SlideShare une entreprise Scribd logo
1  sur  85
Télécharger pour lire hors ligne
What could kill NSTIC?
A Friendly Threat Assessment In Three Parts
                       January 2013

                      Phil Wolff
                    Strategy Director
          Personal Data Ecosystem Consortium
           phil@pde.cc. @evanwolf. Linkedin

     Download the whitepaper: http://pde.cc/nsticrisks
High hopes for an ID ecosystem
Can we get to an international digital
identity system?
High hopes for an ID ecosystem
 Can we get to an International, User-Centric
           digital identity system
             that works across
           Industries? Cultures?
        Technologies? Governments?
            Regulatory schemes?
High hopes for an ID ecosystem
This effort is driven in the United States
under a 2004 program initiated by the
National Strategy for Trusted Identity in
Cyberspace through the
National Institute of Standards and
Technology (NIST) of the
US Department of
Commerce.
Our findings, in short:
The two most serious threats to NSTIC’s success:
a user experience         imbalance among
that doesn’t work         the forces that
                          hold an identity
                          ecosystem
                          together.
A dozen of us met
•  to list and score threats to the NSTIC
   Identity Ecosystem vision.
•  Internet Identity Workshop,
   Mountain View, California
    – October 2012
    – May 2011.
We asked:
If NSTIC fails by 2016,
what could have
brought it down?
HERE’S OUR HYPOTHETICAL
2016 POST-MORTEM OF NSTIC
    FAILURE SCENARIOS
We spoke in the past-tense
    as if the failures
     had happened.
We didn’t cooperate to build an ID
ecosystem. We should have played
well with others.
We didn’t cooperate to build an ID
ecosystem. We should have played
well with others.
Took too long. Strung out by process
problems.

(Alternatives emerged.)
We didn’t cooperate to build an ID
ecosystem. We should have played
well with others.
Industry failed to build it.

(Capital and management didn’t prioritize.)
We didn’t cooperate to build an ID
ecosystem. We should have played
well with others.
NSTIC community became balkanized.
NSTIC community lost cohesion; didn’t
listen to each other.

(Little to no interop.)
We didn’t cooperate to build an ID
ecosystem. We should have played
well with others.
The program was co-opted by a Big Brother
government.

(Not trustworthy internationally and for many
purposes.)
Just because it’s built doesn’t
mean they’ll use it.
Just because it’s built doesn’t
mean they’ll use it.
Worked, but was not trusted.

(Failed Brand).
Just because it’s built doesn’t
mean they’ll use it.
Was subverted and insecure.

(Legitimately Untrusted).
Just because it’s built doesn’t
mean they’ll use it.
Enterprise didn’t adopt it.

(Business case not well made.)
Just because it’s built doesn’t
mean they’ll use it.
After one failure, supporters abandoned the
project. “Burned once, twice shy.”

(Shallow, brittle commitment; low tolerance
for failure.)
Just because it’s built doesn’t
mean they’ll use it.
The IE was an empty room. No critical mass
formed. There was an imbalance of supply
and demand.

(Anchor tenants didn’t sign on. Institutions
didn’t enroll millions of users or pull in
industry ecosystems.)
Just because it’s built doesn’t
mean they’ll use it.
Citizens didn’t want trusted identity.

