SlideShare a Scribd company logo
1
public
Strong Workforce Authentication
Push & Pull Factors
2
Before we start
Who is working in a company with >50 employees?
Who is working in a corporate security,
business continuity, and/or IT departments?
3
Copyright © Infineon Technologies AG 2024. All rights reserved.
public
16 Jul 2024
‒ IAM = mandatory basic infrastructure
‒ Robust authentication & authorization mechanisms
Tier-1
Tier-2 Dealer /
Customer
OEM
Tier-n Recycler
Dismantler
Exchange of sensitive data requires enhanced security!
First open and collaborative automotive data ecosystem
Goal: Automotive data-driven value chain
CATENA-X
Phishing-resistant MFA
‒ securely authenticate to Catena-X
‒ additional security to access control system
EU Regulatory Push for Enhanced Cybersecurity
NIS 2 Directive
Who is affected?
Transport
Banking,
Financials
Digital
Infrastructure
Water Energy
Healthcare
Post &
Courier
Manufacturing Public admin
Drinking
Water
Aerospace
Food production
& distribution
e-Communication
Networks/Services
Waste
management
Research
Digital Service
Providers
NIS 2 requirements?
Penalties?
up to
10M €
Incident reporting
Risk management
Cyber hygiene
Protection & crisis concepts
or 2%
of revenue
Executive board
personally liable
‒ Access control obligation
‒ Multi-factor authentication
4
Another question
Who is working at an OEM, Tier 1, Tier 2,
or in the automotive industry in general?
5
Copyright © Infineon Technologies AG 2024. All rights reserved.
public
16 Jul 2024
‒ IAM = mandatory basic infrastructure
‒ Robust authentication & authorization mechanisms
Tier-1
Tier-2 Dealer /
Customer
OEM
Tier-n Recycler
Dismantler
Exchange of sensitive data requires enhanced security!
First open and collaborative automotive data ecosystem
Goal: Automotive data-driven value chain
CATENA-X
Phishing-resistant MFA
‒ securely authenticate to Catena-X
‒ additional security to access control system
New Business Model Pull in Automotive by Catena-X
NIS 2 Directive
Who is affected?
Transport
Banking,
Financials
Digital
Infrastructure
Water Energy
Healthcare
Post &
Courier
Manufacturing Public admin
Drinking
Water
Aerospace
Food production
& distribution
e-Communication
Networks/Services
Waste
management
Research
Digital Service
Providers
NIS 2 requirements?
Penalties?
up to
10M €
Incident reporting
Risk analysis
Cyber hygiene
Protection & crisis concepts
or 2%
of revenue
Executive board
personally liable
‒ Access control obligation
‒ Multi-factor authentication
6
Copyright © Infineon Technologies AG 2024. All rights reserved.
public
16 Jul 2024
‒ IAM = mandatory basic infrastructure
‒ Robust authentication & authorization mechanisms
Tier-1
Tier-2 Dealer /
Customer
OEM
Tier-n Recycler
Dismantler
Exchange of sensitive data requires enhanced security!
First open and collaborative automotive data ecosystem
Goal: Automotive data-driven value chain
CATENA-X
Phishing-resistant MFA
‒ securely authenticate to Catena-X
‒ additional security to access control system
Regulatory PUSH and New Business Model PULL
NIS 2 Directive
Who is affected?
Transport
Banking,
Financials
Digital
Infrastructure
Water Energy
Healthcare
Post &
Courier
Manufacturing Public admin
Drinking
Water
Aerospace
Food production
& distribution
e-Communication
Networks/Services
Waste
management
Research
Digital Service
Providers
NIS 2 requirements?
Penalties?
up to
10M €
Incident reporting
Risk analysis
Cyber hygiene
Protection & crisis concepts
or 2%
of revenue
Executive board
personally liable
‒ Access control obligation
‒ Multi-factor authentication
7
Copyright © Infineon Technologies AG 2024. All rights reserved.
public
16 Jul 2024
Why using FIDO Security Keys?
Phishing-resistant
Standardized protocols
No shared secrets, no shared passkeys
Possession-based security
Offline & online functionality
Hardware-based, phishing-resistant MFA with FIDO is the answer
Password +
standard 2FA
Low
SECURITY High
USABILITY
Low
High
Password
OTP
NOT phishing-resistant Phishing-resistant
FIDO Security Keys
Device-bound passkey
Cloud-synced
passkeys
8
Copyright © Infineon Technologies AG 2024. All rights reserved.
public
16 Jul 2024
Our role in hardware-based security
Security ICs at the heart of FIDO Security Keys
30+ years
Expertise in HW-based
security solutions helping
you to reduce complexity
& implementation costs
> 3 billion
Smart Card & Security
ICs sold per year,
proving high quality
and reliability
Trusted partner
Leading in key markets:
#1 in security,
#2 in connectivity,
#1 in automotive
Role in
FIDO
Founding member and
active involvement in
standardization since the
beginning
Trusted
advisor
In security
standardization in
security & automotive
around the globe
Long-term
commitment
Extensive system &
application know-how for
the fast-changing
automotive industry
9
Copyright © Infineon Technologies AG 2024. All rights reserved.
public
16 Jul 2024
Thank you for your attention!
10

