SlideShare a Scribd company logo
Sponsored by:
authenticatecon.com
FIDO: The Value of Certification
Dr. Rae Rivera
October 19, 2021
FIDO: The Value of Certification
Standardization for
industry
Market
differentiation
Regulatory
requirement
Consumer
protection
FIDO: The Value of Certification

Recommended for you

The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO

Executive Director and Chief Marketing Officer of FIDO Alliance, Andrew Shikiar updates viewers on the State of FIDO.

fido alliancefidoidentiverse
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations

The document discusses modern authentication and Nok Nok Labs' role in pioneering this area. It notes that Nok Nok Labs invented modern authentication, founded and led the FIDO Alliance, and has deployed authentication solutions for major markets. The document promotes the benefits of leveraging modern authentication, such as improved customer experience, higher retention and satisfaction, and reduced fraud and costs. It argues that authentication, security, and privacy will be vital for society with the rise of cloud services, IoT, and other technologies.

fido alliancefidofido authentication
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords

1) LINE is replacing existing biometric authentication with FIDO2 authentication in their mobile payment app LINE Pay to enhance security following payment fraud incidents. 2) They plan to expand FIDO integration to more LINE platforms and countries starting with the iOS version of LINE Pay in Japan. 3) LINE has developed their own FIDO authenticator called LINE iOS FIDO2 Combo which leverages the iPhone's Touch ID/Face ID and provides attestation through a trusted security module and whitebox abstraction layer.

seoul seminar 2019
Conformant
Compliant
Interoperable
FIDO: The Value of Certification
INDUSTRY
REQUIREMENT
MEETS COMPLIANCE
ASPECTS
VALIDATED IN
MARKET
Confidence in product
quality
Security and trust Informed purchases

Recommended for you

FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication

A look at trends in consumer authentication, including the growth of FIDO Authentication and how it complements adaptive authentication.

fido alliancefidofido authentication
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations

This paper depicts three possible scenarios for integrating FIDO UAF and public key infrastructure (PKI) in Asian countries, along with recommendations for how the two technologies can work together to bring innovation to the authentication marketplace and to pave the way for deploying better authentication solutions to the public.

public key infrastructurefido alliancefido
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication

The document discusses mobile authentication and the growing market for connected devices. It summarizes Nok Nok Labs' solutions for securely authenticating users and devices using biometrics on mobile phones. Nok Nok Labs has provided mobile authentication solutions for major companies in financial services, IoT security, and mobile carriers to replace passwords with stronger authentication methods. The document highlights case studies of deployments and strategic partnerships with companies seeking more secure authentication for their customers and devices.

mobilemobile authenticationfido alliance
FIDO Certification Programs
10
Functional Certification
Conformance Test Validation
• Validates product against
specification
Interoperability
• Validates implementability of
product in the marketplace
•
•
•
12

Recommended for you

Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC

KuppingerCole Analyst, Anmol Singh, explores the current trends for consumer authentication in Asia Pacific.

authenticationauthentication trendsconsumer authentic
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong

This document discusses authentication methods used in Hong Kong, including two-factor authentication (2FA). It summarizes how the FIDO standard fits well with Hong Kong's requirements, having been adopted by several banks and other organizations. The document also outlines some lessons learned from implementing FIDO in Hong Kong, including the need for broad handset support. It explores how FIDO could be expanded to other uses beyond authentication.

seoul seminar 2019
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication

The document discusses the problems with password-based authentication and introduces FIDO authentication as a solution. It summarizes that FIDO authentication uses public key cryptography to allow users to authenticate with a single gesture on their device, without needing shared secrets or passwords. FIDO authentication is being adopted by major companies and specifications are standardized, with over 500 authenticators certified for compatibility and security. The presentation promotes FIDO as the future of secure, usable authentication.

fido alliancefidofido authentication
13
Functional
Certification
Security
Evaluation
Authenticator
Certification
Vendor
Questionnaire
Test
Procedures
Secretariat or
Lab
Evaluation
15
AUTHENTICATOR SECURITY LEVELS
Level 1
• Basic authenticator security
• Software based solutions
Level 2
• Adds Allowed Restricted Operating Requirement (AROE)
• Increased assurances based on the AROE
Level 3
• All requirements of level 1 and 2, with added assurances related
to hardware protections
• Companion Program required
16