(Poor market fit; lack of perceived benefit
over alternatives.)
We didn’t build the right things
the right way.
We didn’t build the right things
the right way.
A local failure took down the whole identity
ecosystem.
(Failures of ecosystem trust, architecture,
integration testing, and risk analysis.)
We didn’t build the right things
the right way.
The IdP/RP/Trust identity model was inferior
to newer models.
(Technology risk.)
We didn’t build the right things
the right way.
The IdP/RP/Trust identity model broke at
scale or broke in diverse contexts.
(Project design risk.)
We didn’t build the right things
the right way.
Miscommunication within the Identity
Ecosystem contributed to its death.
(Poor cooperation, weak community, high
self-interest, low trust.)
Failed User Experience.
Failed User Experience.
UX was too hard.
Failed User Experience.
Everything went wrong that could go wrong.
We Built-In Structural Instability.
We Built-In Structural Instability.
Along with user experience, structural
instability was the big issue, according to
the group…
We Built-In Structural Instability.
•  Four pillars of the ecosystem must be
   strong
     •  Technology
     •  Economics
     •  Policy
     •  Culture
•  Each relationship among them was
   imbalanced.
We Built-In Structural Instability.
Each of these pillars were operating on
different tempos.
•  It was fast to iterate improved user
   experiences but slow to socialize each
   round among public policy and enterprise
   lawyers, for example.
We Built-In Structural Instability.
Motivations were misaligned.
•  Some companies, for example,
   engineered tariffs for data sharing into
   their terms of service, cutting off public
   sector and NPOs from their customers.
We Built-In Structural Instability.
Core ideas didn’t survive translation.
•  Several large Internet engineering
   companies backed out of supporting IE
   infrastructure because the “Easy ID”
   brand became a running joke on sitcoms,
   SNL, and a biting meme on YouTube.
We Built-In Structural Instability.
Liability was broken.
•  Tragic risks were taken with some
   technologies and contracts by pushing
   exposure from those who enabled risk to
   those who didn’t.
This session was in October 2012.
•  But wait, there’s more…
We did a similar exercise 18
months earlier in May 2011
with a similar group.
https://secure.flickr.com/photos/philwolff/5713880402/ cc-by Phil Wolff




2. EIGHTEEN MONTHS EARLIER...
Key Risks (via 2011):
Key Risks (via 2011):
Lack of adoption.
Key Risks (via 2011):
Impatience for long learning curve.
Key Risks (via 2011):
Usability failures. (early concern)
Key Risks (via 2011):
Interop failures.
Key Risks (via 2011):
Overscope.
Key Risks (via 2011):
Security problems like phishing and
malware drawn by money.
Key Risks (via 2011):
Perversion of principles.
Key Risks (via 2011):
Chicken vs. Egg problems.
Key Risks (via 2011):
Short Attention Span and
the Hype Cycle
Key Risks (via 2011):
Regulatory blocks
  privacy laws
  antitrust concerns
  uncertainty about liability
Key Risks (via 2011):
Waiting for Winners
Key Risks (via 2011):
Dystopian Fear
Key Risks (via 2011):
Over-promising by tech communities to
policy communities
Key Risks (via 2011):
•  Lack of adoption.           •  Chicken vs. Egg problems.
•  Impatience for long         •  Short Attention Span and
   learning curve.                the Hype Cycle
•  Usability failures.         •  Regulatory blocks
•  Interop failures.              including privacy laws,
•  Overscope.                     antitrust concerns and
                                  uncertainty about liability
•  Security problems like
   phishing and malware        •  Waiting for Winners
   drawn by money.             •  Dystopian Fear
•  Perversion of principles.   •  Over-promising by tech to
                                  policy communities
We had time, in the 2011 session, to
brainstorm what might avoid or
mitigate these threats.
Action:

Small successes

 Build confidence
Action:

Industry marketing, PR, Media/Voice

  Build public understanding
Action:

Community user experience sharing (KM)

  Accelerate design
Action:

Cultivate Engineering Focus

  Developer relations
Action:

Governance driving Interop Testing

  Interop is a leadership challenge
Action:

Clear/Graded Roadmap

 Short term plans, long term visions
Action:

Electronic Authentication Guideline,
NIST SP 800-63, and other threat comment

  Connect to existing NIST processes
Action:

Security Council / Antiphishing Working
Group

  Make security an explicit IESG activity
Action:

Government Affairs activity

  Engage US and other governments
Action:

OIX Risk Wiki

  Engage the OIX community
The fear of “failure to
deliver” was still there.
WHAT CHANGED
BETWEEN THE TWO
SESSIONS?
What changed between the two
sessions?
1.  Outside forces like dystopian fear
    among users, security failures, and
    regulatory challenges were less
    prominent or not mentioned. "

2.  Drivers of failure expanded almost
    exclusively to internal ones. "
What changed between the two
sessions?
The primary concern: leadership
Once funding, staffing, and collaboration
started: the identity ecosystem did not
take charge and master the challenges
as they emerged.
3. Last minute update...




