1
T
FINGERPRINT
SEC
U
FA
BIOME
TOKEN
RBA
ACTIVE
FINGERPRINT
SECURE
ELEMENT
NFC
BIOMETRIC
PIN
RBA
SILEFINGERPRINT
ELEME
NFFACE
BIOMETRIC
TOKENACTIVE
SILE
ELEMENT
USB
FACE
PIN
TOK
RBA
PASSIVE
SILEN
FINGERPRINT
VOICEUSB
BIOMETRIC
TPM
VOICE
NFC
FACE
TPM
FINGERPRINT
NFC
USB
RBA
ACTIV
TP
FINGERPRINT
SECURE
NFC
FACE
RBA
PASSIVE
SILENT
TPM
FINGERPRINT
VOICE
ELEMENT
ACTIVE
BIOMETRIC
PIN
PASSIVE
SILENT
TPM
FINGERPRINT
SECURE
ELEMENT
NFC
PIN
TOKEN
PASSIVE
FINGERPRINT
VOICE
SECURE
E
TOKEN
R
VOICE
SECURE
NFC
TOKEN
TPM
PIN
RBA
FINGERPRINT
SECURE
NFC
USB
VOICE
NFC
PASSIVE
USB
TOKEN
PASSIVE
TPM
SECURE
ELE
FACE
BIOMETRIC
ACTIVE
SECURE
USB
ACTIVE
TPM
VOICE
NFC
USB
FACE
PIN
RBA
ACTIVE
TPM
SECURE
ELEMENT
PIN
RBA
SILENT
USB
PIN
SILENT
ELEMENT
NFC
FINGERPRINT
USB
TPM
VOICE
RBA
PASSIVE
ACTIVE
TPM
SECURE
USB
FACE
ACTIVE
VOICE
PIN
PASSIVE
TPM
FINGERPRINT
RBA
ACTIVE
TPM
ELEMENT
ACTIVE
SILENT
TPM
USB
RBA
SECURE
BIOMETRIC
PIN
SILENT
TPM
VOICE
USB
PIN
USB
FACE
BIOMETRIC
NFC
TOKEN
RBA
PIN
RBA
SILENT
FACE
RBA
PASSIVE
ACTIVE
SILENT
TPM
FINGERPRINT
RBA
ACTIVE
TPM
TOKEN
ACTIVE SILENT
VOICE
USB
FACE
PIN
RBA
ACTIVE
SILENT
RBA
VOICE
NFC
USB
ACTIVE
TPM
BIOMETRIC
TOKENTPM
FACE
TOKEN
PASSIVE
PIN
TPM
TPM
FACE
TPM
FACE
PASSIVE
SILENT
BIOMETRIC
SECURE
PIN
PASSIVE
SILENT
VOICE
USB
PIN
TOKEN
PASSIVE
NFC
BIOMETRIC
RBA
SILENT
TPM
SECURE
VOICE
USB
USB
FACE
SILENT
SECURE
PIN
SILENT
ELEMENT
USB
FACE
VOICE
USB
SECURE
FACE
PIN
FINGERPRINT
SILENT
PIN
BIOMETRIC
TPM
USB
FACE
ELEMENT
TPM
VOICE
SILENT
USB
RBA
SILENT
TPM
VOICE
FACE
PASSIVE
PIN
TOKEN
ACTIVE
USB
PASSIVE
USB
FACE
TPM
PASSIVE
SECURE
USB
TPM
FACE
PIN
RBA
NFC
USB
RBA
ACTIVE
NFC
USB
PIN NFC
SILENT
VOICE
FACE
PIN
RBA
PASSIVE
NFC
USB
PIN
TPM
PASSIVE
PIN
USB
TPM
NFC
USB
FACE SILENT
FINGERPRINT
USB
USB
USB
TPM
FACE
TPM
USB
PIN
FACE
USB
FACE
USB
NFC
FACE
TPM
PIN
FACE
FACE
USB
TPM
NFC
RBA
USB
PIN
PIN
TPM
USB
RBA
RBA
PIN
USB
USB
USB
USB
NFC
FACE
PIN
NFC
VOICE
USB
USB
USB
TPM
USB
USB
TPM
FACE
NFC
RBA
USB
FACE
PIN
VOICE
USB
USB
USB
RBA
TPM
NFC
USB
TPM
USB
USB
USB
TPM
FACE
USB
FACE
USB
TPM
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
MOBILESECURITY,IDENTITY&AUTHENTICATION
REASONSFOROPTIMISM
RAJIVDHOLAKIA
VPPRODUCTS
RAJIV@NOKNOK.COM
SECURITY IN PERSPECTIVE:
Its like drinking water from the tap in 1800s
NOK NOK LABS 2
Pills, Potions & Spells vs. Chlorination
PURPOSE OF SECURITY
Device Integrity Network Integrity
OS & App Integrity User Integrity
