Jordan Burris (@jordansrules) 's Twitter Profile
Jordan Burris

@jordansrules

Fixing civil identity one day at a time @Socureme | Former White House OFCIO COS @OMBpress | Former @deloittegov | Opinions are my own.

ID: 1376809135

calendar_today24-04-2013 11:18:51

211 Tweet

139 Followers

164 Following

Jordan Burris (@jordansrules) 's Twitter Profile Photo

When meeting with a government client, the conversation doesn't start with a pitch about how great the product is. That approach would lose them immediately. Government officials meet with vendors constantly and are used to hearing sales scripts. What stands out is an

When meeting with a government client, the conversation doesn't start with a pitch about how great the product is.  

That approach would lose them immediately.

Government officials meet with vendors constantly and are used to hearing sales scripts. What stands out is an
Jordan Burris (@jordansrules) 's Twitter Profile Photo

Legacy processes in government often feel set in stone. Established years ago, the default assumption kicks in: "This is how it's always been done." Change seems impossible. Throughout my time working in Washington D.C., I've learned that the path forward starts by flipping

Legacy processes in government often feel set in stone. Established years ago, the default assumption kicks in: 

"This is how it's always been done."

Change seems impossible.

Throughout my time working in Washington D.C., I've learned that the path forward starts by flipping
Jordan Burris (@jordansrules) 's Twitter Profile Photo

New research confirms what many of us have known: government agencies are under coordinated attack from nation states hellbent on exploiting weaknesses in existing identity infrastructure. A 60 Minutes episode aired this past week (to which we contributed) that covered the

New research confirms what many of us have known: government agencies are under coordinated attack from nation states hellbent on exploiting weaknesses in existing identity infrastructure.

A 60 Minutes episode aired this past week (to which we contributed) that covered the
Jordan Burris (@jordansrules) 's Twitter Profile Photo

A large state was getting flooded with 17,000 applications a day. Most hitting around 3 a.m.. Think it was fraud or a mass case of insomnia? When we sent identity verification live, traffic dropped below 5,000, overnight. Fraudsters are just looking for an unprotected

A large state was getting flooded with 17,000 applications a day. Most hitting around 3 a.m..

Think it was fraud or a mass case of insomnia?

When we sent identity verification live, traffic dropped below 5,000, overnight.

Fraudsters are just looking for an unprotected
Jordan Burris (@jordansrules) 's Twitter Profile Photo

Who would scam a community college? State-sponsored crime rings for one. They figured out that they could use stolen and synthetic IDs to enroll in community colleges. Why would they wanna do that? Two words: Student loans. Community colleges are getting hundreds of

Who would scam a community college? 

State-sponsored crime rings for one. 

They figured out that they could use stolen and synthetic IDs to enroll in community colleges.  Why would they wanna do that? 

Two words: Student loans. 

Community colleges are getting hundreds of
Jordan Burris (@jordansrules) 's Twitter Profile Photo

I’ve spent a lot of time thinking about the application of “the orb” and how disruptive it could be if launched at scale across different enterprises. To be blunt, some of these concepts aren’t really new. Take Aadhaar in India, they started biometric enrollment years ago using

I’ve spent a lot of time thinking about the application of “the orb” and how disruptive it could be if launched at scale across different enterprises.

To be blunt, some of these concepts aren’t really new. Take Aadhaar in India, they started biometric enrollment years ago using
Jordan Burris (@jordansrules) 's Twitter Profile Photo

One of our clients felt like they’d been getting raked over the coals by their previous vendor. They’d spent millions over several years only to have their payoff be: Access issues rising. Fraud capture lacking. Manual reviews through the roof, driving up costs. They were

One of our clients felt like they’d been getting raked over the coals by their previous vendor.

They’d spent millions over several years only to have their payoff be:

Access issues rising.
Fraud capture lacking.
Manual reviews through the roof, driving up costs.

They were
Jordan Burris (@jordansrules) 's Twitter Profile Photo

A desperate vendor recently told an agency we were about to sign with, "Hey, Socure disparately impacts marginalized communities." If that were the case, I would not stand by this company. And luckily, I can just point to the math. I'll give you the simplest of all data

A desperate vendor recently told an agency we were about to sign with, "Hey, Socure disparately impacts marginalized communities."

If that were the case, I would not stand by this company. And luckily, I can just point to the math. 