Arbroath Cliffs Warning Notice CC-BY-NC Alan Parkinson
Cuts are coming
•  US federal government is cutting
   spending in 2013 as we prepare this
   paper in December 2012.
•  By cleaver if a “fiscal cliff avoiding”
   budget is passed
•  By chainsaw if Congress and the
   President fall over the “cliff.”
Direct effects.
Nobody knows if this will directly affect NIST
and the NIST staff managing the NSTIC
project.
Direct effects.
Could the stream of funding for NSTIC
innovation grants dry up and will existing
projects be halted?
Direct effects.
Will NIST’s funding for the Identity
Ecosystem’s Secretariat, that coordinates
and supports the work of the IE, be
sustained or cut?
Direct effects.
In a trillion dollar budget, today’s spending
on NSTIC is a rounding error.
Indirect effects.
We don’t know how cuts in federal
spending will affect the program
indirectly
Participating organizations change
behavior as they
•  lose government contracts,
•  experience greater risk, or
•  enjoy new opportunities.
eGovernment as customer.
We also don’t know if the largest
government agencies that would be among
the first implementers of these open, user-
centric, trust networks will stay in the game.
eGovernment as customer.
Having huge customers as “anchor tenants”
provides strong incentives for the private
sector to invest and make the identity
ecosystem work.
eGovernment as customer.
Will spending cuts interfere with project
continuity?
eGovernment as customer.
Will key personnel stay engaged?
Lots of unknowns.
•  And no strategy to respond to these risks
   from the Identity Ecosystem Steering
   Group.
•  Yet.
Our findings, in short:
The two most serious threats:
A user experience Imbalance among
that doesn’t work the forces that
                  hold an identity
                  ecosystem
                  together.
What do you think is the biggest
 threat to making the dream
of an international user-centric digital
  identity system that works across
industries, technologies, governments,
        and regulatory schemes
            come true?
Further Reading and Resources
•  https://pensivepeter.wordpress.com/2012/10/23/death-
   to-nstic-long-live-nstic/
•  https://skydrive.live.com/?
   cid=9a70d9142ec4cc44&id=9A70D9142EC4CC44!
   827&sff=1
•  PDEC White paper: What Could NSTIC?
A word from our sponsors…
•  PDEC is a not-for-profit education, advocacy,
   and research association, promoting the
   emergence of a user-centric personal data
   ecosystem where personal control of personal
   data is good for business and society.
•  Our consortium’s Startup Circle and individual
   members are in North America, across
   Europe, Australia and New Zealand
•  We meet at local meetups and conferences
   and hold seminars.
Thanks
Phil Wolff              PDEC, the Personal Data
   –  phil@pde.cc       Ecosystem Consortium, is a
   –  @evanwolf         “small data” NGO
   –  +001.510-444.8234 representing startups,
                        individuals and others who
                        believe personal control of
                        personal data is good for
                        people, business, and
                        society

Contenu connexe

Tendances

Sharing in Smart Cities
Sharing in Smart CitiesSharing in Smart Cities
Sharing in Smart CitiesScott Turnbull
 
A Futurist Looking Back
A Futurist Looking BackA Futurist Looking Back
A Futurist Looking BackJay Whittaker
 
Multimediapresentatio nforest d
Multimediapresentatio nforest dMultimediapresentatio nforest d
Multimediapresentatio nforest dWaldenForest
 
Wk11 the innovation development process
Wk11 the innovation development processWk11 the innovation development process
Wk11 the innovation development processWaldenForest
 
Styrelseakademi Strategic insights for boards
Styrelseakademi Strategic insights for boardsStyrelseakademi Strategic insights for boards
Styrelseakademi Strategic insights for boardsRobin Teigland
 
Changing the medium to challenge the message - A Conversational UI case study
Changing the medium to challenge the message - A Conversational UI case studyChanging the medium to challenge the message - A Conversational UI case study
Changing the medium to challenge the message - A Conversational UI case studyJay Whittaker
 
CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...David Terrar
 
Connected World 2019 - chair's opening comments
Connected World 2019 - chair's opening commentsConnected World 2019 - chair's opening comments
Connected World 2019 - chair's opening commentsDavid Terrar
 
We Can't Ignore or Fear Technology For Long - Andy Blumenthal
We Can't Ignore or Fear Technology For Long - Andy BlumenthalWe Can't Ignore or Fear Technology For Long - Andy Blumenthal
We Can't Ignore or Fear Technology For Long - Andy BlumenthalAndy (Avraham) Blumenthal
 
Strategic Insights for Corporate Boards
Strategic Insights for Corporate BoardsStrategic Insights for Corporate Boards
Strategic Insights for Corporate BoardsRobin Teigland
 
Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes HomeChris Dancy
 
NetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member SummitNetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member SummitNetHopeOrg
 
The City that NetWorks: Transforming Society and Economy Through Digital Exce...
The City that NetWorks: Transforming Society and Economy Through Digital Exce...The City that NetWorks: Transforming Society and Economy Through Digital Exce...
The City that NetWorks: Transforming Society and Economy Through Digital Exce...Daniel X. O'Neil
 
3.18.11 tim clark talk notes
3.18.11 tim clark talk notes3.18.11 tim clark talk notes
3.18.11 tim clark talk notesspicyben
 
TIS Talks Launch - July 23, 2012
TIS Talks Launch -  July 23, 2012TIS Talks Launch -  July 23, 2012
TIS Talks Launch - July 23, 2012tistalks
 

Tendances (20)

Sharing in Smart Cities
Sharing in Smart CitiesSharing in Smart Cities
Sharing in Smart Cities
 
A Futurist Looking Back
A Futurist Looking BackA Futurist Looking Back
A Futurist Looking Back
 
HR practices and technology induced change
HR practices and technology induced changeHR practices and technology induced change
HR practices and technology induced change
 
Multimediapresentatio nforest d
Multimediapresentatio nforest dMultimediapresentatio nforest d
Multimediapresentatio nforest d
 
Wk11 the innovation development process
Wk11 the innovation development processWk11 the innovation development process
Wk11 the innovation development process
 
Styrelseakademi Strategic insights for boards
Styrelseakademi Strategic insights for boardsStyrelseakademi Strategic insights for boards
Styrelseakademi Strategic insights for boards
 
Changing the medium to challenge the message - A Conversational UI case study
Changing the medium to challenge the message - A Conversational UI case studyChanging the medium to challenge the message - A Conversational UI case study
Changing the medium to challenge the message - A Conversational UI case study
 
CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...CIO Transformation Live - opening keynote - reframing the digital transformat...
CIO Transformation Live - opening keynote - reframing the digital transformat...
 
Connected World 2019 - chair's opening comments
Connected World 2019 - chair's opening commentsConnected World 2019 - chair's opening comments
Connected World 2019 - chair's opening comments
 
Future of work.compressed
Future of work.compressedFuture of work.compressed
Future of work.compressed
 
Tim willoughby
Tim willoughbyTim willoughby
Tim willoughby
 
We Can't Ignore or Fear Technology For Long - Andy Blumenthal
We Can't Ignore or Fear Technology For Long - Andy BlumenthalWe Can't Ignore or Fear Technology For Long - Andy Blumenthal
We Can't Ignore or Fear Technology For Long - Andy Blumenthal
 
Strategic Insights for Corporate Boards
Strategic Insights for Corporate BoardsStrategic Insights for Corporate Boards
Strategic Insights for Corporate Boards
 
BDPA New York Chapter Annual Report (2011)
BDPA New York Chapter Annual Report (2011)BDPA New York Chapter Annual Report (2011)
BDPA New York Chapter Annual Report (2011)
 
Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes Home
 
NetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member SummitNetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member Summit
 
The City that NetWorks: Transforming Society and Economy Through Digital Exce...
The City that NetWorks: Transforming Society and Economy Through Digital Exce...The City that NetWorks: Transforming Society and Economy Through Digital Exce...
The City that NetWorks: Transforming Society and Economy Through Digital Exce...
 
