trusted computing and nstic andrew tarbox director federal business wave systems corp november 14,...

14
Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Upload: jodie-bond

Post on 18-Jan-2018

222 views

Category:

Documents


0 download

DESCRIPTION

People are really bad solution for security User Names Passwords Don’t Work Well A New Identity Paradigm for NSTIC and You

TRANSCRIPT

Page 1: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Trusted Computing and

NSTIC

Andrew TarboxDirector Federal Business

Wave Systems CorpNovember 14, 2012

Page 2: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

So what’s the Problem with the Internet

TrustWave Systems Corp © 2012 November 14, 2012

2

Page 3: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

People are really bad solution for

security

User Names Passwords

Don’t Work Well

A New Identity Paradigm for NSTIC and You

Page 4: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

The Shift Network based on Connections toNetwork based on Identity

Page 5: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

A little history from the cellular industryC

loni

ng In

cide

nts

Time

Introduction of Device ID in cellular

US Analog to Digital conversion

A tamper resistant store for ID

Page 6: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Trusted Computing – Hardware Solution – Already Deployed

• Hardware Based Security– The Best and Brightest – Computers, Software, Silicon– Software has Proven Ineffective

• Based on Open Industry Standards– Non-proprietary Solution

• Core to Microsoft Security– Logo compliance – Business Version since Vista– Expanding to Tables and Phones in Win 8

• 600 Million Computers – Today– Already Deployed

• Why don’t I know about it - Stealth

Page 7: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Imagine Only Your Computer Can Log In To Your Accounts

Trusted Platform Module (TPM)

The Device Is a Powerful and Secure Attribute

Page 8: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Hardening Access – A Hardware Root of Trust

You Should Have Only Known Devices On Your Network

VPN and Wireless Access to Your Network Is a Vulnerability

NSA demonstrated several years ago, using software purchased on the internet, it is very easy to steal the key for VPN or Wireless access and now recommends they be hardened by storage in hardware like the TPM

Page 9: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Attribute Providers Deliver the Identity Proof

Device Identity & Machine Health

Personal Identity

Page 10: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Trust in an NTSIC World

Attribute Providers Relying PartiesAttribute ProviderNetwork

Page 11: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

11

Another Twist to Consider

Hello

Hello Hello

HelloAll data is encrypted in transit

Page 12: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Corporate Use Case … When You Sign the NDA

Wave Systems Corp © 2012 November 14, 2012

12

Encrypted Encrypted

Alpha Corp Omega Corp

Page 13: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

Putting It All Together Delivers Value and Most all Trust

• Authentication of a Trusted & Healthy Device– A proven paradigm

• Authentication of a Users – Password to Log into Device – only once

• Electronic Signature – Saving money and time

• Encrypted Data and Text– Safe in transmission, safe when stored in the cloud– Unlocked only by authorized user(s) or groups of users– Log of who unlocked the file or text and when

NSTIC is the Catalyst Moving the Industry to Higher Security and Usability

NSTIC

Page 14: Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

14

ESIGNSYSTEMS – 13 years of passionate delivery of electronic signature and delivery systems The Most Mortgage Transactions in the Industry In-House and Hosted Solutions Professional Services for ESIGN and UETA Compliance

Andrew W. [email protected]

Office: 703-448-0980Falls Church, VA

Come See Us for Solutions

Kelly [email protected]

Office: (602) 840-1199Paradise Valley, AZ