SlideShare a Scribd company logo
1 of 23
The State of Digital Identity
Dropbox 2012 Breach
2018 2019
The Internet Today
Millions of
Digital Service Providers
Billions of users
Millions of businesses
Consumers and Businesses Have Moved Their Data to the Cloud
Millions of
Digital Service Providers
Billions of users
Millions of businesses
The problem of the Internet Today
•
•
•
•
•
•
•
•
The Problem is Getting Worse, Not Better
Digital accounts
doubling every 5 years
200
2025
400
2020
2015
1072010
48
2005
3+
People are using more devices than
ever
145M 1.5B
427
M
120
M
145M1.1B150M
100
M
500
M
340M
92
M
Personal Credential as main attack vector to penetrate an organization
Isn’t this already solved?
Identity is not part of Internet Technology
Expansion of Internet
A Hard Problem to Solve
Users are platform agnostic
Identity is a cross-platform problem
MostTech giants structurally challenged
Being cross platform is critical Apple
25%
Google/ Microsoft
23%
Apple, Google,
Microsoft
15%
Apple
Google
13%
Google
10%
Microsoft
8%
Apple
Microsoft
6%
Platform of interaction of Dashlane users
Biometry is not a solution
Biometry as the future of digital identity?
Centralized vs. Decentralized Identity
Recent breaches (Facebook, Google…) show the limits of a
centralized Identity system.
With centralized identity and SSO solutions (From Facebook
Connect to Okta), breaches are a question of when not if. How
much leaks then is the real question
© 2019 Dashlane Inc. All rights reserved. | 15
Credential Hygiene
The Toothbrush…
• We give you the tool and tell you how to use it.
• This is on you, to make the effort to brush your teeth.
• Manage your « credential hygiene ».
…and the Seatbelt.
• Even if it is a constraint, you are better off putting your seatbelt on in case
something happens.
• Password Managers are not perfect, but like a seatbelt it is better using than
not doing anything.
Behavioral
change is hard
GasPowered
98%
GlobalAutoSales2018
EV
2%
• Dashlane secures
your data locally to your device using advanced
encryption. Dashlane never sees your data.
• Users maintain ownership and local control of their
data.
• Decentralized by design.
• Independent from BigTechs
Giving control to users
Universality PrivacySimplicity
Looking at the future
• Emergence of Standardized Identity Protocols
• Apple and Google providing proprietary solutions
• WebAuthn promoted by W3C for the web
• Decentralized identity systems
• Self-sovereign identity,
• Blockchain decentralized user-controlled identity, unproven yet
• Digital Identity Providers: third-party solutions that help users manage
digital identity.
“ Convenience
decides everything
”
–Ev Williams
ThePower of Convenience
What can you do
Questions
Start brushing your teeth and try Dashlane
Get 6 months premium
with the code SPARKTHECHANGE

More Related Content

What's hot

Getting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowGetting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowTechSoup
 
TechSoup Tour: How to Access Donations, Discounts, and Services
TechSoup Tour: How to Access Donations, Discounts, and ServicesTechSoup Tour: How to Access Donations, Discounts, and Services
TechSoup Tour: How to Access Donations, Discounts, and ServicesTechSoup
 
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23TechSoup
 
The 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and TrendsThe 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and TrendsTechSoup
 
What the smartest brands know about CX ... and what they still aren't doing a...
What the smartest brands know about CX ... and what they still aren't doing a...What the smartest brands know about CX ... and what they still aren't doing a...
What the smartest brands know about CX ... and what they still aren't doing a...Dynatrace
 
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
Webinar: Go On A Hardware Safari With Idealware-2017-02-16Webinar: Go On A Hardware Safari With Idealware-2017-02-16
Webinar: Go On A Hardware Safari With Idealware-2017-02-16Susan Hope Bard
 
Microsoft Program Offerings Oct 5, 2021
Microsoft Program Offerings Oct 5, 2021Microsoft Program Offerings Oct 5, 2021
Microsoft Program Offerings Oct 5, 2021TechSoup
 
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24TechSoup
 
Nintex Workflow Cloud
Nintex Workflow Cloud Nintex Workflow Cloud
Nintex Workflow Cloud Netwoven Inc.
 