Recommended for you

FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication

Millions of customers trust Intuit with their most sensitive financial information. With that in mind, Intuit recently rolled out FIDO Authentication on its mobile apps to provide additional layers of security while simultaneously making the user experience more convenient. In this webinar, Marcio Mello, director & head of Product Management – Intuit Identity & Profile Platform, presents Intuit’s approach to enable FIDO Authentication, including: Intuit’s priorities in choosing a mobile strong authentication solution --The steps Intuit took to evaluate strong authentication solutions that met its security and usability requirements --Intuit’s evaluation of FIDO authentication vendors and solution chosen --The steps Intuit took to roll out FIDO Authentication, challenges faced and how they were overcome --Intuits login time and security results after deploying FIDO --Intuit’s advice for other service providers deploying FIDO Speakers: Marcio Mello, Director & Head of Product Management – Intuit Identity & Profile Platform Andrew Shikiar, Executive Director & CMO, FIDO Alliance

fido alliancefido authenticationfido specifications
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User Experience

This document discusses passwordless authentication using FIDO implementations. It provides a baseline study examining FIDO U2F deployments across different platforms and products. The study found a lack of consistent terminology, authentication methods, and browser support across services. Consistent user experiences are important for consumer adoption of passwordless authentication. The solution needs to be more convenient than passwords while providing security that consumers understand and value.

yubicofido alliancefido
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication

The document discusses technical principles of FIDO authentication. It provides an overview of how FIDO works, including the FIDO ecosystem with authenticators, clients, servers and relying parties. It also summarizes the FIDO registration and authentication processes, which separate user verification from authentication through the use of public and private keys.

technical specificationsauthenticationfido authentication
17
18
What is tested?
• False Accept Rate (FAR)
• False Reject Rate (FRR)
• Presentation Attack Detection (PAD)
• Program includes Self-attestation (validated based on vendor test data)
Using a Certified Biometric Subcomponent:
• Optional for Authenticators using a Biometric at L1-L2.
• The Security and Privacy Requirements enforce Biometric Certification of the
biometric at L3 and higher when a biometric is used in the authenticator.
• Once L2+ is finalized Biometric Certification will also be required
• Results in a “FIDO Certified” Authenticator
19
FIDO: The Value of Certification

Recommended for you

Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication

The document discusses how governments are increasingly prioritizing strong authentication and looking to standards like FIDO to provide more secure, usable and privacy-preserving authentication. It notes that the UK and US governments have highlighted FIDO and endorsed its ability to deliver improved security without passwords. The document also discusses how authentication is an area of regulatory focus due to compliance needs around privacy, security and access across domains like digital government, healthcare, payments and financial services. It argues that FIDO specifications address regulatory needs by providing nimble, configurable and cost-effective strong authentication.

fido alliancefidofido authentication
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2

- FIDO2 is a passwordless authentication standard that uses public key cryptography instead of passwords - It involves an initial registration process where a public/private key pair is created and the public key is associated with the user's account - Authentication then involves validating the signature from the private key without exposing any secrets - FIDO2 supports various form factors beyond USB keys like mobile devices and provides stronger security than passwords

Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments

This document discusses lifecycle considerations for security key deployments. It covers account registration, device registration, and account recovery. For account recovery, it recommends using multiple security keys to allow for self-recovery. It also recommends expanding existing identity proofing mechanisms used during initial registration to be used during account recovery. The document discusses both self-service and assisted account recovery options.

fido alliancefidofido authentication
“Zero-Touch” onboarding service. To more
securely and automatically onboard and
provision a device on edge hardware, it
only needs to be drop shipped to the point
of installation, connected to the network
and powered up. FDO does the rest. This
zero-touch model simplifies the installer’s
role, reduces costs and eliminates poor
security practices, such as shipping
default passwords.
21
22
Functional
Certification
IoT Security
Evaluation
FDO
Certification
23
Hardware, typically including microcontrollers, microprocessors, mother board,
ICs, physical ports.
Software including (or not) an embedded OS, its firmware, programs, various
applications and most importantly, a FIDO Device Onboarding application/protocol.
Sensors which detect and/or measure events in its operational environment and
send the information to other components
Actuators which are output units that execute decisions based on previously
processed information
Security and Privacy evaluation based on defined threat models and security
profiles
24