3.18.11 tim clark talk notes
3.18.11 tim clark talk notes3.18.11 tim clark talk notes
3.18.11 tim clark talk notes
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
 
TIS Talks Launch - July 23, 2012
TIS Talks Launch -  July 23, 2012TIS Talks Launch -  July 23, 2012
TIS Talks Launch - July 23, 2012
 

Similaire à What could kill NSTIC? A friendly threat assessment in 3 parts.

11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentJonathan Sinclair
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationBruce Forrester
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - recordDigital Catapult
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsMichael Scheidell
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Dana Gardner
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxjeanettehully
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxwlynn1
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Leveraging Networks Teigland Aug 2011 GEM64
Leveraging Networks Teigland Aug 2011 GEM64Leveraging Networks Teigland Aug 2011 GEM64
Leveraging Networks Teigland Aug 2011 GEM64Robin Teigland
 
Fintech_Trends_for_2022_report_by_Erlang_Solutions.pdf
Fintech_Trends_for_2022_report_by_Erlang_Solutions.pdfFintech_Trends_for_2022_report_by_Erlang_Solutions.pdf
Fintech_Trends_for_2022_report_by_Erlang_Solutions.pdfErlang Solutions
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Saidot
 

Similaire à What could kill NSTIC? A friendly threat assessment in 3 parts. (20)

Hope x talk
Hope x talkHope x talk
Hope x talk
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
CIO Strategies 2008
CIO Strategies 2008CIO Strategies 2008
CIO Strategies 2008
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Leveraging Networks Teigland Aug 2011 GEM64
Leveraging Networks Teigland Aug 2011 GEM64Leveraging Networks Teigland Aug 2011 GEM64
Leveraging Networks Teigland Aug 2011 GEM64
 
Fintech_Trends_for_2022_report_by_Erlang_Solutions.pdf
Fintech_Trends_for_2022_report_by_Erlang_Solutions.pdfFintech_Trends_for_2022_report_by_Erlang_Solutions.pdf
Fintech_Trends_for_2022_report_by_Erlang_Solutions.pdf
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
 

Plus de Phil Wolff

A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?Phil Wolff
 
Seven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouSeven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouPhil Wolff
 
14 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 201514 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 2015Phil Wolff
 
OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014Phil Wolff
 
DRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionDRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionPhil Wolff
 
So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. Phil Wolff
 
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckThe Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckPhil Wolff
 
What’s missing from customer service live chat?
What’s missing from customer service live chat?What’s missing from customer service live chat?
What’s missing from customer service live chat?Phil Wolff
 
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPersonal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPhil Wolff
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyPhil Wolff
 
Johannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringJohannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringPhil Wolff
 
Why Personal Clouds Need A Network
Why Personal Clouds Need A NetworkWhy Personal Clouds Need A Network
Why Personal Clouds Need A NetworkPhil Wolff
 
Fiduciary clouds
Fiduciary cloudsFiduciary clouds
Fiduciary cloudsPhil Wolff
 
Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Phil Wolff
 
22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System SucksPhil Wolff
 
Digital Signatures for use by IDA Relying Parties v102
Digital Signatures for use by IDA Relying Parties  v102Digital Signatures for use by IDA Relying Parties  v102
Digital Signatures for use by IDA Relying Parties v102Phil Wolff
 
Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Phil Wolff
 
#Portability4Trust - Personal Data Portability for Trust Frameworks
#Portability4Trust - Personal Data Portability for Trust Frameworks#Portability4Trust - Personal Data Portability for Trust Frameworks
#Portability4Trust - Personal Data Portability for Trust FrameworksPhil Wolff
 
Interop, please
Interop, pleaseInterop, please
Interop, pleasePhil Wolff
 
The Anticipatory Web
The Anticipatory WebThe Anticipatory Web
The Anticipatory WebPhil Wolff
 

Plus de Phil Wolff (20)

A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?
 
Seven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouSeven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To You
 
14 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 201514 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 2015
 
OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014
 
DRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionDRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product Selection
 
So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next.
 