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlassHow to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlasseG Innovations
 
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23TechSoup
 
TechSoup Microsoft Program Offerings December 20201
TechSoup Microsoft Program Offerings December 20201TechSoup Microsoft Program Offerings December 20201
TechSoup Microsoft Program Offerings December 20201TechSoup
 
So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??TechSoup
 
2016 Holiday Retail Tech Recap
2016 Holiday Retail Tech Recap2016 Holiday Retail Tech Recap
2016 Holiday Retail Tech RecapDynatrace
 
Can DevOps and ITSM be BFFs?
Can DevOps and ITSM be BFFs?Can DevOps and ITSM be BFFs?
Can DevOps and ITSM be BFFs?Atlassian
 
Microsoft Program Offering- Your Questions Answered
Microsoft Program Offering- Your Questions AnsweredMicrosoft Program Offering- Your Questions Answered
Microsoft Program Offering- Your Questions AnsweredTechSoup
 
The Human Side of Productivity
The Human Side of ProductivityThe Human Side of Productivity
The Human Side of ProductivityTathagat Varma
 
WeWork Connect: Shaping Confluence to Reflect Our Culture
WeWork Connect: Shaping Confluence to Reflect Our CultureWeWork Connect: Shaping Confluence to Reflect Our Culture
WeWork Connect: Shaping Confluence to Reflect Our CultureAtlassian
 
Avoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation FailureAvoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation FailureNathaniel Payne
 
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19TechSoup
 

What's hot (20)

Getting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to KnowGetting Ready for an Audit: Everything You Need to Know
Getting Ready for an Audit: Everything You Need to Know
 
TechSoup Tour: How to Access Donations, Discounts, and Services
TechSoup Tour: How to Access Donations, Discounts, and ServicesTechSoup Tour: How to Access Donations, Discounts, and Services
TechSoup Tour: How to Access Donations, Discounts, and Services
 
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
Webinar - Navigating Payment Processing for Nonprofits - 2015-07-23
 
The 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and TrendsThe 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and Trends
 
What the smartest brands know about CX ... and what they still aren't doing a...
What the smartest brands know about CX ... and what they still aren't doing a...What the smartest brands know about CX ... and what they still aren't doing a...
What the smartest brands know about CX ... and what they still aren't doing a...
 
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
Webinar: Go On A Hardware Safari With Idealware-2017-02-16Webinar: Go On A Hardware Safari With Idealware-2017-02-16
Webinar: Go On A Hardware Safari With Idealware-2017-02-16
 
Microsoft Program Offerings Oct 5, 2021
Microsoft Program Offerings Oct 5, 2021Microsoft Program Offerings Oct 5, 2021
Microsoft Program Offerings Oct 5, 2021
 
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
 
Nintex Workflow Cloud
Nintex Workflow Cloud Nintex Workflow Cloud
Nintex Workflow Cloud
 
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlassHow to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of Glass
 
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
Webinar - Should You Upgrade to Adobe Creative Cloud? - 2017-02-23
 
TechSoup Microsoft Program Offerings December 20201
TechSoup Microsoft Program Offerings December 20201TechSoup Microsoft Program Offerings December 20201
TechSoup Microsoft Program Offerings December 20201
 
So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??So You Signed Up for Office 365 - Now What??
So You Signed Up for Office 365 - Now What??
 
2016 Holiday Retail Tech Recap
2016 Holiday Retail Tech Recap2016 Holiday Retail Tech Recap
2016 Holiday Retail Tech Recap
 
Can DevOps and ITSM be BFFs?
Can DevOps and ITSM be BFFs?Can DevOps and ITSM be BFFs?
Can DevOps and ITSM be BFFs?
 