Recommended for you

FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Case Study: Performance Comparison of Mulitmodal BiometricsFIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics

This document summarizes a study that compared the performance of different multimodal biometric authentication methods using face and fingerprint data. 771 participants provided biometric data that was categorized as "good" or "bad" quality based on capture conditions. Error rates and usability metrics like average attempts were then calculated for different fusion rules (AND, OR, parallel, serial) and compared to FIDO standards. The results showed that AND and parallel fusion met FIDO certification requirements for both good and bad quality data, while other methods only met requirements for good data. Overall, multimodal biometrics improved performance over unimodal approaches.

seoul seminar 2019
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education

A case study from FIDO Member, Yubico, exploring a partnership with NIST to deploy secure online access for a US school district integrating ID proofing with FIDO U2F Authentication.

identitynistfido alliance
Quality Control for Medical Device Software - It Arena Lviv Presentation
Quality Control for Medical Device Software - It Arena Lviv PresentationQuality Control for Medical Device Software - It Arena Lviv Presentation
Quality Control for Medical Device Software - It Arena Lviv Presentation

This document discusses quality control for medical device software. It covers: 1) Regulations that govern medical device software from standards organizations like the FDA and IEC. 2) The V-model process for requirements, design, verification, and validation. 3) The importance of verification and validation, including static and dynamic testing, to ensure the software meets requirements and functions as intended.

testingsoftwaremedical
25
Combination of digital document image tests and physical document tests
Document image tested performance levels:
• Document false reject rate
• Document false accept rate
• Triaged based on level of fraud/attack (Level A, B, or C)
Physical document tests:
• Genuine document authentication transaction
• Genuine document verification errors
All live testing takes into account the test environment
Conducted at a FIDO Accredited Lab
26 CONFIDENTIAL | © FIDO Alliance 2020
27
Analyze Business Requirements
Validating Business and Technical Requirements
for Implementation
Designing and Implementing Business/Technical
Requirements
Deploying FIDO Authentications Solutions
Educating Others about Authentication
FIDO: The Value of Certification

Recommended for you

Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare

The document outlines the need for companies to establish product security programs to address increasing demands and regulations. It recommends that product security programs include governance, a secure development lifecycle, production security, and security operations. Key elements are identified for each phase like threat analysis and risk assessments for development; secure boot, encryption, and firewalls for production; and over-the-air updates and a security operations center for operations. Considerations for prioritization include applicable standards, customer demands, and using security as a competitive differentiator.

product securityiotindustry4.0
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications

1) The FIDO Alliance authentication certification program evaluates and certifies authenticators at different security levels to create trust between relying parties and authenticators. 2) Higher certification levels provide defenses against more sophisticated attacks, with Level 3+ providing the highest security against physical attacks on authenticator devices. 3) The certification process involves security reviews and penetration testing conducted by accredited laboratories. Companion certification programs can reduce the cost and time of certification for vendors.

fido alliancefido authenticationfido certification
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess

This document summarizes an on-demand software and application security assessment service that identifies security risks and vulnerabilities in software code and applications. It conducts both static analysis of binary code and dynamic testing of applications to determine compliance with security standards. The service is offered to help software vendors, system integrators, and development organizations evaluate the security of their applications in a timely and cost-effective manner without requiring access to source code.

