Trusted Identities That Drive Global Commerce
|
|
- Laurence Walker
- 5 years ago
- Views:
Transcription
1 Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance & Operational Risk Management in a borderless world of ubiquitous high capacity electronic networks spanning Public & Private Sectors, product verticals & industry sectors 2 nd December 2014 John G Bullard
2 Galls Law- the Trust Network is a classic illustration of this. A complex system that works is invariably found to have evolved from a simple system that worked. The Inverse also appears to be true. A complex system designed from scratch never works, and cannot be made to work. You have to start over again, beginning with a working simple system. Quote from John Gall s publication Systemantics: How Systems Really Work and How They Fail Copyright 2014 IdenTrust, Inc. All Rights Reserved. 2
3 What, exactly, do we mean by trusted eidentity? Having absolute certainty of who you are interacting with Being able to check/validate that this is, indeed, the case Knowing who guarantees the identity of the individual Being a real name, not just a number Having complete trus to act on their instructions Having a transparent audit trail of who did what, and when Seeing eid as a key component to limiting liability and external exposures Copyright 2014 IdenTrust, Inc. All Rights Reserved. 3
4 And yet Today we have Solutions defined by national boundaries, which cannot operate outside? Solutions defined for a single Industry vertical? (e.g. Pharma, Aerospace, Insurance, or Nationstate governments ) Solutions defined by a product/an application? (e.g. Payments Only einvoicing only or Logistics only ) Should we not have an approach which can cover the convergence of all 3 circles Copyright 2014 IdenTrust, Inc. All Rights Reserved. 4
5 Why is this subject of significant interest to Business, to Governments and to their Banks? Buyer Find Trading Partner Bid/ Selection Obtain Credit Contracts/ Purchase Order einvoicing Logistics Pay / Settle Online Trust is essential at each stage Seller Find Trading Partner Offer/ Accept Assess Credit Contracts/ Purchase Order einvoicing Logistics Pay / Settle Banks Traditional Trust /Assurance Role in payments can be leveraged Copyright 2014 IdenTrust, Inc. All Rights Reserved. 5
6 The model is evolutionary. Think of 1970 s creation of the Card Schemes or historical cheque clearing schemes Card Issuer Card Authorization Certificate Issuer Certificate Validation Card Holder Merchant Certificate Holder Relying Party Trusted Transactions Powered by Credit Card Associations, e.g. VISA, MasterCard, etc. Trusted Identities Via Trust Network As a Third-Party Enabler that operates the network, uses established standards, and ensures compliance Copyright 2014 IdenTrust, Inc. All Rights Reserved. 6
7 A 4 dimensional approach to Technology with responsibility Aided by lawyers worldwide, banks financed an Operating Rule Set approach to global identity credential management Policy KYC consistency Global regulatory compliance Legal Global contractual framework Contracted liability model Dispute resolution Operational Data centre security Consistent manufacturing process Secure fulfilment process Cross community efficiency Technical Industry-standard technologies Interoperable solution elements Consistent deployment Copyright 2014 IdenTrust, Inc. All Rights Reserved. 7
8 It has a Contract-based legal framework Global Legal Interoperability is possible only in a Contractual System governing Subscribing Customer Relying Customer Customer Agreement Customer Agreement Operating Rules Issuing Participant Relying Participant IdenTrust Root CA Liability and Recourse Among All Parties - Operating Rules bind all players - Customer Agreements bind customers to contractual liability limitations Legal Recognition of Digital Signatures Contract Formation Electronically - Signed OCSP validation assures every Relying Party is bound to a customer agreement - Legal effect of digital signatures authenticated by validated certificates provided by contract, globally Dispute Resolution over Signature Validity - Dispute Resolution Procedures provide private forum (London Court of Arbitrage) Technical Standards - Ensures compatibility across the Network - Reduces cost through vendor competition for standard component elements Copyright 2014 IdenTrust, Inc. All Rights Reserved. 8
9 Foundation stone of a multi-use identity and validation layer ebam BACSTel IP SEPA Payment Secure SwiftNet FileAct einvoicing Corporate Portal Messaging and Communications networks Open Standards Messaging and Communications networks Proprietary Standards Corporate (or Government) Entitlements & Privileges Identity Solution and Validation Service Lower cost of ownership and economies of scale are achieved though spreading fixed costs across a larger volume of certificates- Multipurpose certificates have a greater value than single use certificates Improved customer experience through the use of standard authentication methods across the enterprise and Interoperability of certificates both internal and external from the enterprise, and future proofing your investment by building a solution that satisfies future customer supply chain requirements Copyright 2014 IdenTrust, Inc. All Rights Reserved. 9
