Bring Your Own Identity (BYOI)
strategies for organizations and their impact
Matthew Ulery
Director of Product Management
Agenda


What is BYOI?



Why do we care about BYOI?



When to allow BYOI?



What are others doing about BYOI?

2

© 2013 NetIQ Corporation. All rights reserved.
What is BYOI?


Bring your own Infrastructure



Bring your own Iron



Bring your own Identity



Bring your own Improv



Bring your own Intoxicant

3

© 2013 NetIQ Corporation. All rights reserved.
Early adopters and providers
BYOI Trends


Social, web resource and retail
─
─
─
─



Social identity providers investing in BYOI
─

4

Use LinkedIn account to access a whitepaper
Use Amazon ID rather than creating a new retail account
Apply to a new job using LinkedIn account
NYC adopting to support constituents
Seeking greater return on their identity validation investment

© 2013 NetIQ Corporation. All rights reserved.
BYOD accelerating BYOI
BYOI Trends


Identity Overload
─
─
─
─
─



Merging of personal device and identity
─
─

5

Average 25 accounts per person and growing
Social Networking
Financial Accounts (bank, payment, entertainment)
Loyalty programs
etc
Collection of business and personal identities
Expect seamless experience from personal device

© 2013 NetIQ Corporation. All rights reserved.
6

© 2013 NetIQ Corporation. All rights reserved.
Why do we care about BYOI?


Cost reduction / avoidance
─



Increase customer / constituent engagement
─
─



Reduce registration abandonment
Enable more personalized experience interactions

Emerging changes in risk
─
─
─

7

Management of identities is expensive

Risk shared with customer/constituent and identity provider
Responsibility to protect customer privacy remains
Privacy risk mitigated by reducing identifiable information

© 2013 NetIQ Corporation. All rights reserved.
Big Question?

Should we allow BYOI?
8

© 2013 NetIQ Corporation. All rights reserved.
Security Concerns
When to allow BYOI?


Strength of authentication
─
─



Strength of identity administration
─
─



How is identity validated for administration?
What is required to issue a password reset?

Compromised identity
─
─

9

Hurdles required to create the identity
Hurdles required to validate the identity

Who is responsible if identity is breached?
How can you revoke access?

© 2013 NetIQ Corporation. All rights reserved.
Different Identity Types
When to allow BYOI?


Customer and constituents
─
─



Privileged users
─
─
─



Employees, partners, contractors, etc.
Significant access to sensitive information & systems
Much greater level of personal identifiable information

Allow BYOI…?
─

10

Limited to no access to sensitive information & systems
Limited amount of personal identifiable information

Must balance risk and value

© 2013 NetIQ Corporation. All rights reserved.
NYC.GOV
BYOI Case Study
• Different

Goals / Desires / Requirements

– Residents
– NYC
– Site

Politicians
admins

Needed a Lightly secured, customer facing portal
11

© 2013 NetIQ Corporation. All rights reserved.
NYC Constituent Experience
BYOI Case Study
Access
Management
requirements

Secure Identity-enabled
Web Services to provide
account info

am.nyc.gov

Public
Resources

Non Identity-based
information and services,
optimized for speed

pub.nyc.gov

www.nyc.gov is a site
composed of information
from other webservices,
secure, public, and semipublic.
12

© 2013 NetIQ Corporation. All rights reserved.

Social
Access
requirements

cf.nyc.gov

Personalized Web
content, requires only
simple consumer
authentication or
NYC.ID
Management of public resources
BYOI Case Study


NYC Tennis Courts
─
─
─



Is this a candidate for BYOI?
─
─
─

13

60,000 permits and tickets, 500 courts
Annual permits ($100)
Scheduling courts a nightmare for NYC and permit holders

Low risk
Lower cost from web scheduling and external identity
Enables external payment collection (i.e. PayPal)

© 2013 NetIQ Corporation. All rights reserved.
Risk of Hacked Identity
Mat Honan, Wired Magazine


Linked many of his accounts
─
─

Social accounts: Twitter, LinkedIn
Personal: Amazon, Gmail



Hackers wanted Twitter handle



Hackers exploited weak link

14

© 2013 NetIQ Corporation. All rights reserved.
Risk of Hacked Identity
Mat Honan, Wired Magazine


“In the space of one hour, my entire digital
life was destroyed.”
─
─

─



15

“First my Google account was taken over, then deleted.”
“Next my Twitter account was compromised, and used as a
platform to broadcast racist and homophobic messages.”
“And worst of all, my AppleID account was broken into, and my
hackers used it to remotely erase all of the data on my iPhone,
iPad, and MacBook?”