I'll give you the simplest of all data
Jordan Burris (@jordansrules) 's Twitter Profile Photo

Call me an optimistic skeptic. When people say technologies like World ID are secure because they use things like zero-knowledge proofs or store data on your phone instead of a central system, I’m intrigued. It’s a smart approach. But I’ve seen this movie before. Passwords

Jordan Burris (@jordansrules) 's Twitter Profile Photo

A lot of security rules we take for granted today were made up. Literally. The person who created the password complexity rule (the one requiring eight characters, symbols, etc.) later admitted his influence for the rules came from a paper written in the 1980s (before the

A lot of security rules we take for granted today were made up.
Literally.

The person who created the password complexity rule (the one requiring eight characters, symbols, etc.) later admitted his influence for the rules came from a paper written in the 1980s (before the
Jordan Burris (@jordansrules) 's Twitter Profile Photo

I recently shared my thoughts in Dark Reading about the President’s executive order that rescinded several digital identity provisions from the Biden administration. The previous EO was lackluster. It was a messy document that did nothing to curb the rise in advanced

I recently shared my thoughts in Dark Reading about the President’s executive order that rescinded several digital identity provisions from the Biden administration. 

The previous EO was lackluster. 

It was a messy document that did nothing to curb the rise in advanced
Jordan Burris (@jordansrules) 's Twitter Profile Photo

Growing up in Baltimore, I witnessed firsthand the challenges faced by families striving to make ends meet. My father, a dedicated police officer, and my mother, a committed homemaker, worked tirelessly to provide stability and security for our family. In neighborhoods where

Growing up in Baltimore, I witnessed firsthand the challenges faced by families striving to make ends meet. 

My father, a dedicated police officer, and my mother, a committed homemaker, worked tirelessly to provide stability and security for our family. In neighborhoods where
Jordan Burris (@jordansrules) 's Twitter Profile Photo

We recently had someone impersonate Socure in a fake job scam. They spun up a lookalike domain, posed as our HR team, and built a fake interview process. The person they targeted thought they landed a real role with us, but she ended up losing thousands of dollars instead. The

Jordan Burris (@jordansrules) 's Twitter Profile Photo

It makes little sense, but a lot of gov't agencies still rely on mailing PIN codes for identity verification. The largest reason they do it is because they haven’t been able to modernize how they approach validating someone’s identity online. The thinking behind it is that

It makes little sense, but a lot of gov't agencies still rely on mailing PIN codes for identity verification. 

The largest reason they do it is because they haven’t been able to modernize how they approach validating someone’s identity online. The thinking behind it is that
Jordan Burris (@jordansrules) 's Twitter Profile Photo

Last week, a prospect told me they'd evaluated seven vendors. All seven claimed 99.9% accuracy. All seven promised best-in-class performance. None could prove it. Welcome to what I call the field of liars dilemma. When your customers can't independently verify performance

Jordan Burris (@jordansrules) 's Twitter Profile Photo

When I walk into a government agency office to discuss technology transformation, I know exactly what questions are coming before anyone opens their mouth. Security & Privacy lands first. Every time. The procurement director leans forward, adjusts their glasses, and asks why we

Jordan Burris (@jordansrules) 's Twitter Profile Photo

Want to hear me scare the pants of government officials? My opening monologue at the Defense One Tech Summit should do it 😉

Jordan Burris (@jordansrules) 's Twitter Profile Photo

Thank you to Francis Rose & FedGov Today for having me on to discuss the urgent need to modernize identity and fraud prevention across government programs. It was a privilege to join Linda Miller on the panel, a true force in the fight against fraud. We covered a lot of ground,

Thank you to Francis Rose & FedGov Today for having me on to discuss the urgent need to modernize identity and fraud prevention across government programs.

It was a privilege to join Linda Miller on the panel, a true force in the fight against fraud.

We covered a lot of ground,
Jordan Burris (@jordansrules) 's Twitter Profile Photo

"We feel like we have really strong defenses at the front door" a CISO told me. Then the audit began. LOL. They'd invested heavily in securing their primary customer portal - state-of-the-art identity verification, multi-factor authentication, the works. Security team was proud.

"We feel like we have really strong defenses at the front door" a CISO told me. Then the audit began. LOL.

They'd invested heavily in securing their primary customer portal - state-of-the-art identity verification, multi-factor authentication, the works. Security team was proud.
Jordan Burris (@jordansrules) 's Twitter Profile Photo

Last week, a technology leader told me they'd finally implemented deepfake detection. Victory lap, right? Then I asked what happens when one slips through. Dead silence. That conversation crystallized what I've been seeing across the public sector: Organizations are treating