10 Security By Design end-users bring the applications, the rest is already there why re-invent the wheel?? Certificate Management System Certificate Authority Fulfilment Capability End Users Applications Your applications Industry applications IdenTrust applications Single CMS interface accessing multiple CA s identities on any form-factor issued to your end users for use with multiple applications globally Copyright 2014 IdenTrust, Inc. All Rights Reserved. 10
11 Customer Proposition true interoperability Historic parallels electricity voltages, railroad gauges Secure ERP einvoicing & Trade Mgnt Country Scheme e.g. CNIPA (Italy) BACSTEL-iP (UK) An integrated Identity Solution Electronic Banking Other Applications Single vs. Multiple Platforms Interoperable vs. Point Solution Single vs. Multiple Tokens vs. Cross-border vs. solely Local solution FileAct Identity Solution 1 ERP Identity Solution 2 einvoicing & Trade Mgnt Identity Solution 3 Country Scheme e.g. CNIPA (Italy) Identity Solution 4 BACSTEL-iP (UK) Identity Solution 5 Electronic Banking Identity Solution 6 High vs. Lower RoI A utility. High vs. Low Scalability Copyright 2014 IdenTrust, Inc. All Rights Reserved. 11
12 Copyright 2014 IdenTrust, Inc. All Rights Reserved. 12
13 each usable independently or as part of a broader interconnected Supply Chain structure ACH Payments Corporate Purchasing International Trade Treasury Management Cash Management Insurance contracts Letter of Credit Statement Delivery Electronic Document Delivery Financial Gateway Supply Chain Management Electronic Content Delivery Foreign Exchange Payment Instructions Mortgage and Leasing Enterprise use Government Filings Compliance IdenTrust TN Identity Validation Liability Management Globally interoperable Legally enforceable Copyright 2014 IdenTrust, Inc. All Rights Reserved. 13
14 Banks highly regulated entities manage and mitigate Risk, whether as Intermediaries or Agents, in 3 areas Operational Risk Management Transactional e.g. national and global payments and settlement functions Credit Markets Risk Management i.e acceptance of deposits and making loans Capital/Wholesale Markets Risk Management. Banks trade on their own behalf or for customers Trusted eidentities, underpinned by strong KYC processes, are essential for each area of Risk Management Copyright 2014 IdenTrust, Inc. All Rights Reserved. 14
15 To be of real value, there must be clarity on two distinct issues for eid/esignatures 1. What aspects of Identity will be managed? 2. Who will be covered by the identity management solution? Policy Multiple Communities of Interest Multiple legal jurisdictions Level of Effort/Complexity Legal & Liability Operations Tech Level of Effort/Complexity Multiple Communities of Interest Community of Interest Internal Copyright 2014 IdenTrust, Inc. All Rights Reserved. 15
16 So, a Trust Network solution to esignatures was developed for a world of increasingly ubiquitous free and open networks An Identity Community where Banks issue identity credentials usable in more than 100 countries The scheme runs an identity validation network that is scalable, self-routing, real-time and highly secure The scheme provides tools to embed identity into existing applications To do this, the Scheme provides Operating Rules for Common global standards (using established open standards) A global and scalable network, not dependent on multiple bi-lateral contracts An application framework which is open to all Application providers The effect of this is that the end user whether that is a Government employee, a company employee, or an individual citizen in their personal capacity can present that identity electronically within an overall framework where roles, liabilities and consequences are understood Copyright 2014 IdenTrust, Inc. All Rights Reserved. 16
17 Company History Formed in 1998, IdenTrust is a Bank-Built, Full-Service Identity Solutions Provider Built by banks, for bank, regulator-grade the identity gold standard Global interoperable identity scheme (Trust Network) User-level non-repudiation, legally enforceable Regulator-grade identity vetting Single identity, multiple uses, any form-factor (hardware or software based identities) - Member banks issue identity credentials usable in more than 172 countries Proven record of delivering bank-grade strong authentication (Trust Gate) Used across 6+ billion transactions annually No data or infrastructure compromise in the ten years of platform operation Multiple fulfilment options Proven supplier of outsourced PKI hosting services with a compelling and proven ROI (Trust Infrastructure) Support services based on multiple identity schemes (banking, government, industry and corporate) Used by many of the world s leading financial institutions and multinational corporations 3 million+ certificates issued across all policies Copyright 2014 IdenTrust, Inc. All Rights Reserved. 17