“In many ways, this was all my fault. My
accounts were daisy-chained together.”

© 2013 NetIQ Corporation. All rights reserved.
Required no advanced skills
Mat Honan, Wired Magazine


Twitter linked to Gmail account
─
─
─



Resetting Apple account requires
─
─
─



Physical address & last four digits of credit card
Easy to get address
How could they get the credit card information?

Amazon and AppleID accounts linked
─

─
─

16

Google Account recovery page
Gave alternate email: m****n@me.com (hmmmm mhonan)…
Letting them know he had an AppleID

Name and email address needed to add a card to Amazon
Knowing card number allows resetting password
Now they have the credit card number for AppleID

© 2013 NetIQ Corporation. All rights reserved.
Key Take-aways
Balancing Risk and Value


BYOI benefits
─
─
─



BYOI risk assessment
─
─
─



Customers/constituents involved in identity selection
Security of identity beyond your control
Still must protect personal identifiable information

Must balance value against savings
─
─

17

Reduce cost of generating and managing identities
Reduce customer/constituent engagement
Enable more personalized experience interactions

What type of access does it fit?
May not be right for your organization…yet

© 2013 NetIQ Corporation. All rights reserved.
Q&A
matthew.ulery@netiq.com

More Related Content

PPTX
Are You Being Anti-Social
PPT
Identity, Security and Healthcare
PDF
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
PDF
SecureMAG Volume 6 - 2014
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PPTX
IAM for the Masses: Managing Consumer Identities
PDF
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
PDF
SecureMAG Vol 3
Are You Being Anti-Social
Identity, Security and Healthcare
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
SecureMAG Volume 6 - 2014
Extending the Power of Consent with User-Managed Access & OpenUMA
IAM for the Masses: Managing Consumer Identities
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
SecureMAG Vol 3

What's hot (20)

PPTX
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PPTX
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
PPTX
Trust Frameworks Explained
PPTX
India'a Proposed Privacy & Personal Data Protection Law
PDF
GDPR, User Data, Privacy, and Your Apps
PDF
Fintech & Blockchain
PPTX
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
PDF
The Weakest Point of Security in IoT
PDF
Blockchain for Accounting & Assurance
PPTX
Kantara Workshop at CIS
PPT
Kantara a Global Context 2011
PPT
Federated Futures (Nicole Harris)
PPTX
Second line of defense for cybersecurity : Blockchain
PDF
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
PDF
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
PPTX
The Blockchain Wave in 2019 and Beyond
PPTX
New trends of IoT in 2018 and beyond (SJSU Conference )
PPTX
Secure and Smart IoT
PDF
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Trust Frameworks Explained
India'a Proposed Privacy & Personal Data Protection Law
GDPR, User Data, Privacy, and Your Apps
Fintech & Blockchain
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
The Weakest Point of Security in IoT
Blockchain for Accounting & Assurance
Kantara Workshop at CIS
Kantara a Global Context 2011
Federated Futures (Nicole Harris)
Second line of defense for cybersecurity : Blockchain
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' Poikola
The Blockchain Wave in 2019 and Beyond
New trends of IoT in 2018 and beyond (SJSU Conference )
Secure and Smart IoT
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public

Viewers also liked (11)