Thank you.
Sponsored by:

More Related Content

What's hot

Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
FIDO Alliance
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
FIDO Alliance
 
FIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification Program
FIDO Alliance
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
FIDO Alliance
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
FIDO Alliance
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
FIDO Alliance
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO Alliance
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
FIDO Alliance
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
FIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
FIDO Alliance
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User Experience
FIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
FIDO Alliance
 
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Case Study: Performance Comparison of Mulitmodal BiometricsFIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Alliance
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
FIDO Alliance
 

What's hot (20)

Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
 
FIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification Program
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User Experience
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
 
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Case Study: Performance Comparison of Mulitmodal BiometricsFIDO Case Study: Performance Comparison of Mulitmodal Biometrics
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 

Similar to FIDO: The Value of Certification

Quality Control for Medical Device Software - It Arena Lviv Presentation
Quality Control for Medical Device Software - It Arena Lviv PresentationQuality Control for Medical Device Software - It Arena Lviv Presentation
Quality Control for Medical Device Software - It Arena Lviv Presentation
Roman Lavriv
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
Amir Einav
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
FIDO Alliance
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
Birodh Rijal
 
Beyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability Matrix
Beyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability MatrixBeyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability Matrix
Beyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability Matrix
Seapine Software
 
Sw qual joint webinar deck (5)
Sw qual joint webinar deck (5)Sw qual joint webinar deck (5)
Sw qual joint webinar deck (5)
Seapine Software
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
FIDO Alliance
 
Comply
Comply Comply
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
ICS
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
ICS
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD Issue
Robert E Jones
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
DaveNjoga1
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -
Experitest
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and Benefits
CodeSigningStore
 
An Insight on Testing the IoT Applications
An Insight on Testing the IoT ApplicationsAn Insight on Testing the IoT Applications
An Insight on Testing the IoT Applications
TestingXperts
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
Onward Security
 
Qualification for validation
Qualification for validationQualification for validation
Qualification for validation
Institute Of Pharmacy, Nirma University
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
Setiya Nugroho
 
ESS Software and Firmware
ESS Software and FirmwareESS Software and Firmware
ESS Software and Firmware
Peter Ewers MIET FInstSMM
 

Similar to FIDO: The Value of Certification (20)

Quality Control for Medical Device Software - It Arena Lviv Presentation
Quality Control for Medical Device Software - It Arena Lviv PresentationQuality Control for Medical Device Software - It Arena Lviv Presentation
Quality Control for Medical Device Software - It Arena Lviv Presentation
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
Beyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability Matrix
Beyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability MatrixBeyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability Matrix
Beyond FDA Compliance Webinar: 5 Hidden Benefits of Your Traceability Matrix
 
Sw qual joint webinar deck (5)
Sw qual joint webinar deck (5)Sw qual joint webinar deck (5)
Sw qual joint webinar deck (5)
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Comply
Comply Comply
Comply
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD Issue
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and Benefits
 
An Insight on Testing the IoT Applications
An Insight on Testing the IoT ApplicationsAn Insight on Testing the IoT Applications
An Insight on Testing the IoT Applications
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Qualification for validation
Qualification for validationQualification for validation
Qualification for validation
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
ESS Software and Firmware
ESS Software and FirmwareESS Software and Firmware
ESS Software and Firmware
 

More from FIDO Alliance

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
FIDO Alliance
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
FIDO Alliance
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptx
FIDO Alliance
 
Workshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxWorkshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptx
FIDO Alliance
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
FIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
FIDO Alliance
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
FIDO Alliance
 

More from FIDO Alliance (8)

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptx
 
Workshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxWorkshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptx
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 

Recently uploaded

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 

Recently uploaded (20)

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 

FIDO: The Value of Certification

Editor's Notes

  1. Functional Testing –compliant and conformant Interoperability testing
  2. We are seeing an increase in relying parties requesting products to be FIDO Certified, including specific level requirements to meet RP needs.
  3. Government agencies continue to recognize FIDO Certified products in the market. This is seen internationally within the authentication and identity space.
  4. This is a growing area for FIDO Alliance as we have seen with the Login with FIDO to gain interest and increase awareness of FIDO products in the marketplace.
  5. Available to members and non-members; servers and SDKs
  6. The FIDO Certification Program is intended to certify FIDO authenticators (e.g. UAF, U2F) against FIDO specifications and some additional security requirements. Level 1 ensures implementations are conformant to the specifications, are interoperable, and meet basic security and privacy considerations. Level 1 is tested by FIDO. Level 2 and above require evaluation and/or testing by a FIDO Accredited Security Laboratory.