FIDO at Cloud Identity Summit 2016
June 6 @ 12:00 am – June 9 @ 11:59 pm
Hosted and coordinated by FIDO member Ping Identity, Cloud Identity Summit is the leading identity industry event. Since 2010, CIS has brought together the best of industry and enterprise presenters and experts to share insights and to synthesize new ideas. Delegates get to hear true thought leadership grounded in profound knowledge of real-world identity and security trends, challenges and solutions. Participation from anyone in the identity, security and adjacent industries is welcome and encouraged: Solutions are improved, standards are strengthened, and customers and end-users are better served when the industry collaborates to share learning, discovery and vision.
FIDO will be holding a workshop (“FIDO Alliance Summit”) on the morning of Monday, June 6, and as a Gold Sponsor will also be showcasing a FIDO Pavilion featuring several FIDO members. Lastly, FIDO is happy to Sponsor the “Next Generation Authentication” track, which takes place on Thursday June 10 and is chaired by Yubico’s John Fontana.
More details follow below:
FIDO Alliance Summit: Monday, June 6, 09:00 – 12:00 CST
Speakers: Brett McDowell, Jerrod Chong, Darren Platt, Christiaan Brand, Jeremy Grant, Janet Hughes, Mike Garcia
Join FIDO for a workshop session at the Cloud Identity Summit. This FIDO Alliance summit will give attendees an in-depth feel for how FIDO streamlines the strong authentication process while also protecting user privacy – and will also touch on key policy, product, and deployment updates.
FIDO Workshop Agenda:
|9:00 am – 9:30 am||Welcome & Introduction to FIDO Alliance||Brett McDowell, FIDO Alliance|
|9:30 am – 10:05 am||FIDO Specifications Overview||Jerrod Chong, Yubico|
|10:05 am – 10:30 am||FIDO in Enterprise||Darren Platt, RSA|
|10:30 am – 10:45 am||Networking Break|
|10:45 am – 11:15 am||Google Case Study: “Becoming Unphishable with FIDO”||Christiaan Brand, Google|
|11:15 am – 11:55 am||FIDO in Policy & Government Panel||Jeremy Grant, Chertoff Group; Mike Garcia, NIST; Janet Hughes, GOV.UK Verify|
|11:55 am – 12:00 pm||Wrap-up||Brett McDowell, FIDO Alliance|
Introduction to FIDO Authentication from FIDO Alliance
FIDO Specifications Tutorial from FIDO Alliance
Enterprise Adoption of FIDO Authentication from FIDO Alliance
Google Case Study: Becoming Unphishable from FIDO Alliance
FIDO in Government from FIDO Alliance
Next-Generation Authentication Track
FIDO Recipe for Strong Authentication
Monday June 6, 4:50 – 5:15 PM | SPEAKER: Jerrod Chong
The FIDO Alliance promises simpler, stronger authentication, which begs the question: How? Built around public key cryptography, FIDO speaks to both a passwordless and second-factor experience. We’ll review FIDO’s solid foundational underpinnings, and spend time examining use cases addressed today. We’ll look at large FIDO deployments and what measure of success they are having? We’ll talk about future directions for FIDO and answer your questions.
From static to mobile: Evolutions in Authentication
Thursday June 9, 9:30 AM – 9:55 AM | SPEAKER: Stina Ehrensvard, Yubico
Fernando Corbato invented the password in the 1960s. Since then, not much has changed with what is now the weakest security construct known to networking. Modern and multi-factor authentication is aiming to change that. The landscape now includes OTPs, USB tokens, and biometrics. Enter mobile devices and wearables and authentication options further evolve. If you believe there is no silver bullet (psst, there never is), then you’ll want to hear the pros and cons of modern authentication, and learn today’s best pairings of authentication type and use case for consumers and enterprises.
Biometric Authentications: Theory and Practice
Thursday June 9, 10:00 AM – 10:35AM | SPEAKER: Elaine Newton, NIST
One of the greatest challenges for implementing biometric authentication is deploying safeguards to avoid presentation attacks, commonly known as biometric spoofing. This is especially true in uncontrolled environments where there is not an operator monitoring the placement or capture of a biometric. There are multiple ways to mitigate the risk of a successful presentation attack. The class of methods created to directly counter spoof/artefact attempts at the biometric sensor are known as presentation attack detection (PAD). Examples of PAD include artefact detection (AD) and liveness detection (LD). This talk will cover an introduction to biometric authentication, biometric performance testing history, and a prospective look at evaluating the security of biometric authentication.
Panel: IAM Standards: Please Pass The Glue
Thursday June 9, 10:40 AM – 11:05 AM | SPEAKERS: Brett McDowell, FIDO Alliance, Don Thibeau, Open ID Foundation, Mark Diodati, Gartner John Fontana, Yubico
Individual standards targeted at core identity and access management functions are closer to coalescing than at any other time in history. Explore emerging connections among standards efforts and vertical interests such as governments, education and enterprises including OAuth derivatives including OpenID Connect, FIDO, W3C standards, IETF, and NSTIC. The ultimate goal is Internet IAM that is distributed, decentralized, federated and scalable. What’s real today and what’s standing in the way?
FIDO Pavilion on CIS Show Floor
If you attend CIS you’ll also want to be sure to stop by the FIDO Pavilion on the show floor featuring FIDO members Bluink, Hypersecu Information Systems, Ledger, Nok Nok Labs, Nymi, and SurePassID. This is your chance to learn about secure authentication practices directly from those developing and deploying FIDO Certified solutions.
More information: https://www.cloudidentitysummit.com/en/events.html
Bluink is the company behind Injector phone as a token technology. Login to everything using your smartphone; applying biometrics, geofencing, password management, OTP and FIDO U2F. Secure your enterprise today with BYOD phone a a token solutions from Bluink.
Hypersecu Information Systems, Inc. offers various PKI, OTP, FIDO U2F, and smart card based technologies to deliver strong multi-factor authentication and software copyright protection. Standing at the forefront of technology, we provide both off-the-shelf and custom-made products and services. Our competitive TCO means everyone can afford the security they deserve.
Ledger is a hardware security company designing the next generation of secure embedded devices. The company has deployed a popular security solution for the Bitcoin industry and recently introduced Ledger Blue, an enterprise signing device for a wide range of applications such as strong authentication (FIDO), data integrity and privacy.
Nok Nok Labs is the leading provider of strong, FIDO-based authentication to organizations with internet-scale mobile and web applications requiring improved user engagement and security. Nok Nok Labs’ S3 Suite software allows organizations to rapidly deliver multifactor authentication that improves user engagement while reducing fraud and deployment complexity.
Learn more about the Nymi Band™ – a wearable, multi-factor authenticator built to support FIDO’s U2F protocol – that can be used with any application, device or service for strong authentication. With the Nymi Band, today’s model of authentication can be transformed into a secure and convenient experience for enterprises.
SurePassID’s nextgeneration security solutions are the fastest, most costeffective path to mobile app security. We deliver an omnichannel solution that protects user accounts at every level by leveraging the new FIDO standard to deliver convenient, passwordless twofactor authentication. The result is a frictionless experience that differentiates your offering, increases customer trust, and eliminates account takeover fraud.