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckThe Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
 
What’s missing from customer service live chat?
What’s missing from customer service live chat?What’s missing from customer service live chat?
What’s missing from customer service live chat?
 
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPersonal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. Windley
 
Johannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringJohannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community Gathering
 
Why Personal Clouds Need A Network
Why Personal Clouds Need A NetworkWhy Personal Clouds Need A Network
Why Personal Clouds Need A Network
 
Fiduciary clouds
Fiduciary cloudsFiduciary clouds
Fiduciary clouds
 
Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.
 
22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks
 
Digital Signatures for use by IDA Relying Parties v102
Digital Signatures for use by IDA Relying Parties  v102Digital Signatures for use by IDA Relying Parties  v102
Digital Signatures for use by IDA Relying Parties v102
 
Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years
 
#Portability4Trust - Personal Data Portability for Trust Frameworks
#Portability4Trust - Personal Data Portability for Trust Frameworks#Portability4Trust - Personal Data Portability for Trust Frameworks
#Portability4Trust - Personal Data Portability for Trust Frameworks
 
Interop, please
Interop, pleaseInterop, please
Interop, please
 
The Anticipatory Web
The Anticipatory WebThe Anticipatory Web
The Anticipatory Web
 

Dernier

Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

Dernier (20)

Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 

What could kill NSTIC? A friendly threat assessment in 3 parts.