Microsoft Program Offering- Your Questions Answered
Microsoft Program Offering- Your Questions AnsweredMicrosoft Program Offering- Your Questions Answered
Microsoft Program Offering- Your Questions Answered
 
The Human Side of Productivity
The Human Side of ProductivityThe Human Side of Productivity
The Human Side of Productivity
 
WeWork Connect: Shaping Confluence to Reflect Our Culture
WeWork Connect: Shaping Confluence to Reflect Our CultureWeWork Connect: Shaping Confluence to Reflect Our Culture
WeWork Connect: Shaping Confluence to Reflect Our Culture
 
Avoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation FailureAvoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation Failure
 
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
 

Similar to The State of Digital Identity

Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...SnapLogic
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Arrow ECS UK
 
The Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterThe Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterNorthCoastHDI
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlAIIM International
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Digitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for BanksDigitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for BanksJérôme Kehrli
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data EraPieter De Leenheer
 
State of cloud computing v2
State of cloud computing v2State of cloud computing v2
State of cloud computing v2Md Aminul Hassan
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019TechSoup
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics IIRightScale
 
Opportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for EnterprisesOpportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for EnterprisesFrank Greco
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyTim Harvey
 
Open Data Economy.pdf
Open Data Economy.pdfOpen Data Economy.pdf
Open Data Economy.pdfODE Infinity
 
Madrid Alfresco Day 2015 - John Newton - Digital as the Future of Work
Madrid Alfresco Day 2015 - John Newton - Digital as the Future of WorkMadrid Alfresco Day 2015 - John Newton - Digital as the Future of Work
Madrid Alfresco Day 2015 - John Newton - Digital as the Future of WorkJohn Newton
 
Decentralized AI Draper
Decentralized AI   DraperDecentralized AI   Draper
Decentralized AI Drapergeetachauhan
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 

Similar to The State of Digital Identity (20)

Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
Webinar: The Hybrid Data Ecosystem: Are You Battling an Illogical Data Wareho...
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?
 
The Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast ChapterThe Future of Desktop Support - HDI Northcoast Chapter
The Future of Desktop Support - HDI Northcoast Chapter
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Digitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for BanksDigitalization: A Challenge and An Opportunity for Banks
Digitalization: A Challenge and An Opportunity for Banks
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
 
State of cloud computing v2
State of cloud computing v2State of cloud computing v2
State of cloud computing v2
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics II
 
Opportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for EnterprisesOpportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for Enterprises
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Open Data Economy.pdf
Open Data Economy.pdfOpen Data Economy.pdf
Open Data Economy.pdf
 
Madrid Alfresco Day 2015 - John Newton - Digital as the Future of Work
Madrid Alfresco Day 2015 - John Newton - Digital as the Future of WorkMadrid Alfresco Day 2015 - John Newton - Digital as the Future of Work
Madrid Alfresco Day 2015 - John Newton - Digital as the Future of Work
 
Decentralized AI Draper
Decentralized AI   DraperDecentralized AI   Draper
Decentralized AI Draper
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 

More from Dashlane

Dashlane Triple Track
Dashlane Triple TrackDashlane Triple Track
Dashlane Triple TrackDashlane
 
Dashlane Engineering Culture Book
Dashlane Engineering Culture BookDashlane Engineering Culture Book
Dashlane Engineering Culture BookDashlane
 
Dashlane Mission Teams
Dashlane Mission TeamsDashlane Mission Teams
Dashlane Mission TeamsDashlane
 
Continuous Delivery: releasing Better and Faster at Dashlane
Continuous Delivery: releasing Better and Faster at DashlaneContinuous Delivery: releasing Better and Faster at Dashlane
Continuous Delivery: releasing Better and Faster at DashlaneDashlane
 
The Dashlane Agile Journey
The Dashlane Agile JourneyThe Dashlane Agile Journey
The Dashlane Agile JourneyDashlane
 
Continuous Learning
Continuous LearningContinuous Learning
Continuous LearningDashlane
 
Portfolio & Roadmap: 2 tools to scale Agile
Portfolio & Roadmap: 2 tools to scale AgilePortfolio & Roadmap: 2 tools to scale Agile
Portfolio & Roadmap: 2 tools to scale AgileDashlane
 
U2F in Dashlane
U2F in DashlaneU2F in Dashlane
U2F in DashlaneDashlane
 
Using TypeScript at Dashlane
Using TypeScript at DashlaneUsing TypeScript at Dashlane
Using TypeScript at DashlaneDashlane
 
Scaling an Engineering Team
Scaling an Engineering TeamScaling an Engineering Team
Scaling an Engineering TeamDashlane
 
Stop Starting Start Finishing
Stop Starting Start FinishingStop Starting Start Finishing
Stop Starting Start FinishingDashlane
 