Data & Transaction
Integrity
(and Privacy where appropriate)
3
SECURITY NEEDS TO SPAN LINKS
4
Integrity
User Hardware OS/App Network Service
NOK NOK LABS
USERINTEGRITY:THEGLOBALAUTHENTICATIONPROBLEM
5
Fear Frustration
and Friction
40#million#credit#cards##
Cost:#$148M#USD#
The problem continues to get BIGGER and more EXPENSIVE
Fraud
Stolen / hacked passwords
leading cause of identity theft
Passwords DO NOT
WORK, especially on
Mobile Devices
Too many accounts and
passwords to remember
Significant commerce
abandonment by users
Personal and Corporate Damage
$#
56#million#credit#cards##
Nok Nok Labs
IDENTITY SERVICES
AUTHENTICATIONINCONTEXT
NOK NOK LABS 6
Physical>to>digital#iden@ty##
User#Management##
Authen@ca@on#
Federa@on#
#
#Single
Sign-On
E>Gov# Payments# Security#
Passwords# Risk>Based#Strong#
MODERN
AUTHENTICATION
Personaliza@on#
Mobile Security Stacks
7
Device&Integrity&
&
&
&
&
&
LAYERED
SECURITY
MODELS
NOK NOK LABS 8
Device#Keys#&#
Cer@ficates#
Crypto#Engines#
Trusted#Execu@on#Environments#
#
Ç√#
Secure#Elements#
Trustlet# Trustlet# Trustlet#
Rich&Opera2ng&System&(e.g.&Android)&
#
#
#
#
#
#
#OS#Par@@on#
User#Par@@on#
#
#
#
App#
Sandbox#
User#
Par@@on#
#
#
#
App#
Sandbox#
App#
Sandbox#
Overlay&Services&
#
#
#
#
#
#
App#Stores#
OS#Integrity#Services#(e.g.#Android#
Safety#Net)#
Site#and#App##Reputa@on/Integrity#
Device#and#Cloud#Data#Managers#
Filter#what#gets#on#
the#device…#
Isolate#the#apps…#
Harden#the#device…##
INTEGRITY MECHANISMS – I
•  TPMs
•  Backwardscompatibility
requirements
•  SEs
•  Limitedduetooperatorcontrols
•  TEEs(TrustedExecutionEnvironments)
•  Thirdtimeisacharm?
•  Secureboot
- Verificationofimage
•  Virtualization
- Hardwareassistedisolation
•  Anti-virus
•  DeviceTheftResponse
- Standardonmobiledevices
9
TEE SE TPM
Hardware OS
NOK NOK LABS
INTEGRITY MECHANISMS – II
10
App User
•  Appverification
- RiseOfTheAppStore
•  AppIsolation
- Appcontainers
- RestrictedIPC
•  ProtectingData&Content
- On-devicedataencryption
- DRM
•  IdentityProofing
- Knowyourcustomer
•  StrongAuthentication
- Explicit&implicit
-  Firstmile&Secondmile
NOK NOK LABS
ISOLATION ARCHITECTURE
ARMTRUSTZONE
11
Secure
OS Boot
FP Sensor
Touchscreen
Storage
1.7 B
ARM Cortex
SoCs Shipped
18 Month
Phone Refresh
Rate
NOK NOK LABS
SECURITY NEEDS TO SPAN LINKS
12
Integrity
Hardware OS App Network User
NOK NOK LABS
So how are doing?