More Related Content

Similar to FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx

Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
Splunk
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
Jorge Sebastiao
 
Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systems
HongwenZhang4
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
CYBERWISER .eu
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
Michel de Goede
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
IBM Events
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
European Services Institute
 
WBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchainWBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchain
Initio
 
Smart services and Smart Products Heidelberg, Honeywell & Eaton Corp Case S...
Smart services and Smart Products   Heidelberg, Honeywell & Eaton Corp Case S...Smart services and Smart Products   Heidelberg, Honeywell & Eaton Corp Case S...
Smart services and Smart Products Heidelberg, Honeywell & Eaton Corp Case S...
prashanthc85
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
TI Safe
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
The Digital Insurer
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
Sensata Insights AIoT Platform Infographic 2022
Sensata Insights AIoT Platform Infographic 2022Sensata Insights AIoT Platform Infographic 2022
Sensata Insights AIoT Platform Infographic 2022
GUY HAMMER
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
Zymbian
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
IBM Italia Web Team
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Quarles & Brady
 
Smart-Intelligent Buildings.pdf
Smart-Intelligent Buildings.pdfSmart-Intelligent Buildings.pdf
Smart-Intelligent Buildings.pdf
Prasanna Venkatesan
 

Similar to FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx (20)

Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systems
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
WBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchainWBC Summit Initio AML and blockchain
WBC Summit Initio AML and blockchain
 
Smart services and Smart Products Heidelberg, Honeywell & Eaton Corp Case S...
Smart services and Smart Products   Heidelberg, Honeywell & Eaton Corp Case S...Smart services and Smart Products   Heidelberg, Honeywell & Eaton Corp Case S...
Smart services and Smart Products Heidelberg, Honeywell & Eaton Corp Case S...
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Sensata Insights AIoT Platform Infographic 2022
Sensata Insights AIoT Platform Infographic 2022Sensata Insights AIoT Platform Infographic 2022
Sensata Insights AIoT Platform Infographic 2022
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Smart-Intelligent Buildings.pdf
Smart-Intelligent Buildings.pdfSmart-Intelligent Buildings.pdf
Smart-Intelligent Buildings.pdf
 

More from FIDO Alliance

FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptxFIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptxFIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptxFIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptxFIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptxFIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Munich Seminar Introduction to FIDO.pptxFIDO Munich Seminar Introduction to FIDO.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business GoalsUX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

More from FIDO Alliance (20)

FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptxFIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptxFIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptxFIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptxFIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptxFIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
 
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Munich Seminar Introduction to FIDO.pptxFIDO Munich Seminar Introduction to FIDO.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business GoalsUX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business Goals
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Recently uploaded

Top keywords searches on home and garden
Top keywords searches on home and gardenTop keywords searches on home and garden
Top keywords searches on home and garden
riannecreativetwo
 
TribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeftTribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeft
Dimpy Adhikary
 
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat AnalysisSecuriport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia
 
Top keywords searches on business in AUS
Top keywords searches on business in AUSTop keywords searches on business in AUS
Top keywords searches on business in AUS
riannecreativetwo
 
Using ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy WorkloadsUsing ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy Workloads
ScyllaDB
 
IVE 2024 Short Course Lecture 9 - Empathic Computing in VR
IVE 2024 Short Course Lecture 9 - Empathic Computing in VRIVE 2024 Short Course Lecture 9 - Empathic Computing in VR
IVE 2024 Short Course Lecture 9 - Empathic Computing in VR
Mark Billinghurst
 
UiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentationsUiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentations
UiPathCommunity
 
STKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdfSTKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdf
Dr. Jimmy Schwarzkopf
 
Leading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online RetailersLeading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online Retailers
SynapseIndia
 
Easy Compliance is Continuous Compliance
Easy Compliance is Continuous ComplianceEasy Compliance is Continuous Compliance
Easy Compliance is Continuous Compliance
Anchore
 
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Juan Carlos Gonzalez
 
Planetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile BrochurePlanetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile Brochure
Planetek Italia Srl
 
Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...
Nohoax Kanont
 
Jacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and UsesJacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and Uses
ldtexsolbl
 
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
DefCamp_2016_Chemerkin_Yury_--_publish.pdfDefCamp_2016_Chemerkin_Yury_--_publish.pdf
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
Yury Chemerkin
 
Ensuring Secure and Permission-Aware RAG Deployments
Ensuring Secure and Permission-Aware RAG DeploymentsEnsuring Secure and Permission-Aware RAG Deployments
Ensuring Secure and Permission-Aware RAG Deployments
Zilliz
 
Informatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptxInformatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptx
OkyPrayudi
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
Peter Caitens
 
Project Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverablesProject Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverables
CLIVE MINCHIN
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPathCommunity
 

Recently uploaded (20)

Top keywords searches on home and garden
Top keywords searches on home and gardenTop keywords searches on home and garden
Top keywords searches on home and garden
 
TribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeftTribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeft
 
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat AnalysisSecuriport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat Analysis
 
Top keywords searches on business in AUS
Top keywords searches on business in AUSTop keywords searches on business in AUS
Top keywords searches on business in AUS
 
Using ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy WorkloadsUsing ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy Workloads
 
IVE 2024 Short Course Lecture 9 - Empathic Computing in VR
IVE 2024 Short Course Lecture 9 - Empathic Computing in VRIVE 2024 Short Course Lecture 9 - Empathic Computing in VR
IVE 2024 Short Course Lecture 9 - Empathic Computing in VR
 
UiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentationsUiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentations
 
STKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdfSTKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdf
 
Leading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online RetailersLeading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online Retailers
 
Easy Compliance is Continuous Compliance
Easy Compliance is Continuous ComplianceEasy Compliance is Continuous Compliance
Easy Compliance is Continuous Compliance
 
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
 
Planetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile BrochurePlanetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile Brochure
 
Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...
 
Jacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and UsesJacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and Uses
 
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
DefCamp_2016_Chemerkin_Yury_--_publish.pdfDefCamp_2016_Chemerkin_Yury_--_publish.pdf
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
 
Ensuring Secure and Permission-Aware RAG Deployments
Ensuring Secure and Permission-Aware RAG DeploymentsEnsuring Secure and Permission-Aware RAG Deployments
Ensuring Secure and Permission-Aware RAG Deployments
 
Informatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptxInformatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptx
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
 
Project Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverablesProject Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverables
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
 

FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx

  • 2. 2 Before we start Who is working in a company with >50 employees? Who is working in a corporate security, business continuity, and/or IT departments?
  • 3. 3 Copyright © Infineon Technologies AG 2024. All rights reserved. public 16 Jul 2024 ‒ IAM = mandatory basic infrastructure ‒ Robust authentication & authorization mechanisms Tier-1 Tier-2 Dealer / Customer OEM Tier-n Recycler Dismantler Exchange of sensitive data requires enhanced security! First open and collaborative automotive data ecosystem Goal: Automotive data-driven value chain CATENA-X Phishing-resistant MFA ‒ securely authenticate to Catena-X ‒ additional security to access control system EU Regulatory Push for Enhanced Cybersecurity NIS 2 Directive Who is affected? Transport Banking, Financials Digital Infrastructure Water Energy Healthcare Post & Courier Manufacturing Public admin Drinking Water Aerospace Food production & distribution e-Communication Networks/Services Waste management Research Digital Service Providers NIS 2 requirements? Penalties? up to 10M € Incident reporting Risk management Cyber hygiene Protection & crisis concepts or 2% of revenue Executive board personally liable ‒ Access control obligation ‒ Multi-factor authentication
  • 4. 4 Another question Who is working at an OEM, Tier 1, Tier 2, or in the automotive industry in general?
  • 5. 5 Copyright © Infineon Technologies AG 2024. All rights reserved. public 16 Jul 2024 ‒ IAM = mandatory basic infrastructure ‒ Robust authentication & authorization mechanisms Tier-1 Tier-2 Dealer / Customer OEM Tier-n Recycler Dismantler Exchange of sensitive data requires enhanced security! First open and collaborative automotive data ecosystem Goal: Automotive data-driven value chain CATENA-X Phishing-resistant MFA ‒ securely authenticate to Catena-X ‒ additional security to access control system New Business Model Pull in Automotive by Catena-X NIS 2 Directive Who is affected? Transport Banking, Financials Digital Infrastructure Water Energy Healthcare Post & Courier Manufacturing Public admin Drinking Water Aerospace Food production & distribution e-Communication Networks/Services Waste management Research Digital Service Providers NIS 2 requirements? Penalties? up to 10M € Incident reporting Risk analysis Cyber hygiene Protection & crisis concepts or 2% of revenue Executive board personally liable ‒ Access control obligation ‒ Multi-factor authentication
  • 6. 6 Copyright © Infineon Technologies AG 2024. All rights reserved. public 16 Jul 2024 ‒ IAM = mandatory basic infrastructure ‒ Robust authentication & authorization mechanisms Tier-1 Tier-2 Dealer / Customer OEM Tier-n Recycler Dismantler Exchange of sensitive data requires enhanced security! First open and collaborative automotive data ecosystem Goal: Automotive data-driven value chain CATENA-X Phishing-resistant MFA ‒ securely authenticate to Catena-X ‒ additional security to access control system Regulatory PUSH and New Business Model PULL NIS 2 Directive Who is affected? Transport Banking, Financials Digital Infrastructure Water Energy Healthcare Post & Courier Manufacturing Public admin Drinking Water Aerospace Food production & distribution e-Communication Networks/Services Waste management Research Digital Service Providers NIS 2 requirements? Penalties? up to 10M € Incident reporting Risk analysis Cyber hygiene Protection & crisis concepts or 2% of revenue Executive board personally liable ‒ Access control obligation ‒ Multi-factor authentication
  • 7. 7 Copyright © Infineon Technologies AG 2024. All rights reserved. public 16 Jul 2024 Why using FIDO Security Keys? Phishing-resistant Standardized protocols No shared secrets, no shared passkeys Possession-based security Offline & online functionality Hardware-based, phishing-resistant MFA with FIDO is the answer Password + standard 2FA Low SECURITY High USABILITY Low High Password OTP NOT phishing-resistant Phishing-resistant FIDO Security Keys Device-bound passkey Cloud-synced passkeys
  • 8. 8 Copyright © Infineon Technologies AG 2024. All rights reserved. public 16 Jul 2024 Our role in hardware-based security Security ICs at the heart of FIDO Security Keys 30+ years Expertise in HW-based security solutions helping you to reduce complexity & implementation costs > 3 billion Smart Card & Security ICs sold per year, proving high quality and reliability Trusted partner Leading in key markets: #1 in security, #2 in connectivity, #1 in automotive Role in FIDO Founding member and active involvement in standardization since the beginning Trusted advisor In security standardization in security & automotive around the globe Long-term commitment Extensive system & application know-how for the fast-changing automotive industry
  • 9. 9 Copyright © Infineon Technologies AG 2024. All rights reserved. public 16 Jul 2024 Thank you for your attention!
  • 10. 10