  • 1. What could kill NSTIC? A Friendly Threat Assessment In Three Parts January 2013 Phil Wolff Strategy Director Personal Data Ecosystem Consortium phil@pde.cc. @evanwolf. Linkedin Download the whitepaper: http://pde.cc/nsticrisks
  • 2. High hopes for an ID ecosystem Can we get to an international digital identity system?
  • 3. High hopes for an ID ecosystem Can we get to an International, User-Centric digital identity system that works across Industries? Cultures? Technologies? Governments? Regulatory schemes?
  • 4. High hopes for an ID ecosystem This effort is driven in the United States under a 2004 program initiated by the National Strategy for Trusted Identity in Cyberspace through the National Institute of Standards and Technology (NIST) of the US Department of Commerce.
  • 5. Our findings, in short: The two most serious threats to NSTIC’s success: a user experience imbalance among that doesn’t work the forces that hold an identity ecosystem together.
  • 6. A dozen of us met •  to list and score threats to the NSTIC Identity Ecosystem vision. •  Internet Identity Workshop, Mountain View, California – October 2012 – May 2011.
  • 7. We asked: If NSTIC fails by 2016, what could have brought it down?
  • 8. HERE’S OUR HYPOTHETICAL 2016 POST-MORTEM OF NSTIC FAILURE SCENARIOS
  • 9. We spoke in the past-tense as if the failures had happened.
  • 10.
  • 11. We didn’t cooperate to build an ID ecosystem. We should have played well with others.
  • 12. We didn’t cooperate to build an ID ecosystem. We should have played well with others. Took too long. Strung out by process problems. (Alternatives emerged.)
  • 13. We didn’t cooperate to build an ID ecosystem. We should have played well with others. Industry failed to build it. (Capital and management didn’t prioritize.)
  • 14. We didn’t cooperate to build an ID ecosystem. We should have played well with others. NSTIC community became balkanized. NSTIC community lost cohesion; didn’t listen to each other. (Little to no interop.)
  • 15. We didn’t cooperate to build an ID ecosystem. We should have played well with others. The program was co-opted by a Big Brother government. (Not trustworthy internationally and for many purposes.)
  • 16. Just because it’s built doesn’t mean they’ll use it.
  • 17. Just because it’s built doesn’t mean they’ll use it. Worked, but was not trusted. (Failed Brand).
  • 18. Just because it’s built doesn’t mean they’ll use it. Was subverted and insecure. (Legitimately Untrusted).
  • 19. Just because it’s built doesn’t mean they’ll use it. Enterprise didn’t adopt it. (Business case not well made.)
  • 20. Just because it’s built doesn’t mean they’ll use it. After one failure, supporters abandoned the project. “Burned once, twice shy.” (Shallow, brittle commitment; low tolerance for failure.)
  • 21. Just because it’s built doesn’t mean they’ll use it. The IE was an empty room. No critical mass formed. There was an imbalance of supply and demand. (Anchor tenants didn’t sign on. Institutions didn’t enroll millions of users or pull in industry ecosystems.)
  • 22. Just because it’s built doesn’t mean they’ll use it. Citizens didn’t want trusted identity. (Poor market fit; lack of perceived benefit over alternatives.)
  • 23. We didn’t build the right things the right way.
  • 24. We didn’t build the right things the right way. A local failure took down the whole identity ecosystem. (Failures of ecosystem trust, architecture, integration testing, and risk analysis.)
  • 25. We didn’t build the right things the right way. The IdP/RP/Trust identity model was inferior to newer models. (Technology risk.)
  • 26. We didn’t build the right things the right way. The IdP/RP/Trust identity model broke at scale or broke in diverse contexts. (Project design risk.)
  • 27. We didn’t build the right things the right way. Miscommunication within the Identity Ecosystem contributed to its death. (Poor cooperation, weak community, high self-interest, low trust.)
  • 29. Failed User Experience. UX was too hard.
  • 30. Failed User Experience. Everything went wrong that could go wrong.
  • 31. We Built-In Structural Instability.
  • 32. We Built-In Structural Instability. Along with user experience, structural instability was the big issue, according to the group…
  • 33. We Built-In Structural Instability. •  Four pillars of the ecosystem must be strong •  Technology •  Economics •  Policy •  Culture •  Each relationship among them was imbalanced.
  • 34. We Built-In Structural Instability. Each of these pillars were operating on different tempos. •  It was fast to iterate improved user experiences but slow to socialize each round among public policy and enterprise lawyers, for example.
  • 35. We Built-In Structural Instability. Motivations were misaligned. •  Some companies, for example, engineered tariffs for data sharing into their terms of service, cutting off public sector and NPOs from their customers.
  • 36. We Built-In Structural Instability. Core ideas didn’t survive translation. •  Several large Internet engineering companies backed out of supporting IE infrastructure because the “Easy ID” brand became a running joke on sitcoms, SNL, and a biting meme on YouTube.
  • 37. We Built-In Structural Instability. Liability was broken. •  Tragic risks were taken with some technologies and contracts by pushing exposure from those who enabled risk to those who didn’t.
  • 38. This session was in October 2012. •  But wait, there’s more…
  • 39. We did a similar exercise 18 months earlier in May 2011 with a similar group. https://secure.flickr.com/photos/philwolff/5713880402/ cc-by Phil Wolff 2. EIGHTEEN MONTHS EARLIER...
  • 40. Key Risks (via 2011):
  • 41. Key Risks (via 2011): Lack of adoption.
