons license. (CC BY-SA 4.0).
  • 18. Report identified 11 Market Gaps Corporate NPE Gaps IOT NPE Gaps 1. Legal Identity of Corporations 1. Legal Identity of IoT Things 2. Conclusive Ultimate Beneficial Owner 2. Tracking and Auditing in the Supply Chain 3. Conclusive Verified Corporate Data 3. IoT Security Standards 4. Corporate Delegation 4. IT Self-Authentication 5. Real-Time Verified Identity 5. Data Integrity from IoT Sensors 6. NPE Responsibility Creative Commons license. (CC BY-SA 4.0).
  • 19. 1: Legal Identity of Corporations • PROBLEM: Digitally native identity credentials don’t exist, nor do ways to receive and give verified credentials about an organization’s identity from an authoritative source. • IMPACT: KYC checks are costly and take time. “KYC and associated processes cost the average bank $60m annually.” - Consult Hyperion report Creative Commons license. (CC BY-SA 4.0).
  • 20. 2: Conclusive Ultimate Beneficial Owner • PROBLEM: Finding the Ultimate Beneficial Owner (UBO) of a company is difficult and sometimes impossible. Banks aren’t required by statute to conclusively find a UBO before proceeding, but to make a reasonably good-faith effort to do so. • IMPACT: Hard to quantify the cost but not knowing who a UBO can result in tax fraud, enable criminal and terrorism activities and transactions designed to circumvent sanctions. Creative Commons license. (CC BY-SA 4.0).
  • 21. 3: Conclusive Verified Corporation Data • PROBLEM: There is no standard way to find verified corporate identity data, like legal name, address and jurisdiction along with the identification of authorized delegates who have authority to sign contracts, transfer funds, and take action on behalf of the company – in a digitally native format. • IMPACT: Initial costs (similar to KYC costs) for corporate identity proofing. These costs include accessing outside databases for information, confirming that data, as well as ongoing costs to keep this data current. Creative Commons license. (CC BY-SA 4.0).
  • 22. 4: Corporate Delegation Humans enter into contracts, make financial transactions, and take other actions on behalf of the corporation. There are processes to initiate this delegation, and the need for up-to-date information of who remains authorized. GAP: Real-time verified delegation Creative Commons license. (CC BY-SA 4.0).
  • 23. 5: Real-Time Verified Identity • PROBLEM: Real-time updated identity information associated with corporate accounts, specifically which humans have the authority to take action on behalf of a company on a real-time basis. Current corporate delegation data is updated anywhere from 30 days to 2 years. • IMPACT: One subject matter experts shared a story of CEO fraud, where criminals spear phished a corporate account and convinced CEOs to transfer millions of dollars to the criminal account. Creative Commons license. (CC BY-SA 4.0).
  • 24. 6: NPE Responsibility • PROBLEM: A company (which is an NPE) owns robots (which are NPEs) that work in a factory. A company (an NPE) manufactures an autonomous vehicle (an NPE). A company (an NPE) manufactures a pacemaker (an NPE) and also collects data about the pacemaker’s system as well as data about the human system whose the device is embedded in. • IMPACT: This could become an issue in the future, for example the case of liability of self-driving car, or a factory robot, that isn’t directly mapped to an individual supervisor or “driver” but under corporate or algorithmic control. Creative Commons license. (CC BY-SA 4.0).
  • 25. 7: Legal Identity of IoT Things Identity is built into very few IoT devices. There are no universal standards or regulations around which IoT objects have an identity assigned at “birth,” unlike a baby registry or corporate registry. • Some companies give IoT devices an identity – but legal identity is not required. • Some companies keep registries for devices like pacemakers or jet engines. GAP: Legal IoT Identity Creative Commons license. (CC BY-SA 4.0).