18 The Network is highly scaleable Subscribing Customer Relying Customer Issuing Participant e.g. RBS Relying Participant e.g. Standard Chartered IdenTrust Root CA Copyright 2014 IdenTrust, Inc. All Rights Reserved. 18
19 Bank-issued Trust Network identities fulfill 4 capabilities 1. Access Only - Support better Single Sign-on, with improved controls - Establish two-factor compliance for regulatory purposes - Limit capability to access; no identity, encryption, or electronic signature 2. Authentication - Provide Access control and add use of Digital Signatures to prove identity and deliver non-repudiation - Reduce online fraud - Provide audit and compliance tracking 3. Encryption - Safeguard content and eliminate pharming - Encrypt data while in transit and at rest including supporting format preserving encryption (FPE) - Ensure document and data integrity for electronic documents and forms 4. Electronic Signatures - Replace wet ink signatures - Provide legally-binding user-level signatures - Enable reengineered electronic processes including STP Copyright 2014 IdenTrust, Inc. All Rights Reserved. 19
20 Communities: Localisation Layering of business and application rules on top of Trust to minimize duplication and extend reach as broadly as possible Customer Services Layer 3 3 Individual members deliver competing applications to their customers Layer 2 Rules Service 2 Layer 2 2 Local Communities agree standards and business rules for use of agreed common application. These services operate on top of IdenTrust trust infrastructure Layer 1 PLOT Service 1 Layer 1 1 IdenTrust provides core global IdenTrust Trust Network foundation FI Community Copyright 2014 IdenTrust, Inc. All Rights Reserved. 20
21 Need to support multiple types of solutions, for both the financial and the physical supply chain Financial Services Applications Single Sign On Anti-phishing and anti-pharming Bank Mandate management ACH Payments/SEPA implementations Corporate Purchasing International Trade Letters of Credit Statement Delivery Electronic Doc Delivery/Exchange Payment Instructions SarbOx etc compliance Mortgage and Leasing Processing Corporate Applications Online Auction Markets Electronic Content Delivery Insurance Sales and Contracts Government Filings, Procurement Tax Submissions Verticals Pharma, Energy, Defence Financial Gateway evaulting Access Control Cash Management Services Invoicing/Purchase Order Exchanges Each of these applications can be streamlined and improved through the use of trusted Identities Copyright 2014 IdenTrust, Inc. All Rights Reserved. 21
Aspects of Identity. IGF November BCS Security Community of Expertise
Aspects of Identity IGF November 2012 BCS Security Community of Expertise Representatives Dr. Louise Bennett FBCS CITP Chair of the BCS Security Community of Expertise Mirza Asrar Baig Executive Director,
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationPAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationE-Government Moldova s Experience and Future Perspectives
E-Government Moldova s Experience and Future Perspectives ALEXANDRU DONOS ProDataLex DEKAT Company LTD // Dushanbe, Tadzhikistan 22-23 June, 2017 By 2020 all public services will be digitized. Government
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationPrepaid Access MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014
Prepaid Access 2014 MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014 Discussion Points Emerging Technology Prepaid Access What is it and how does it work? Open
More informationRecommendations for Small and Medium Enterprises. Event Date Location
Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129
More informationASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003
ASIA PKI Forum Overcome PKI Deployment Obstacles Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003 Agenda PKI technology and business benefits Deployment related obstacles Closer look of obstacles
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationCHAPTER 13 ELECTRONIC COMMERCE
CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationGateway Certification Authority pilot project
Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationMUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan
MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informationTransforming the Document Signing Process
July 2015 Transforming the Document Signing Process Copyright Ascertia 2015 Sam Crook Key Account Manger Agenda About us Why are digital signatures inevitable? What are digital signatures? What can you
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More information1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice
1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.
More informationBUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:
BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationNational enote Registry Requirements Document. Version 1.0
National enote Registry Requirements Document Version 1.0 Mar 7, 2003 1. Introduction a. This paper defines the concepts of operation, key assumptions and terms, and high level business requirements for
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationELECTRONIC IMAGE AND TEXT DATA TRANSFER USING FILE TRANSFER PROTOCOL MEMORANDUM OF UNDERSTANDING
ELECTRONIC IMAGE AND TEXT DATA TRANSFER USING FILE TRANSFER PROTOCOL MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING is between Mary Louise Garcia, Tarrant County Clerk, ( CLERK ), Tarrant
More informationThe Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services
The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO
More informationCybersecurity and Data Protection Developments
Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB
More informationS90. SEMOpx Transitional Registration Guide DO NOT SEND BACK. Date: 17/05/2017 Document; Revision: 1.2
SEMOpx Transitional Registration Guide DO NOT SEND BACK Date: 17/05/2017 Document; Revision: 1.2 SEMOpx Transitional Registration Guide This document outlines the application requirements for existing
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationin a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012
Identity Management and Federation of Identity in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 HRSDC - National Service Delivery HRSDC and its service
More informationS00. SEMOpx - Registration Guide DO NOT SEND BACK. Date: 17/05/2017 Document; Revision: 1.2
SEMOpx - Registration Guide DO NOT SEND BACK Date: 17/05/2017 Document; Revision: 1.2 SEMOpx - Registration Guide This document outlines the application requirements for registering with SEMOpx to trade
More informationCustomer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach
Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand
More informationTen Innovative Financial Services Applications Powered by Data Virtualization
Ten Innovative Financial Services Applications Powered by Data Virtualization DATA IS THE NEW ALPHA In an industry driven to deliver alpha, where might financial services firms find opportunities when
More informationStarflow Token Sale Privacy Policy
Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through
More informationELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING
ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING ( MOU ) is between Mary Louise Garcia, Tarrant County Clerk, ( CLERK ), Tarrant County ( COUNTY ), Manatron, Inc. A Thomson
More informationThe Honest Advantage
The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationCERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement
CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationPrivate cloud for business
Private cloud for business Your IT Everywhere, Always. Executive summary The business challenge of IT The evolution in IT has resulted in extreme specialization that reaches into all areas of business.
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationefax Corporate for Independent Agent Offices
Overview Within the finance and insurance industries, independent agent offices have traditionally been an effective means for offering standardized services across diverse geographic regions. They provide
More informationNATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES
NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationEnabling a World-Class National ICT Sector
Activity: Workshop on Government Procurement Modernization in the Caribbean Topic: Digital Signature, E-Government Procurement Títle: Demystifying Authentication & Digital Signatures, PKI, ETA Speaker:
More informationEBAM for Corporates. SWIFT Certified Application. Label Criteria 2018
Label Criteria This document explains the business criteria required to obtain the SWIFT Certified Application for Corporates - EBAM label, which is aimed at corporate applications. 26 January Table of
More informationHelping Meet the OMB Directive
Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise
More informationAN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers
AN IPSWITCH WHITEPAPER 7 Steps to Compliance with GDPR How the General Data Protection Regulation Applies to External File Transfers Introduction Stolen personal data drives a thriving black market for
More informationISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY
ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY November 2009 Version 1.0 In light of the announcement of a series of federal pilots for federated identity providers, we have analyzed the governance and policy
More informationMobile Financial Services: An Approach To AML/CTF For Mobile Money Transfer
Mobile Financial Services: An Approach To AML/CTF For Mobile Money Transfer World Bank Workshop June 2008 Bangkok Mike Rodin Associate General Counsel The Western Union Company 1 The Western Union Company
More informationConsultancy for Trade and Supply Chain Finance Track Criteria
Consultancy for Trade and Supply Chain Finance Track Criteria This document introduces the framework of the SWIFT Certified Specialist programme in the scope of consultancy for trade and supply chain finance.
More informatione-sign and TimeStamping
e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:
More informationeid Applications Cross Border Authentication
eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?
More informationEfficient, broad-based solution for a Swiss digital ID
Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous
More informationSéminaire sur la Certification Electronique
Séminaire sur la Certification Electronique Algiers Algeria, 8-9 December, 2009 International Telecommunication Arab Regional Office Assisting Governments in Developing e-commerce Ecosystems: A Synthesis
More informationThe Marketplace for Cloud Resources
153 153 95 19 14 21 18 225 22 24 222 222 222 24 24 24 153 153 153 12 12 12 11 215 165 23 225 115 24 51 51 Deutsche Börse Cloud Exchange The Marketplace for Cloud Resources June 214 Deutsche Börse Cloud
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationSecurity Secure Information Sharing
ASD Convention Workshop 6 e-standards: a Strategic Asset across the Value Chain Security Secure Information Sharing Steve SHEPHERD Executive Director UK CeB Istanbul, 6 October 2011 1 Information security
More informationSecure Messaging as a Service
Security Infrastructure Management the way we do it Secure Messaging as a Service in collaboration with Insert partner logo Messaging as a Service (MaaS) In today s complex technological society, diversity
More informationGDPR Workflow White Paper
White Paper The European Union is implementing new legislation with the objective of protecting personal data of citizens within the EU and giving them more control over how their data is used. Hefty fines
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective
More informationLeveraging the LincPass in USDA
Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationOptiSol FinTech Platforms
OptiSol FinTech Platforms Payment Solutions Cloud enabled Web & Mobile Platform for Fund Transfer OPTISOL BUSINESS SOLUTIONS PRIVATE LIMITED #87/4, Arcot Road, Vadapalani, Chennai 600026, Tamil Nadu. India
More informationTrusted National Identity Schemes. Coralie MESNARD
Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens
More informationPCI compliance the what and the why Executing through excellence
PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?