Dashlane Engineering Meeting Extract
Dashlane Engineering Meeting ExtractDashlane Engineering Meeting Extract
Dashlane Engineering Meeting ExtractDashlane
 

More from Dashlane (12)

Dashlane Triple Track
Dashlane Triple TrackDashlane Triple Track
Dashlane Triple Track
 
Dashlane Engineering Culture Book
Dashlane Engineering Culture BookDashlane Engineering Culture Book
Dashlane Engineering Culture Book
 
Dashlane Mission Teams
Dashlane Mission TeamsDashlane Mission Teams
Dashlane Mission Teams
 
Continuous Delivery: releasing Better and Faster at Dashlane
Continuous Delivery: releasing Better and Faster at DashlaneContinuous Delivery: releasing Better and Faster at Dashlane
Continuous Delivery: releasing Better and Faster at Dashlane
 
The Dashlane Agile Journey
The Dashlane Agile JourneyThe Dashlane Agile Journey
The Dashlane Agile Journey
 
Continuous Learning
Continuous LearningContinuous Learning
Continuous Learning
 
Portfolio & Roadmap: 2 tools to scale Agile
Portfolio & Roadmap: 2 tools to scale AgilePortfolio & Roadmap: 2 tools to scale Agile
Portfolio & Roadmap: 2 tools to scale Agile
 
U2F in Dashlane
U2F in DashlaneU2F in Dashlane
U2F in Dashlane
 
Using TypeScript at Dashlane
Using TypeScript at DashlaneUsing TypeScript at Dashlane
Using TypeScript at Dashlane
 
Scaling an Engineering Team
Scaling an Engineering TeamScaling an Engineering Team
Scaling an Engineering Team
 
Stop Starting Start Finishing
Stop Starting Start FinishingStop Starting Start Finishing
Stop Starting Start Finishing
 
Dashlane Engineering Meeting Extract
Dashlane Engineering Meeting ExtractDashlane Engineering Meeting Extract
Dashlane Engineering Meeting Extract
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

The State of Digital Identity

  • 1. The State of Digital Identity
  • 2.
  • 5. The Internet Today Millions of Digital Service Providers Billions of users Millions of businesses
  • 6. Consumers and Businesses Have Moved Their Data to the Cloud Millions of Digital Service Providers Billions of users Millions of businesses
  • 7. The problem of the Internet Today • • • • • • • •
  • 8. The Problem is Getting Worse, Not Better Digital accounts doubling every 5 years 200 2025 400 2020 2015 1072010 48 2005 3+ People are using more devices than ever 145M 1.5B 427 M 120 M 145M1.1B150M 100 M 500 M 340M 92 M Personal Credential as main attack vector to penetrate an organization
  • 10. Identity is not part of Internet Technology
  • 12. A Hard Problem to Solve Users are platform agnostic Identity is a cross-platform problem MostTech giants structurally challenged Being cross platform is critical Apple 25% Google/ Microsoft 23% Apple, Google, Microsoft 15% Apple Google 13% Google 10% Microsoft 8% Apple Microsoft 6% Platform of interaction of Dashlane users
  • 13. Biometry is not a solution Biometry as the future of digital identity?
  • 14. Centralized vs. Decentralized Identity Recent breaches (Facebook, Google…) show the limits of a centralized Identity system. With centralized identity and SSO solutions (From Facebook Connect to Okta), breaches are a question of when not if. How much leaks then is the real question © 2019 Dashlane Inc. All rights reserved. | 15
  • 16. The Toothbrush… • We give you the tool and tell you how to use it. • This is on you, to make the effort to brush your teeth. • Manage your « credential hygiene ».
  • 17. …and the Seatbelt. • Even if it is a constraint, you are better off putting your seatbelt on in case something happens. • Password Managers are not perfect, but like a seatbelt it is better using than not doing anything.
  • 19. • Dashlane secures your data locally to your device using advanced encryption. Dashlane never sees your data. • Users maintain ownership and local control of their data. • Decentralized by design. • Independent from BigTechs Giving control to users Universality PrivacySimplicity
  • 20. Looking at the future • Emergence of Standardized Identity Protocols • Apple and Google providing proprietary solutions • WebAuthn promoted by W3C for the web • Decentralized identity systems • Self-sovereign identity, • Blockchain decentralized user-controlled identity, unproven yet • Digital Identity Providers: third-party solutions that help users manage digital identity.
  • 21. “ Convenience decides everything ” –Ev Williams ThePower of Convenience
  • 23. Questions Start brushing your teeth and try Dashlane Get 6 months premium with the code SPARKTHECHANGE