Editor's Notes

  1. NIS1 in 2016 What are the requirements access control implememtation multi factor authentication (how access control is managed) -> NIS-2 mandated MFA (e.g. password + other factor Verbindlich für wesentlich oder wichtige unternehmen wesentlich wichtig a bit lesss but still painful (7mio, 1,4&% of global annual revenue besides legislations – it is worthwhile to discuss the requirements and obligations that companies have to fullfill grds a lot of requirements looking at the essential aspects that are new with NIS2 mainly 2 topics §30 (4) 9 + 10 of the German UmsuCG access control company network, people can login login / access has to be conrtollel (exact decision, who should have access to the company network) second aspect: how to design the access control? nis2 prescribes MFA (pw alone not possible – second factor has to be added / minimum is 2 factors for the implementation of access control) - which kind of access is affected? Network access local access to a pc app access local and remote, classical / cloud based every kind of digital access erhöhung der sicherheitsniveaus von netzwerken und informationssystemen in der EU (NIS-2 höheres Sicherheitsniveau und strengere Meldepflichten) So who is affected by NIS2? All mid-size and large organizations operating in the sectors listed above, as well as companies that meet the specified criteria, will be covered by the new NIS2 directive. As a result, a very large number of medium-sized enterprises are now obliged to observe the security measures laid down in the directive and are subject to certain reporting obligations. The goal of the NIS2 Directive is to enhance cybersecurity and resilience in European Union organizations. This Directive expands its scope to cover more sectors and focuses on the need for consistent implementation across all EU member states. Therefore, organizations should begin preparing for compliance by creating a roadmap and increasing their cybersecurity awareness. The following applies not only to NIS2 implementa- tion: Cybersecurity is a management task and must not be delegated. So how do companies need to prepare for the new cybersecurity requirements in order to avoid security and liability risks? One of the essential requirements of NIS2 is to develop appro- priate concepts for access control. The reason is obvious: Secure IT structures start with the question of who has access to the individual systems and networks. In particular, the following must be pro- tected against unauthorized access: • Local access to PCs • Remote access via VPN • App access to cloud-based and local applications
  2. NIS1 in 2016 What are the requirements access control implememtation multi factor authentication (how access control is managed) -> NIS-2 mandated MFA (e.g. password + other factor Verbindlich für wesentlich oder wichtige unternehmen wesentlich wichtig a bit lesss but still painful (7mio, 1,4&% of global annual revenue besides legislations – it is worthwhile to discuss the requirements and obligations that companies have to fullfill grds a lot of requirements looking at the essential aspects that are new with NIS2 mainly 2 topics §30 (4) 9 + 10 of the German UmsuCG access control company network, people can login login / access has to be conrtollel (exact decision, who should have access to the company network) second aspect: how to design the access control? nis2 prescribes MFA (pw alone not possible – second factor has to be added / minimum is 2 factors for the implementation of access control) - which kind of access is affected? Network access local access to a pc app access local and remote, classical / cloud based every kind of digital access erhöhung der sicherheitsniveaus von netzwerken und informationssystemen in der EU (NIS-2 höheres Sicherheitsniveau und strengere Meldepflichten) So who is affected by NIS2? All mid-size and large organizations operating in the sectors listed above, as well as companies that meet the specified criteria, will be covered by the new NIS2 directive. As a result, a very large number of medium-sized enterprises are now obliged to observe the security measures laid down in the directive and are subject to certain reporting obligations. The goal of the NIS2 Directive is to enhance cybersecurity and resilience in European Union organizations. This Directive expands its scope to cover more sectors and focuses on the need for consistent implementation across all EU member states. Therefore, organizations should begin preparing for compliance by creating a roadmap and increasing their cybersecurity awareness. The following applies not only to NIS2 implementa- tion: Cybersecurity is a management task and must not be delegated. So how do companies need to prepare for the new cybersecurity requirements in order to avoid security and liability risks? One of the essential requirements of NIS2 is to develop appro- priate concepts for access control. The reason is obvious: Secure IT structures start with the question of who has access to the individual systems and networks. In particular, the following must be pro- tected against unauthorized access: • Local access to PCs • Remote access via VPN • App access to cloud-based and local applications