13
SOME EXAMPLES FROM 2014
NOK NOK LABS 14
Infrastructure/Relying#Party#
(Payments#or#other)#
Opera@ng#System#
Hardware#
HOWFIDOWORKSTOSIMPLIFYANDSCALEAUTHENTICATION
userauthenticatestodevice,deviceauthenticatestonetwork
15
Standardized Protocols
Local authentication unlocks
app specific key
Key used to authenticate to
server (unique key per site)
Nok Nok Labs
server&client&
Decoupled&User&Verifica2on&from&Authen2ca2on&Protocol&
ATTACKS
MITIGATED
Remotely#a_acking#central#servers##
steal&data#for#impersona@on#
1#
Physically#a_acking#user#devices##
misuse&them#for#impersona@on#
6#
Physically#a_acking#user#devices#
steal&data#for#impersona@on#
5#
Remotely#a_acking#
lots#of#user#devices#
&
steal&data#for#
impersona@on#
Remotely#a_acking#
lots#of#user#devices#
&
misuse&them#for#
impersona@on#
Remotely#a_acking#
lots#of#user#devices#
&
misuse&
authen-cated&
sessions!
2# 3# 4#
Scalable#a_acks#
Physical#a_acks##
possible#on#lost#or#
stolen#devices#
(≈3%#in#the#US#in#2013)#
User&Coercion#
Not#Scalable#
With#hardening#of#
FIDO##
Authen@cator##
Implementa@ons#–#
mi@gate#remote/
scalable#a_acks#
NOK NOK LABS
SECURITYPROFILESFORAUTHENTICATION
17
Strong Stronger
Security Hardware Integration Spectrum
Software Only
ID
TPM/SE
ID
TEE + SE
ID
Protects Keys
Protects Keys
Protects Crypto
Protects Keys
Protects Crypto
Protects Code
Protects Display
Strongest
NOK NOK LABS
BUILDING AUTHENTICATORS: THREE PROFILES
18
RichOS#
Trusted#
Execu@on#
Environment#
Secure#Element#
Soeware#and#Tamper>Resistant#Hardware#
Cost#to#Acquire#and#Manage#Tokens# Stronger#
Soeware#&#Hardware#
Cost#to#Acquire#and#Manage#Mobile#Device# Stronger#
Soeware#Only#
No#extra#cost# Strong#
NOK NOK LABS
A UNIQUE OPPORTUNITY
19
Hardware Integrity
OS Integrity
App Integrity
Network Integrity
User Integrity
Re-Architect
Computing Using
Hardware-Based Trust
Chain of Trust
Trusted Platform for Authentication
NOK NOK LABS
SUPPORT IN THE FABRIC
• QualcommshippingFIDOsupportinSnapDragon
chipsetsstartingDec2014
• Microsoftdeclares inFeb2015FIDOsupportcoming
toWindows10andaffiliatedservices
• GoogleintendstobringbiometricAPIs&system
keychaintoAndroidM–June2015
• ApplecontinuingtosupportTouchID&system
keychaininiOS–2014-2015
NOK NOK LABS 20
FIDO-CAPABLEMOBILE,TABLET+PCFORECAST
Non-FIDO
FIDO iOS
FIDO Android
FIDO Windows
35#Million,#Aug.#2014#
2.5&Billion,&Dec.&2019&User#Growth#of#70.43%#over#5#
Years#
2016 201920182017
86.73% 93.43% 96.98% 98.61%
6.57%
3.02% 1.39%
2.6BTotal Devices
2.5B Fido Capable
331M iOS Devices
1.1B Android Devices
1.16B Windows Devices
2.08B Total Devices
1.8B Fido Capable
281M iOS Devices
793M Android Devices
724M Windows Devices
2.19B Total Devices
2.05B Fido Capable
298M iOS Devices
945M Android Devices
805M Windows Devices
2.36B Total Devices
2.29B Fido Capable
315M iOS Devices
942M Android Devices
1.04B Windows Devices
13.27%
NOK NOK LABS
PULLINGITALLTOGETHER:
NTTDOCOMOLIVEWITHFIDOAUTHENTICATION:May2015
22
Many FIDO Ecosystem Firsts: First Carrier, Multiple OEM Launch at Same Time, First
Federated Identity Solution, First Carrier Billing System, First Iris Sensor, First Chipset
Support
NOK NOK LABS
ONLINEAUTHENTICATIONFORDOCOMOSERVICES
Biometric Authentication from DOCOMO, May 26, 2015
Online#authen@ca@on#using#biometric#informa@on:#
Authen@ca@on#for#docomo#ID#and#carrier#billing#payments
Password>less#biometric#
authen@ca@on
Iris Fingerprint login
Unlock#
devices#
payments#
24
Everything
Authenticates
50 Billion
Connected Devices by 2020:
Internet of Things
People Devices Ecosystems
+ +
Corporate Networks
Mobile Commerce
Mobile Payments
Social Networks
eHealth
Consumer Use Cases
Enterprise Use Cases
HOPEFORSCALINGAHIGHLYCONNECTEDWORLD
NOK NOK LABS
Any Device.