PPTX
BrainShare 2014
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
A Smarter, More Secure Internet of Things
PPTX
CA CloudMinder Vasu Surabhi
PPTX
Building A Cloud-Ready Security Program
PPTX
Scrubbing Your Active Directory Squeaky Clean
PPTX
Enterprise & Web based Federated Identity Management & Data Access Controls
PDF
Mobile Apps in Your Business
PDF
Big Payoffs With BYOD and Mobility
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPT
Building an Effective Identity Management Strategy
BrainShare 2014
Advanced Persistent Threat - Evaluating Effective Responses
A Smarter, More Secure Internet of Things
CA CloudMinder Vasu Surabhi
Building A Cloud-Ready Security Program
Scrubbing Your Active Directory Squeaky Clean
Enterprise & Web based Federated Identity Management & Data Access Controls
Mobile Apps in Your Business
Big Payoffs With BYOD and Mobility
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Building an Effective Identity Management Strategy

Similar to Bring Your Own Identity (20)

PDF
LoginRadius Explores: The Evolution of Social Login
PDF
LoginRadius Explores the Future of Social Login
PPTX
Social Media and Estate Planning presented to Wayne State University Law Scho...
PDF
Identity in the Internet Age
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
DOCX
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
DOCX
Best Places to Buy Verified Cash App Accounts 2025
DOCX
Where to Safely Buy a Verified Cash App Account Online in 2025
PDF
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
DOCX
Introduction to payments
PDF
Single Sign On IDM Value
PDF
Identity 101: Boot Camp for Identity North 2016
PDF
6: privacy terms
PDF
Online Fraud Detection- A Review
ODP
Topic 9 E entrepreneurship
PPTX
NET 303: Online Policy Primer
PDF
Friendsvow executive summary
PDF
15 companies you should copy: business models visualised by @boardofinno
PPTX
TLE 8 EAGLE Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
LoginRadius Explores: The Evolution of Social Login
LoginRadius Explores the Future of Social Login
Social Media and Estate Planning presented to Wayne State University Law Scho...
Identity in the Internet Age
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
E-business,Methods, Function, Formation, Risk, Resources,etc- SNAPDEAL
Best Places to Buy Verified Cash App Accounts 2025
Where to Safely Buy a Verified Cash App Account Online in 2025
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
Introduction to payments
Single Sign On IDM Value
Identity 101: Boot Camp for Identity North 2016
6: privacy terms
Online Fraud Detection- A Review
Topic 9 E entrepreneurship
NET 303: Online Policy Primer
Friendsvow executive summary
15 companies you should copy: business models visualised by @boardofinno
TLE 8 EAGLE Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON

More from NetIQ (20)

PDF
Open Enterprise Server With Windows
PDF
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
PDF
Paraca Inc.
PDF
The University of Westminster Saves Time and Money with Identity Manager
PDF
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
PDF
Swisscard Saves Time and Effort in Managing User Access
PDF
Vodacom Tightens Security with Identity Manager from NetIQ
PDF
University of Dayton Ensures Compliance with Sentinel Log Manager
PDF
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
PDF
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
PDF
Netiq css huntington_bank
PDF
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
PDF
NetIQ Identity Manager Unites Hanshan Normal University
PDF
Handelsbanken Takes Control of Identity Management with NetIQ
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
PDF
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
PDF
Central Denmark Region Strengthens Administrative Security with Identity Mana...
PDF
Cloud Identity
PDF
2014 Cyberthreat Defense Report
PDF
Identity-Powered Security
Open Enterprise Server With Windows
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
Paraca Inc.
The University of Westminster Saves Time and Money with Identity Manager
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
Swisscard Saves Time and Effort in Managing User Access
Vodacom Tightens Security with Identity Manager from NetIQ
University of Dayton Ensures Compliance with Sentinel Log Manager
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Netiq css huntington_bank
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ Identity Manager Unites Hanshan Normal University
Handelsbanken Takes Control of Identity Management with NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Cloud Identity
2014 Cyberthreat Defense Report
Identity-Powered Security

Recently uploaded (20)