Editor's Notes

  1. A friend of mine was shopping at the Galeries Lafayette, one of the biggest department stores in Paris. After a while, she realized she could not find her bag anymore. She thought she had forgotten it in one of the corner shops but soon realized that it had been stolen. She was very upset. She went to the police to declare the theft before going home. 1 hour later, she got a phone call at home from the Galeries Lafayette. Her bag had been found, dumped in a corner. She could retrieve it from Lost and Founds the next morning between 10 and 12. What a relief! When she arrived the next day at the Galeries, the agent at the Lost & Found was very surprised, since the bag was not there and they had never called her. In the meantime, someone had broken into her home and totally emptied it.
  2. Now let me tell you another story. In 2016, Dropbox discovered a hack that took place in 2012. 68 million accounts were stolen. The investigation showed that the hacker had used an employee login and password that were themselves stolen in a previous breach. The employee had used the same password between work and personal websites. Those 2 examples are parallel in the physical and digital world. A small and painful incident can become an even bigger nightmare if you are not careful.
  3. This is only getting worse on the Internet. That’s just in the past 18 months: Cambridge Analytica, Equifax breach, Facebook being fined, and many more. Digital Identity is basically Broken!
  4. There are billions of users and millions of businesses that rely on the Internet today to access and transact with millions of digital service providers.
  5. More and more users move their data to the Cloud, and by doing so, they each time provide a small subset of their digital identity. It is as if you had spread around hundreds of copies of your id card, or your credit card, or even your social security card. Your digital footprint is all over the place. The way Identity is built on the Internet is just plain wrong.
  6. In its current state, it is bad for users: you get the constant friction each time you need to register, login, checkout. As a user, you have no idea what data is actually being captured, because on top of personal data you willingly provide, service providers will grab many more details about you: your geographical location, your device type, your browsing history,… Obviously many businesses rely on monetizing that data, either directly for advertisement, profiling, etc. or indirectly. And this becomes uncontrollable since hundreds of copies of your digital identity are scattered across the cloud. But it is actually bad for digital service providers as well. The friction of the sign-up funnels is a key business issue. Regulations is creating increasing risks and liabilities on those providers, think GDPR. Consumers are becoming more and more wary of providers. They feel the Internet has become a dangerous place.
  7. Unfortunately, the problem is getting worse for everybody. Not better. People are using more devices than ever, on average 3 or more. We have more digital accounts every year. The number of massive breaches is not stopping: every day the news are filled with more providers being hacked and user data having leaked.
  8. Despite that situation, if you look at what users do, most of them resort to crude methods to handle their digital identity. Only 12% use tools such as password management. 86% just memorize simple passwords and reuse them everywhere. 49% write them down on paper. Very few of them really take action. We have kind of given up and accepted that this is the way things are and we support the risk and the burden.
  9. Digital Identity was never part of the foundations of the Internet. In the view of the Army with Arpanet or the Academics, this was a trusted network. The technical building blocks (HTML, CSS, JavaScript) did not include a standardized solution to authenticate and handle identity components online. If you look at the evolution of web technology, identity is not part of it.
  10. The Internet boomed and it was then too late. Estimates talk about 50 billion connected devices in 2020, all of which will have to handle some form of identity or authentication.
  11. Truth is it is a hard problem to solve. Digital Identity should be universal. It should be agnostic of any provider and work cross-platform. Same as you can use your passport to travel to any country in the world, you should have a digital equivalent. But the Internet is completely fragmented. Big Tech Giants, the Apple and Google of the world, cannot solve it on their own. They are focused on protecting their own wall-garden, their little territory, not fixing the broader issue.
  12. Biometry was considered as a potential savior, but: 1. biometric systems can be faked. 2. once your biometric data is compromised, what do you do 3. Biometry is a device-specific solution. No standard or shared protocol has emerged. 4. Also it only solves for a small portion of use cases around authentication