Any Application.
Any Authenticator.
25
T
FINGERPRINT
SEC
U
FA
BIOME
TOKEN
RBA
ACTIVE
FINGERPRINT
SECURE
ELEMENT
NFC
BIOMETRIC
PIN
RBA
SILEFINGERPRINT
ELEME
NFFACE
BIOMETRIC
TOKENACTIVE
SILE
ELEMENT
USB
FACE
PIN
TOK
RBA
PASSIVE
SILEN
FINGERPRINT
VOICEUSB
BIOMETRIC
TPM
VOICE
NFC
FACE
TPM
FINGERPRINT
NFC
USB
RBA
ACTIV
TP
FINGERPRINT
SECURE
NFC
FACE
RBA
PASSIVE
SILENT
TPM
FINGERPRINT
VOICE
ELEMENT
ACTIVE
BIOMETRIC
PIN
PASSIVE
SILENT
TPM
FINGERPRINT
SECURE
ELEMENT
NFC
PIN
TOKEN
PASSIVE
FINGERPRINT
VOICE
SECURE
E
TOKEN
R
VOICE
SECURE
NFC
TOKEN
TPM
PIN
RBA
FINGERPRINT
SECURE
NFC
USB
VOICE
NFC
PASSIVE
USB
TOKEN
PASSIVE
TPM
SECURE
ELE
FACE
BIOMETRIC
ACTIVE
SECURE
USB
ACTIVE
TPM
VOICE
NFC
USB
FACE
PIN
RBA
ACTIVE
TPM
SECURE
ELEMENT
PIN
RBA
SILENT
USB
PIN
SILENT
ELEMENT
NFC
FINGERPRINT
USB
TPM
VOICE
RBA
PASSIVE
ACTIVE
TPM
SECURE
USB
FACE
ACTIVE
VOICE
PIN
PASSIVE
TPM
FINGERPRINT
RBA
ACTIVE
TPM
ELEMENT
ACTIVE
SILENT
TPM
USB
RBA
SECURE
BIOMETRIC
PIN
SILENT
TPM
VOICE
USB
PIN
USB
FACE
BIOMETRIC
NFC
TOKEN
RBA
PIN
RBA
SILENT
FACE
RBA
PASSIVE
ACTIVE
SILENT
TPM
FINGERPRINT
RBA
ACTIVE
TPM
TOKEN
ACTIVE SILENT
VOICE
USB
FACE
PIN
RBA
ACTIVE
SILENT
RBA
VOICE
NFC
USB
ACTIVE
TPM
BIOMETRIC
TOKENTPM
FACE
TOKEN
PASSIVE
PIN
TPM
TPM
FACE
TPM
FACE
PASSIVE
SILENT
BIOMETRIC
SECURE
PIN
PASSIVE
SILENT
VOICE
USB
PIN
TOKEN
PASSIVE
NFC
BIOMETRIC
RBA
SILENT
TPM
SECURE
VOICE
USB
USB
FACE
SILENT
SECURE
PIN
SILENT
ELEMENT
USB
FACE
VOICE
USB
SECURE
FACE
PIN
FINGERPRINT
SILENT
PIN
BIOMETRIC
TPM
USB
FACE
ELEMENT
TPM
VOICE
SILENT
USB
RBA
SILENT
TPM
VOICE
FACE
PASSIVE
PIN
TOKEN
ACTIVE
USB
PASSIVE
USB
FACE
TPM
PASSIVE
SECURE
USB
TPM
FACE
PIN
RBA
NFC
USB
RBA
ACTIVE
NFC
USB
PIN NFC
SILENT
VOICE
FACE
PIN
RBA
PASSIVE
NFC
USB
PIN
TPM
PASSIVE
PIN
USB
TPM
NFC
USB
FACE SILENT
FINGERPRINT
USB
USB
USB
TPM
FACE
TPM
USB
PIN
FACE
USB
FACE
USB
NFC
FACE
TPM
PIN
FACE
FACE
USB
TPM
NFC
RBA
USB
PIN
PIN
TPM
USB
RBA
RBA
PIN
USB
USB
USB
USB
NFC
FACE
PIN
NFC
VOICE
USB
USB
USB
TPM
USB
USB
TPM
FACE
NFC
RBA
USB
FACE
PIN
VOICE
USB
USB
USB
RBA
TPM
NFC
USB
TPM
USB
USB
USB
TPM
FACE
USB
FACE
USB
TPM
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
Appendix
26NOK NOK LABS
BENEFITSOFTHEFIDOAPPROACH
27
PrivacySecurityUser
Experience
AuthenticateAuthenticate
Requirements for next generation authentication
Public/private keys
instead of passwords
Fraud Reduction
Unified Auth
Infrastructure#
Natural and faster
authentication
Use authentication method
of choice
User& Device& Service&
User information stays
on device
Not stored on servers
that can be
compromised
Cost
Standards -Based
Adaptable infrastructure
Future-proofed and
flexible
Scalability
NOK NOK LABS

More Related Content

PDF
Defcon 22-weston-hecker-burner-phone-ddos
PDF
Leveraging Fingerprint Verification on Mobile Devices
PDF
Securing Your Wearable Tech Brand
PDF
Android voip mobile dialer
PPTX
Android voip mobile dialer
PDF
Technical Overview of FIDO Solution
PDF
Securing the Network, por Ricardo Ross
PPS
The Future Of Cell Phones In The Business
Defcon 22-weston-hecker-burner-phone-ddos
Leveraging Fingerprint Verification on Mobile Devices
Securing Your Wearable Tech Brand
Android voip mobile dialer
Android voip mobile dialer
Technical Overview of FIDO Solution
Securing the Network, por Ricardo Ross
The Future Of Cell Phones In The Business

What's hot (18)

PDF
The Guardian Project