More informationElectronic Contracting: creating legally binding agreements
Electronic Contracting: creating legally binding agreements Presented by Caryn Pass NWAIS Business Managers Conference April 2014 1 rules Information is power Fear is the enemy Culture is key Legal Exposure
More informationImplementing Electronic Signature Solutions 11/10/2015
Implementing Electronic Signature Solutions 11/10/2015 Agenda Methodology, Framework & Approach: High-Level Overarching Parameters Regarding Electronic Service Delivery Business Analysis & Risk Assessment
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationSANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018
SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina
More informationMailroom Outsourcing. Business Solutions
Mailroom Outsourcing Business Solutions Strip out internal costs Improve speed of delivery Greatly reduce transport costs Centralise mail processing Automate mail routing Improve traceability and compliance
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationImportant Information
Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland
More informationDevelopment of smart authentication and identification in Asia
Development of smart authentication and identification in Asia Asia PKI Consortium Dr. Wei-Chung Hwang weichung.hwang@gmail.com Nov 16, 2017 Agenda About APKIC Background Current Development New trends
More informationTechnology Competence Initiative
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Technology Competence Initiative Initial Implementation of IFAC Education Guideline No 11 on Information
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document
More informationAuthentication and Fraud Detection Buyer s Guide
Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationSafeguarding company from cyber-crimes and other technology scams ASSOCHAM
www.pwc.com Safeguarding company from cyber-crimes and other technology scams ASSOCHAM Rahul Aggarwal - Director The new digital business ecosystem is complex and highly interconnected The new business
More informationAgreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS
Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS 800.303.9511 CUSTSERV@SKOWSAVINGS.COM TABLE OF CONTENTS ELECTRONIC DELIVERY OF DOCUMENTS...3 SYSTEM REQUIREMENTS...3
More informationSR 2019 Business Highlights
This document provides summarised, high level, business information related to the changes made to FIN (MT) messages as part of Standards release 2019 (SR 2019). 16 November 2018 Table of Contents Table
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationAuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives
AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives As companies extend their online
More informationMutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits
Conformity and Interoperability Training for SADC Region on Type Approval testing for Mobile Terminals, Homologation Procedures and Market Surveillance Mutual Recognition Agreement/Arrangement: General
More informationeidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?
eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals
More informationResilience, Responsibility, Responsiveness Towards a Future-oriented, Sustainable World Economy. B20 Recommendations on Digital Trade
Resilience, Responsibility, Responsiveness Towards a Future-oriented, Sustainable World Economy B20 Recommendations on Digital Trade Dr. Stormy-Annika Mildner, B20 Sherpa April 25, 2017 B20 Structure Members
More informationFinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.
FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide
More informationYou can contact us about any questions, comments or requests you may have regarding this privacy policy using the details below:
Your information will be held by Make It Cheaper Group Limited (Group), which trades as Make It Cheaper, Make It Cheaper Financial Services and UK Power. You can contact us about any questions, comments
More informationCompany presentation Transition and Transformation
Company presentation Transition and Transformation FORNEBU 7 DECEMBER 2017 CFO HENRIK SCHIBLER EVRY PUBLIC The IBM Partnership offers accelerated transformation of operations, delivering increased flexibility
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationManaging Trust in e-health with Federated Identity Management
ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun
More informationDevelopment Authority of the North Country Governance Policies
Development Authority of the North Country Governance Policies Subject: Electronic Signature Policy Adopted: March 28, 2018 (Annual Meeting) Resolution: 2018-03-35 Table of Contents SECTION 1.0 INTRODUCTION...
More information