  13. Another hope was that mechanisms such as Facebook Connect or Login with Google would solve the problem. It is definitely a progress for the convenience of users. But using those solutions imply that you trust Big Techs by putting all your eggs in the same basket. Recent breaches around Facebook Connect have shown the limits of a centralized identity model. The size of the target by centralizing the digital identity of millions and millions of users makes it only a question of time before they get massively breached.
  14. A few of my own passwords were leaked in the past, in the 2012 Dropbox breach or in the Linkedin breach. Fortunately for me, at the time I had started paying attention to my credential hygiene. I had begun using Dashlane as a password manage. With a Password Manager, I was able to easily generate unique passwords for all my online services. Today I have more than 1000 unique passwords. I don’t know any of them. I just remember my Master Password for Dashlane. That limits the potential impact of those breaches for me. I just need to update the breached password. I still get email scams threatening me because they know one of my old passwords, but I just ignore them.
  15. I see the mission of Password Managers very much like that of a dentist. Nobody likes to go to the dentist and brush their teeth every day. Yet this is the best solution to avoid cavities. Dentists show you how to use a toothbrush then it is up to you to have the discipline.
  16. Another metaphor I like to use is the car seat belt. Nobody today would think of not putting on a seat belt when driving on the highway. Why shouldn’t we do the same on the digital highway of the Internet? It is better to be safe than sorry, even if it costs us a little.
  17. The problem is that users do not care. They hear of so many breaches all the time, that like for Climate Change news, most of them have stopped paying attention and feel they are not concerned. Behavioural change is hard. There are less than 2% of electrical vehicle despite the awareness of the climate critical situation.
  18. There is also skepticism, about the fact that password managers are another cloud solution, that could be hacked like any others. In reality, we have built Dashlane such that you remain in total control of your data. Everything happens on your device, where your data is being encrypted, and the key, what we call the Master Password, is known only to you. This zero-knowledge architecture ensures that you are safe as a user, and that Dashlane as a company is never at risk. Our solution is decentralized by design and is not dependent on any ecosystem. We work on all platforms in a universal way. It is important to be independent from the Big Tech. We want to be the Switzerland of Digital Identity. You may have heard of the recent Siri revelations, where Apple confessed on spying Siri conversations for years. Microsoft did the same on Xbox audio chats.
  19. How does the future look like? There are 3 main trends in the market today. The emergence of standardized identity protocols. Apple and Google have created their own proprietary solutions in their ecosystem, which already covers most of the mobile world. The W3C is promoting standards like WebAuthn for the web. But we are a long way away from universal solutions. Companies are prototyping with decentralized identity systems. There are concepts like self-sovereign identity, the concept that an individual should own and control their identity without the intervening administrative authorities. Developers also play with Blockchain technology around digital identity. Finally, some third-party solutions like password managers and enterprise SSO solutions try to become “digital identity providers” but this is as of today still a niche market. None of them are perfect. None are universal. https://techcrunch.com/2019/08/22/who-gets-to-own-your-digital-identity/ Appearance of decentralized identity systems: Decentralized Identity Foundation based on Decentralized Identities (DIDs) Concept of Self-Sovereign Identity Blockchain-based identity mechanisms, such as https://www.uport.me/or https://selfkey.org/
  20. Technical solutions won’t be enough to repair a broken Digital Identity. We need simpler, easy-to-use solutions that can be adopted by all. In today’s optimized life, security and tech cannot be the only trigger. As Ev Williams, founder of Twitter or Medium, says: “Convenience decides everything”.
  21. Our individual efforts can make a collective impact. You can all start by taking baby steps and start using existing tools. I obviously use Dashlane, as a Password Manager. I started using a safer Browser like Brave, that is better for privacy. I decided to delete my Facebook account. I am even currently moving away from Gmail, and using Fastmail, an independent email provider. I am regaining control of my digital identity. Take a step yourself, to improve the management and control of your digital identity, and help us fix and make the Internet a safer place.   If I may use a provocative parallel, it is by running massive campaigns of vaccination, that mankind was able to get rid of diseases, such as smallpox.
  22. It is time to start brushing your teeth by trying Dashlane. Thank you.