  • 26. 8: Tracking & Auditing the Supply Chain • PROBLEM: Many goods are tracked and audited as they flow from manufacturer through the supply chain to the destination. While many goods are tracked with a barcode or serial number, there is the desire to more thoroughly track goods in the supply chain, including their components, sources of raw material, and the chain of custody. • IMPACT: Lost income due to IP theft. Lost tax revenue. Potential terrorist financing. Creative Commons license. (CC BY-SA 4.0).
  • 27. 9: IoT Security Standards • PROBLEM: Smart homes, surveillance devices, connected appliances, and vehicles have persistent and structural vulnerabilities that makes them difficult to secure for many real-world situations. Many tools are designed with weak security and are vulnerable to “IoT takeovers.” • IMPACT: The liability ramifications are largely a matter of speculation, however we can get an idea of some economic impacts by the size of the ransomware market estimated at $1b in 2016 and $2b in 2017. “Securing IoT devices is a major challenge, and manufacturers tend to focus on functionality, compatibility requirements, and time-to-market rather than security.” —Interagency Report on Status of International Cybersecurity Standardization Creative Commons license. (CC BY-SA 4.0).
  • 28. 10: IoT Self-Authentication • PROBLEM: The technical process of authenticating the veracity of the IoT device and any data collected by the IoT device. • IMPACT: Limits utility to high-exposure IoT applications, due to economic cost. Attack surfaces remain due to high cost to implement broadly. Creative Commons license. (CC BY-SA 4.0).
  • 29. 11: Data Integrity from IoT Sensors • PROBLEM: How do I know the data coming off the sensor data is accurate? There needs to be mechanisms to know data coming off sensors, drones, and other IoT data-generating devices is reliable for high-security applications. • IMPACT: Contamination or distortion of data from smart city sensors, lightweight devices that control utility grids or operations, and other cyber-physical systems could do serious real-world damage if an attack occurred and it took significant time to detect due to failed monitoring sensors. Creative Commons license. (CC BY-SA 4.0).
  • 30. Other Impacts • Regulation • Global landscape • Scale • Formal ownership One of the major reasons the Internet+ is so insecure today is the absence of government oversight. Government is by far the most common way we improve our collective security, and it is almost certainly the most efficient. —Bruce Schneier, Click Here to Kill Everyone Creative Commons license. (CC BY-SA 4.0).
  • 31. Future: Augmented Identity • Software taking action on your behalf • Devices doing things on your behalf • Data collecting/sharing on your behalf Do we need more nuanced identity? Creative Commons license. (CC BY-SA 4.0).
  • 32. Future: Combined Identity People create a collective identity that acts in a unified way as more than the sum of its parts. • Today’s systems are set up for a single or legal identity. • There is no way for a group to create a collective identity with financial and log in authentication. • This use case could be used for ad-hoc, temporal business collaborations like film productions and creative project based partnerships. • Could include NPEs. Creative Commons license. (CC BY-SA 4.0).
  • 33. Why do we care? • Liability: who pays when something goes wrong? • Responsibility: who is responsible at a particular time? • Regulation: global trend for more regulation • Collaboration: rising trend to work together • Future Proof: envision the true scale of the problem Creative Commons license. (CC BY-SA 4.0).
  • 34. Future Identity System Goals • Manage a trillion identities – And all their relationships • Thrive in dynamic environment • Enable delegation – Between humans & NPEs • Involve automated systems • Solve current data, privacy problems Creative Commons license. (CC BY-SA 4.0).
  • 35. Thank you + Questions Heather Vescent • www.ssiscoop.com • www.thepurpletornado.com • heathervescent@gmail.com • vescent@thepurpletornado.com • @heathervescent Download NPE: bit.ly/NPEreport Download VDS: bit.ly/vdsreport Creative Commons license. (CC BY-SA 4.0).
  • 36. Entities, Identities, & Registries Heather Vescent SSI Meetup | September 2019 Gaps in Corporate and IoT Identity Creative Commons license. (CC BY-SA 4.0).