PDF
Examining Bias in AI Generated News Content.pdf
PPTX
How to use fields_get method in Odoo 18
PDF
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PPTX
maintenance powerrpoint for adaprive and preventive
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
PDF
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
PDF
Intravenous drug administration application for pediatric patients via augmen...
PDF
Fitaura: AI & Machine Learning Powered Fitness Tracker
PPTX
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
PPTX
Information-Technology-in-Human-Society (2).pptx
PDF
【AI論文解説】高速・高品質な生成を実現するFlow Map Models(Part 1~3)
PPTX
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
PDF
Advancements in abstractive text summarization: a deep learning approach
PDF
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
PPTX
Blending method and technology for hydrogen.pptx
PDF
Addressing the challenges of harmonizing law and artificial intelligence tech...
PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
PDF
TicketRoot: Event Tech Solutions Deck 2025
Examining Bias in AI Generated News Content.pdf
How to use fields_get method in Odoo 18
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
Report in SIP_Distance_Learning_Technology_Impact.pptx
maintenance powerrpoint for adaprive and preventive
Technical Debt in the AI Coding Era - By Antonio Bianco
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
Intravenous drug administration application for pediatric patients via augmen...
Fitaura: AI & Machine Learning Powered Fitness Tracker
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
Information-Technology-in-Human-Society (2).pptx
【AI論文解説】高速・高品質な生成を実現するFlow Map Models(Part 1~3)
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
Advancements in abstractive text summarization: a deep learning approach
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
Blending method and technology for hydrogen.pptx
Addressing the challenges of harmonizing law and artificial intelligence tech...
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
TicketRoot: Event Tech Solutions Deck 2025