  3. NIS1 in 2016 What are the requirements access control implememtation multi factor authentication (how access control is managed) -> NIS-2 mandated MFA (e.g. password + other factor Verbindlich für wesentlich oder wichtige unternehmen wesentlich wichtig a bit lesss but still painful (7mio, 1,4&% of global annual revenue besides legislations – it is worthwhile to discuss the requirements and obligations that companies have to fullfill grds a lot of requirements looking at the essential aspects that are new with NIS2 mainly 2 topics §30 (4) 9 + 10 of the German UmsuCG access control company network, people can login login / access has to be conrtollel (exact decision, who should have access to the company network) second aspect: how to design the access control? nis2 prescribes MFA (pw alone not possible – second factor has to be added / minimum is 2 factors for the implementation of access control) - which kind of access is affected? Network access local access to a pc app access local and remote, classical / cloud based every kind of digital access erhöhung der sicherheitsniveaus von netzwerken und informationssystemen in der EU (NIS-2 höheres Sicherheitsniveau und strengere Meldepflichten) So who is affected by NIS2? All mid-size and large organizations operating in the sectors listed above, as well as companies that meet the specified criteria, will be covered by the new NIS2 directive. As a result, a very large number of medium-sized enterprises are now obliged to observe the security measures laid down in the directive and are subject to certain reporting obligations. The goal of the NIS2 Directive is to enhance cybersecurity and resilience in European Union organizations. This Directive expands its scope to cover more sectors and focuses on the need for consistent implementation across all EU member states. Therefore, organizations should begin preparing for compliance by creating a roadmap and increasing their cybersecurity awareness. The following applies not only to NIS2 implementa- tion: Cybersecurity is a management task and must not be delegated. So how do companies need to prepare for the new cybersecurity requirements in order to avoid security and liability risks? One of the essential requirements of NIS2 is to develop appro- priate concepts for access control. The reason is obvious: Secure IT structures start with the question of who has access to the individual systems and networks. In particular, the following must be pro- tected against unauthorized access: • Local access to PCs • Remote access via VPN • App access to cloud-based and local applications
  4. Synced passkeys provide a phishing-resistant authentication solution that helps reduce the need for passwords and provide a higher level of security than phishable MFA solutions like SMS, OTP, and push notifications. However, as mentioned previously, synced passkeys have security tradeoffs and adversaries are smart enough to pivot to where they can take advantage to gain access.  Phishing resistant MFA Based on trust relationship (Registration proves needs to be protected) No shared secrets (Can be easily stolen) Possession based security (Private keys are securely stored in something I have) Know the transacting parties (Both user and relying party are aware of each other) Intent (User acts on a known initiated authentication reques) While a hacker may be able to break into your system remotely, it is difficult to hack into one that requires a physical token without the token itself being present. These tokens also do not store any confidential data. This means that even if they do get lost or stolen, they cannot be used to gain access to sensitive information. reduced mobile device dependency costs maintenance aspects compared to phones https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Cyber-Sicherheitsempfehlungen/Accountschutz/Zwei-Faktor-Authentisierung/zwei-faktor-authentisierung_node.html https://kineticit.com.au/article/multi-factor-authentication/
  5. Infineon powers electronic ID documents in >110 countries representing 77% of the world‘s population Emergency call (eCall) functionality in majority of cars feature an Infineon chip Secure Element (SE) Meaning OCT 24, 2023 | UPDATED OCT 24, 2023 private keys – security relevant functions and credentials crypto functionality tamper resistant attack resistant security certified secured manufacturing secured shipment SHARE A Secure Element (SE) is a microprocessor chip that facilitates the secure storage and processing of sensitive data. It is commonly used in SIM cards, passports and credit cards.What is a Secure Element (SE)? A Secure Element (SE) is a secure hardware component or chip that stores and processes highly sensitive data. It holds important user data, such as biometric information and banking and transaction information, and protects it from malware attacks. Secure Element can be perceived as a ‘nomad’ type of HSM. In crypto context, an SE can be used in hardware wallets to provide an extra layer of security for private keys. Despite how secure hardware wallets are, a hacker can still perform physical attacks if the wallet comes into their possession. This is where the SE comes in.  The Secure Element protects sensitive information with intrinsic countermeasures that make it tamper-proof and resistant to hacking. Entropy, from which the secret recovery phrase and private keys are derived, in cryptocurrency wallets is generated within the SE. The private keys never leave the SE The SE protects your hardware wallet against software attacks and physical attacks, including fault attacks and side-channel attacks.  For instance, they can withstand cold-boot attacks, a form of side-channel attack where a malicious actor physically accesses your device to perform a memory dump in the RAM. This forces a hard reset of the device.  Tamper-resistant hardware: Utilizes physically shielded environments or specialized processors to deter unauthorized access. Strong encryption and authentication: Employs advanced cryptographic algorithms and key management techniques to ensure data confidentiality and integrity. Secure boot and firmware update mechanisms: Prevents unauthorized modifications to the software running on the device. Industry standards and certifications: Often certified to meet security requirements such as Common Criteria or FIPS 140-2, providing validation of their security features by independent third-party organizations.
  6. So, - the only thing left for me to say today is:   Let’s make Minority Report real! -   Let’s jointly unlock the biometric future of authentication and access! -   Together, we can transform a market trend into a best-in-class solution for all players.