PDF
Frontier_Control_UnDok-App_PB
PDF
In vue ir2_key_infosheet
PDF
(Pdf) yury chemerkin _confidence_2013
PPSX
PDF
Stealth Mango and the Prevalence of Mobile Surveillanceware
PPTX
Nuron VoIP Application Product and Solution
PDF
Top Biometric Identifiers: Risks & Rewards
PPTX
Flak+technologies
PDF
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PDF
Holoptica Group Presentation
PDF
Droidcon2013 key2 share_dmitrienko_fraunhofer
PDF
u2f fido security key
PDF
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
PDF
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
PDF
Moxtra Developer Open House - Bangalore
PDF
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
PDF
Assurity seminar 24 jan
The Guardian Project
Frontier_Control_UnDok-App_PB
In vue ir2_key_infosheet
(Pdf) yury chemerkin _confidence_2013
Stealth Mango and the Prevalence of Mobile Surveillanceware
Nuron VoIP Application Product and Solution
Top Biometric Identifiers: Risks & Rewards
Flak+technologies
PRIV Security: How BlackBerry PRIV Safeguards Your Data
Holoptica Group Presentation
Droidcon2013 key2 share_dmitrienko_fraunhofer
u2f fido security key
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina Ehrensvard
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Moxtra Developer Open House - Bangalore
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
Assurity seminar 24 jan
Ad

Similar to Mobile security, identity & authentication reasons for optimism 20150607 v2 (20)

PDF
New Trends in Mobile Authentication
PDF
CIS14: Building Blocks for Mobile Authentication and Security
PDF
Market Study on Mobile Authentication
PDF
Strong Authentication (Michal Sobiegraj)
PDF
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
PDF
'A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem'
PDF
Deploying FIDO Authentication - Business Considerations
PDF
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
PDF
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
PDF
AET63 product presentation by Advanced Card Systems Ltd.
PDF
Mobile Authentication - Moving Towards a Passwordless Future
PPTX
Technical Principles of FIDO Authentication
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
PDF
Technical Principles of FIDO Authentication
PDF
Technical Principles of FIDO Authentication
PPT
Authentication
PPTX
Hardware Authentication
PPTX
Authentifusion: Clarifying the Future of User Authentication
PPTX
Authentifusion: Clarifying the Future of User Authentication
New Trends in Mobile Authentication
CIS14: Building Blocks for Mobile Authentication and Security
Market Study on Mobile Authentication
Strong Authentication (Michal Sobiegraj)
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
'A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem'
Deploying FIDO Authentication - Business Considerations
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
AET63 product presentation by Advanced Card Systems Ltd.
Mobile Authentication - Moving Towards a Passwordless Future
Technical Principles of FIDO Authentication
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
Technical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
Authentication
Hardware Authentication
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton

Mobile security, identity & authentication reasons for optimism 20150607 v2