Bring Your Own Identity

  • 1. Bring Your Own Identity (BYOI) strategies for organizations and their impact Matthew Ulery Director of Product Management
  • 2. Agenda  What is BYOI?  Why do we care about BYOI?  When to allow BYOI?  What are others doing about BYOI? 2 © 2013 NetIQ Corporation. All rights reserved.
  • 3. What is BYOI?  Bring your own Infrastructure  Bring your own Iron  Bring your own Identity  Bring your own Improv  Bring your own Intoxicant 3 © 2013 NetIQ Corporation. All rights reserved.
  • 4. Early adopters and providers BYOI Trends  Social, web resource and retail ─ ─ ─ ─  Social identity providers investing in BYOI ─ 4 Use LinkedIn account to access a whitepaper Use Amazon ID rather than creating a new retail account Apply to a new job using LinkedIn account NYC adopting to support constituents Seeking greater return on their identity validation investment © 2013 NetIQ Corporation. All rights reserved.
  • 5. BYOD accelerating BYOI BYOI Trends  Identity Overload ─ ─ ─ ─ ─  Merging of personal device and identity ─ ─ 5 Average 25 accounts per person and growing Social Networking Financial Accounts (bank, payment, entertainment) Loyalty programs etc Collection of business and personal identities Expect seamless experience from personal device © 2013 NetIQ Corporation. All rights reserved.
  • 6. 6 © 2013 NetIQ Corporation. All rights reserved.
  • 7. Why do we care about BYOI?  Cost reduction / avoidance ─  Increase customer / constituent engagement ─ ─  Reduce registration abandonment Enable more personalized experience interactions Emerging changes in risk ─ ─ ─ 7 Management of identities is expensive Risk shared with customer/constituent and identity provider Responsibility to protect customer privacy remains Privacy risk mitigated by reducing identifiable information © 2013 NetIQ Corporation. All rights reserved.
  • 8. Big Question? Should we allow BYOI? 8 © 2013 NetIQ Corporation. All rights reserved.
  • 9. Security Concerns When to allow BYOI?  Strength of authentication ─ ─  Strength of identity administration ─ ─  How is identity validated for administration? What is required to issue a password reset? Compromised identity ─ ─ 9 Hurdles required to create the identity Hurdles required to validate the identity Who is responsible if identity is breached? How can you revoke access? © 2013 NetIQ Corporation. All rights reserved.
  • 10. Different Identity Types When to allow BYOI?  Customer and constituents ─ ─  Privileged users ─ ─ ─  Employees, partners, contractors, etc. Significant access to sensitive information & systems Much greater level of personal identifiable information Allow BYOI…? ─ 10 Limited to no access to sensitive information & systems Limited amount of personal identifiable information Must balance risk and value © 2013 NetIQ Corporation. All rights reserved.
  • 11. NYC.GOV BYOI Case Study • Different Goals / Desires / Requirements – Residents – NYC – Site Politicians admins Needed a Lightly secured, customer facing portal 11 © 2013 NetIQ Corporation. All rights reserved.
  • 12. NYC Constituent Experience BYOI Case Study Access Management requirements Secure Identity-enabled Web Services to provide account info am.nyc.gov Public Resources Non Identity-based information and services, optimized for speed pub.nyc.gov www.nyc.gov is a site composed of information from other webservices, secure, public, and semipublic. 12 © 2013 NetIQ Corporation. All rights reserved. Social Access requirements cf.nyc.gov Personalized Web content, requires only simple consumer authentication or NYC.ID
  • 13. Management of public resources BYOI Case Study  NYC Tennis Courts ─ ─ ─  Is this a candidate for BYOI? ─ ─ ─ 13 60,000 permits and tickets, 500 courts Annual permits ($100) Scheduling courts a nightmare for NYC and permit holders Low risk Lower cost from web scheduling and external identity Enables external payment collection (i.e. PayPal) © 2013 NetIQ Corporation. All rights reserved.
  • 14. Risk of Hacked Identity Mat Honan, Wired Magazine  Linked many of his accounts ─ ─ Social accounts: Twitter, LinkedIn Personal: Amazon, Gmail  Hackers wanted Twitter handle  Hackers exploited weak link 14 © 2013 NetIQ Corporation. All rights reserved.
  • 15. Risk of Hacked Identity Mat Honan, Wired Magazine  “In the space of one hour, my entire digital life was destroyed.” ─ ─ ─  15 “First my Google account was taken over, then deleted.” “Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages.” “And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook?” “In many ways, this was all my fault. My accounts were daisy-chained together.” © 2013 NetIQ Corporation. All rights reserved.
  • 16. Required no advanced skills Mat Honan, Wired Magazine  Twitter linked to Gmail account ─ ─ ─  Resetting Apple account requires ─ ─ ─  Physical address & last four digits of credit card Easy to get address How could they get the credit card information? Amazon and AppleID accounts linked ─ ─ ─ 16 Google Account recovery page Gave alternate email: m****[email protected] (hmmmm mhonan)… Letting them know he had an AppleID Name and email address needed to add a card to Amazon Knowing card number allows resetting password Now they have the credit card number for AppleID © 2013 NetIQ Corporation. All rights reserved.
  • 17. Key Take-aways Balancing Risk and Value  BYOI benefits ─ ─ ─  BYOI risk assessment ─ ─ ─  Customers/constituents involved in identity selection Security of identity beyond your control Still must protect personal identifiable information Must balance value against savings ─ ─ 17 Reduce cost of generating and managing identities Reduce customer/constituent engagement Enable more personalized experience interactions What type of access does it fit? May not be right for your organization…yet © 2013 NetIQ Corporation. All rights reserved.

Editor's Notes

  • #11: Identity provisioning really breaks down into two classes. The first class is that of people you provide a service to – constituents, customers , etc . The second class are employees. People who require access to provide a service for you.We collect different identity information from both of these groups. The mechanisms for collection and storage are different, as are the purposes for collection. While some of this identity information is equivalent in sensitivity, it is often handled differently.Depending on what identity class you lost the data from, it will probably have different mitigation requirements and even impact on your organization.
  • #12: Residents : Another #$%^$#**** account and password?Not more paperwork…NYC Politicianseasy to use and reduce work (admins)merge disparate accessprovide graded access for customers / constituents and employeeshandle high volume accessneed a drop in solutionneeds to be personalizedcheap (comptroller)Not going to get me in trouble ( compliance)Site admins – need to: work with staff they have
  • #13: Always appear to be openSecure identity be available, but did not want to mint a new identity for all constituents. Optimize the consituent experience on the web site to improve customer experience – what have they done before, highlight services based on who, what they have done in the pastAM – SecurityPR – Group of users to sort and filter informationSA – Tailoring it for them