Title: Identity Security Time to Share
1Identity SecurityTime to Share
- Nicolas PoppVeriSignMM/DD/YY - Session Code 22
pt Arial
2Identity SecurityTime to Share
- Nicolas PoppVeriSignMM/DD/YY - Session Code 22
pt Arial
3The Internet Is Real and Global
Source Morgan Stanley
4Yet, Its Only the Beginning
Digital ()
Total
1.3
Media Entertainment
1.3t
5.5
2005
VoIP Access Lines
180m Lines
4.5
Supply Chain
17.8b
6.0
381.7b
Advertising
2005
8.0
2.2t
Retail Commerce
14.1
Internet
6.4b Total Population
2005
29.4
7.1b Total Lines
Wireless
Sources 2006 Forrester, PwC, IDC, In-Stat,
eMarketer, TIA and VeriSign
5What Could Go Wrong?
Meet Wicked Rose
Young Methodical Global for Hire!
6The Internet Makes It Easier to Steal
7Consumers Make It Harder to Secure
More convenienceLess Security!
8The Good Guys Are Not Working Together
- Geo-Political Boundaries
- Identity Silos
- Point Solutions
- Global Threat
- Target Rich Environment
- Multi-Faceted Attacks
9Meanwhile, The Bad Guys Are Innovating
WEB (Google Adwords Phishing)
EMAIL (Pump and Dump)
DESKTOP (MetaFisher Bot)
10Operating Intelligent and Global Infrastructures
- Professional grad command center
- Controls bots across the world and allows
targeted attacks - Infrastructure can be rented by the hour!
11Running Well-Oiled Businesses
Discount Pricing
Online Marketplace
Money Mules
12And Theyre Coming After You!
- ID Theft Rapidly Growing
- 10M Adults victimized
- 15B in total losses
- 50 Million accounts compromised
- 25 Year to year Growth
13Raising the Identity Security Bar
The Four Pillars of Successful Identity Security
Solutions
1. CONVENIENT
2. GLOBAL
- The security that we introduce must not disrupt
the convenience of the Internet
- We need to move away from point solution and
apply a global infrastructure approach
4. COLLABORATIVE
3. COMPREHENSIVE
- Bad guys always move to the weakest link. The
user, the desktop, site front-end and backend
must be strengthened
- No one can do it alone. The industry needs to
take a collaborate and fraud intelligence must be
shared across boundaries
14Anyone Would Dare Trying?
- Critical internet infrastructure operator (DNS
and SSL) - Recognized and trusted by millions of Internet
users - Security provider to financial institutions and
online merchants
15Introducing VeriSign Identity Protection (VIP)
Intelligent Infrastructure for ID Protection
VIP Authentication
VIP Fraud Detection
VIP Network
Two complementary services enhanced by a Network
Effect
16An Idea Inspired by the Offline World
- An ATM card works across all the Banks on the
Cirrus Network
- An ATM card works across all the Banks on the
Cirrus Network - A VIP Device Works Across all the Web sites on
the VIP Network
Need fraud intell sharing
17 A Demo Speaks More than Thousand Words
- Convenient
- Comprehensive
- Global
- Collaborative
Identity Protection Infrastructure
18Global and Sharing Communities
3M Accounts
100M Accounts
200M Users
181M Registered
Shared VIP Authentication Network
19Industry Collaboration
20Conclusion It Is Time to Share!
- Fraud and the fear of fraud are significant
long-term threats to Internet growth - News solutions must emerge that are adapted to
the challenge - Consumer-centric
- Layered defense
- Global approach
- The identity silos and the industry must come
together
21Identity SecurityTime to Share
- Nicolas PoppVeriSignMM/DD/YY - Session Code 22
pt Arial
22Identity SecurityTime to Share
- Nicolas PoppVeriSignMM/DD/YY - Session Code 22
pt Arial