|Belvédere Hotel, DavosWednesday 21 January 2015 07:15 – 08:30|
Electronic communication keeps expanding. With big data, convergence and the Internet of things we are on the move into yet unchartered territory. A wealth of new services, meeting our outstanding needs in health, education, commerce, and public services, could be developed and scaled in ways never seen before. Conversely, however, the disorderly access and diffusion of personal information without our knowledge harbours unknown risks. Following developments ranging from the Snowden revelations to major hacks by criminal gangs, trust in the privacy and security of digital communication has come to a new low. Much is at stake, given the share of the global economy that is already based upon digital communication and its growing reach into new domains. Not only has the number of Internet users passed 2 billion. Another 5 are set to join in a few years down the road. 50 billion electronically communicating devices will emerge as well, each one embedded in frameworks of authentication and authorisation framed to decide who calls the shots, and who does not, in a myriad of exchanges and transactions every minute around the world. It is in this context that the development and usability of trustworthy eServices need to be shaped. Multi-factor authentications and hardware based credentials, a sound approach to privacy protection of biometric credentials, and for interoperability of different authentication methods, along with a common understanding of their respective credentials, are in demand. So is the rise of support actions including better harmonized and more compatible regulation, legislation and data protection schemes. Capturing the opportunities and countering the threats requires new responses. More sophisticated passwords and heavier PKI will not do the trick. A myriad of interlinkages supported by a range of communication tools requires a seamless and systemic response. It appears necessary to move towards a common framework for identity management. One way or the other, this seems inevitable building block in the discourse of achieving cross border or borderless communication and transactions in an increasingly fast-moving digitalised global economy. But how are different technological solutions to be reconciled? At what level are common protocols required? What cross-border legal interoperability is required for orderly authentication and authorisation in the world of tomorrow? Is the introduction of a common system for electronic identities the response that we need? A globally valid ID? Or a common European ID, in our part of the world, as a first step? Is successful collaboration in this respect the platform on which we can build trusted e-services, with the certification and support mechanisms that are required? If that is not happening, or cannot be achieved in Europe; why is that so? Will a common effort of this kind then instead take hold in other parts of the world? Or is there another way of coordinating and enabling joint progress? The situation at hand calls for immediate actions to increase security, interoperability, and privacy in order to regain trust. Following an initiative from WISEKey, OISTE, GINI S.A., IKED and the Fraunhofer Innovation Cluster next generation ID this topic is featured at the World Economic Forum in Davos 2015 in an event that brings together decision makers from in policy, industry, research and civil society around the world to discuss this most relevant topic involving all relevant stakeholders. Following the great success of the Davos 2014 Roundtable “Addressing Identity of People and Things, Privacy, Security and Trust on the Cloud“, sponsored by WISeKey, in which selectedalpha, including Neelie Kroes, European Commissioner; Humberto Ribeiro, SCS – Ministry of Development, Brazil; Prof. Thomas Andersson, IKED; Prof. Alex “Sandy” Pentland, MIT and Marina Grigorian, Fraunhofer FOKUS, discussed the future of identity management and data governance under the moderation of Carlos Moreira.
During the 2015 edition a second roundtable on the subject will be organised, this time addressing
THE RISE OF BORDERLESS ELECTRONIC IDENTITIES: ADDRESSING PRIVACY SECURITY AND TRUST IN THE POST-PASSWORD ERA.
The objective for the 2015 edition will be to provide a neutral platform for all the stakeholders working on Cybersecurity, Trust Models and Digital Identification to work together and collaborate on a common electronic identity system. For Europe this responds directly to the proposed Single European Digital Identity Community as envisaged by the Digital Agenda (DAE) in its Key Action 16. Other regions, the ITU and other multilateral bodies are likewise increasingly engaged with these issues.
The roundtables will also explore the direct significance of such a common identity system for realising trusted e-services in diverse markets. This includes a financial track bringing experts from M&A to discuss trends Global Cyber Security as the spending on this market is expected to reach $100 billion in 2015 and is forecast to grow at an annual rate of 22 percent in the next five years to reach 160 million in 2018. The United States, China, Brazil and Europe account for 90% all deals globally triggered by growing cyber threats and increasing awareness among both organizations and consumers of accelerating breaches and attacks, from our report. In most regions, the private sector accounts for the majority of Cyber Security spending, with the U.S. the notable exception where government spending is almost equal to that of the private sector. The strong U.S. technology industry combined with the fact that the U.S. defence and intelligence budgets are significantly larger than in any other country are key market drivers. Other key drivers underpinning growth in Cyber Security spending include: Increasing cyber threats, both from new actors and new threat vectors (the paths that attacks can take). Greater vulnerabilities due to the more pervasive use of technology, particularly mobile devices and cloud computing. Increasing awareness by organizations and consumers of the threats and potential threats. Changes in technology driving product and service innovation of security solutions. Increasing regulation, particularly those enforcing the requirement to secure personal data. Changes in outsourcing; some organizations are increasingly relying on partners for security, whilst others are growing internal security spending to maintain greater levels of control.