  • 42. Key Risks (via 2011): Impatience for long learning curve.
  • 43. Key Risks (via 2011): Usability failures. (early concern)
  • 44. Key Risks (via 2011): Interop failures.
  • 45. Key Risks (via 2011): Overscope.
  • 46. Key Risks (via 2011): Security problems like phishing and malware drawn by money.
  • 47. Key Risks (via 2011): Perversion of principles.
  • 48. Key Risks (via 2011): Chicken vs. Egg problems.
  • 49. Key Risks (via 2011): Short Attention Span and the Hype Cycle
  • 50. Key Risks (via 2011): Regulatory blocks privacy laws antitrust concerns uncertainty about liability
  • 51. Key Risks (via 2011): Waiting for Winners
  • 52. Key Risks (via 2011): Dystopian Fear
  • 53. Key Risks (via 2011): Over-promising by tech communities to policy communities
  • 54. Key Risks (via 2011): •  Lack of adoption. •  Chicken vs. Egg problems. •  Impatience for long •  Short Attention Span and learning curve. the Hype Cycle •  Usability failures. •  Regulatory blocks •  Interop failures. including privacy laws, •  Overscope. antitrust concerns and uncertainty about liability •  Security problems like phishing and malware •  Waiting for Winners drawn by money. •  Dystopian Fear •  Perversion of principles. •  Over-promising by tech to policy communities
  • 55. We had time, in the 2011 session, to brainstorm what might avoid or mitigate these threats.
  • 57. Action: Industry marketing, PR, Media/Voice Build public understanding
  • 58. Action: Community user experience sharing (KM) Accelerate design
  • 59. Action: Cultivate Engineering Focus Developer relations
  • 60. Action: Governance driving Interop Testing Interop is a leadership challenge
  • 61. Action: Clear/Graded Roadmap Short term plans, long term visions
  • 62. Action: Electronic Authentication Guideline, NIST SP 800-63, and other threat comment Connect to existing NIST processes
  • 63. Action: Security Council / Antiphishing Working Group Make security an explicit IESG activity
  • 64. Action: Government Affairs activity Engage US and other governments
  • 65. Action: OIX Risk Wiki Engage the OIX community
  • 66. The fear of “failure to deliver” was still there. WHAT CHANGED BETWEEN THE TWO SESSIONS?
  • 67. What changed between the two sessions? 1.  Outside forces like dystopian fear among users, security failures, and regulatory challenges were less prominent or not mentioned. " 2.  Drivers of failure expanded almost exclusively to internal ones. "
  • 68. What changed between the two sessions? The primary concern: leadership Once funding, staffing, and collaboration started: the identity ecosystem did not take charge and master the challenges as they emerged.
  • 69. 3. Last minute update... Arbroath Cliffs Warning Notice CC-BY-NC Alan Parkinson
  • 70. Cuts are coming •  US federal government is cutting spending in 2013 as we prepare this paper in December 2012. •  By cleaver if a “fiscal cliff avoiding” budget is passed •  By chainsaw if Congress and the President fall over the “cliff.”
  • 71. Direct effects. Nobody knows if this will directly affect NIST and the NIST staff managing the NSTIC project.
  • 72. Direct effects. Could the stream of funding for NSTIC innovation grants dry up and will existing projects be halted?
  • 73. Direct effects. Will NIST’s funding for the Identity Ecosystem’s Secretariat, that coordinates and supports the work of the IE, be sustained or cut?
  • 74. Direct effects. In a trillion dollar budget, today’s spending on NSTIC is a rounding error.
  • 75. Indirect effects. We don’t know how cuts in federal spending will affect the program indirectly Participating organizations change behavior as they •  lose government contracts, •  experience greater risk, or •  enjoy new opportunities.
  • 76. eGovernment as customer. We also don’t know if the largest government agencies that would be among the first implementers of these open, user- centric, trust networks will stay in the game.
  • 77. eGovernment as customer. Having huge customers as “anchor tenants” provides strong incentives for the private sector to invest and make the identity ecosystem work.
  • 78. eGovernment as customer. Will spending cuts interfere with project continuity?
  • 79. eGovernment as customer. Will key personnel stay engaged?
  • 80. Lots of unknowns. •  And no strategy to respond to these risks from the Identity Ecosystem Steering Group. •  Yet.
  • 81. Our findings, in short: The two most serious threats: A user experience Imbalance among that doesn’t work the forces that hold an identity ecosystem together.
  • 82. What do you think is the biggest threat to making the dream of an international user-centric digital identity system that works across industries, technologies, governments, and regulatory schemes come true?
  • 83. Further Reading and Resources •  https://pensivepeter.wordpress.com/2012/10/23/death- to-nstic-long-live-nstic/ •  https://skydrive.live.com/? cid=9a70d9142ec4cc44&id=9A70D9142EC4CC44! 827&sff=1 •  PDEC White paper: What Could NSTIC?
  • 84. A word from our sponsors… •  PDEC is a not-for-profit education, advocacy, and research association, promoting the emergence of a user-centric personal data ecosystem where personal control of personal data is good for business and society. •  Our consortium’s Startup Circle and individual members are in North America, across Europe, Australia and New Zealand •  We meet at local meetups and conferences and hold seminars.
  • 85. Thanks Phil Wolff PDEC, the Personal Data –  phil@pde.cc Ecosystem Consortium, is a –  @evanwolf “small data” NGO –  +001.510-444.8234 representing startups, individuals and others who believe personal control of personal data is good for people, business, and society