1 / 22

Identity Security Time to Share

Identity Security Time to Share. Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial. Identity Security Time to Share. Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial. 1. 180. 2. 1b Internet users, 75% non-U.S. 2b wireless subscribers. 180m global broadband subscribers.

aideen
Download Presentation

Identity Security Time to Share

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity SecurityTime to Share Nicolas PoppVeriSignMM/DD/YY - Session Code: 22 pt Arial

  2. Identity SecurityTime to Share Nicolas PoppVeriSignMM/DD/YY - Session Code: 22 pt Arial

  3. 1 180 2 1bInternet users, 75% non-U.S. 2bwireless subscribers 180mglobal broadband subscribers 70 60 70mChinese Internet users < 30 70%+ 60miPods 1 70%+Korean broadband penetration 1b cumulative iTunes 100 34 100mMySpace users 100 34m active blogs 100mSkype users The Internet Is Real and Global Source: Morgan Stanley

  4. Yet, It’s Only the Beginning Digital (%) Total 1.3% Media & Entertainment $1.3t 5.5% 2005 VoIP Access Lines 180m Lines 4.5% Supply Chain $17.8b 6.0% $381.7b Advertising 2005 8.0% $2.2t Retail Commerce 14.1% Internet 6.4b Total Population 2005 29.4% 7.1b Total Lines Wireless Sources 2006: Forrester, PwC, IDC, In-Stat, eMarketer, TIA and VeriSign

  5. Fraudand theFear of Fraud 42% online shoppers more nervous about attacks: More cautious where purchasing goods online 72% More careful entering sensitive data on sites 62% Buying fewer items than otherwise would 33% What Could Go Wrong? Meet “Wicked Rose” Young Methodical Global for Hire!

  6. From dumpster diving to global and massive ID thefts The Internet Makes It Easier to Steal

  7. Anywhere Mobility Anytime Information Any Channel Entertainment Any Device Communication Any Product Consumption Any Me Lifestyle Consumers Make It Harder to Secure More convenience…Less Security!

  8. The Good Guys Are Not Working Together • Geo-Political Boundaries • Identity Silos • Point Solutions • Global Threat • Target Rich Environment • Multi-Faceted Attacks

  9. Take Home:Multi-Faceted Meanwhile, The Bad Guys Are Innovating WEB(Google Adwords Phishing) EMAIL (Pump and Dump) DESKTOP (MetaFisher Bot)

  10. Professional grad command center Controls bots across the world and allows targeted attacks Infrastructure can be rented by the hour! Take Home:HighlySophisticated Operating Intelligent and Global Infrastructures

  11. Take Home:HighlyOrganized Running Well-Oiled “Businesses” Discount Pricing Online Marketplace Money Mules

  12. Are You Scared Yet? And They’re Coming After You! • ID Theft Rapidly Growing • 10M Adults victimized • $15B in total losses • 50 Million accounts compromised • 25% Year to year Growth

  13. Raising the Identity Security Bar The Four Pillars of Successful Identity Security Solutions #1. CONVENIENT #2. GLOBAL The security that we introduce must not disrupt the convenience of the Internet We need to move away from point solution and apply a global infrastructure approach #3. COMPREHENSIVE #4. COLLABORATIVE Bad guys always move to the weakest link. The user, the desktop, site front-end and backend must be strengthened No one can do it alone. The industry needs to take a collaborate and fraud intelligence must be shared across boundaries

  14. Anyone Would Dare Trying? • Critical internet infrastructure operator (DNS and SSL) • Recognized and trusted by millions of Internet users • Security provider to financial institutions and online merchants

  15. Introducing VeriSign Identity Protection (VIP) Intelligent Infrastructure for ID Protection VIP Fraud Detection VIP Authentication VIP Network Two complementary services enhanced by a “Network Effect”

  16. An Idea Inspired by the Offline World • An ATM card works across all the Banks on the Cirrus Network • A VIP Device Works Across all the Web sites on the VIP Network • An ATM card works across all the Banks on the Cirrus Network Need fraud intell sharing

  17. A Demo Speaks More than Thousand Words • Convenient • Comprehensive • Global • Collaborative Identity Protection Infrastructure

  18. Global and Sharing Communities 3M Accounts 100M Accounts 181M Registered 200M Users Shared VIP Authentication Network

  19. Industry Collaboration

  20. Conclusion: It Is Time to Share! • Fraud and the fear of fraud are significant long-term threats to Internet growth • News solutions must emerge that are adapted to the challenge • Consumer-centric • Layered defense • Global approach • The identity silos and the industry must come together

  21. Identity SecurityTime to Share Nicolas PoppVeriSignMM/DD/YY - Session Code: 22 pt Arial

  22. Identity SecurityTime to Share Nicolas PoppVeriSignMM/DD/YY - Session Code: 22 pt Arial

More Related