Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
NSTIC about to award contract for ID ecosystem
Tuesday - 4/17/2012, 6:03am EDT
Jeremy Grant, the senior advisor for NSTIC, said his group is about to award a contract to manage a future set of working groups, each of which will develop a component of the ID ecosystem. Grant said NSTIC will award a two-year contract by May, from a field of 12 submissions. Bids have come from non-profits, consultants and universities.
By August, NSTIC plans to award up to eight grants for pilot projects. NSTIC received 186 applications and down selected them to 27 finalists. Each of the grantees will develop components of a trusted ID system.
Speaking at the FedSMC conference in Cambridge, Md., Grant reiterated the need for a national market place in interoperable ID credentials to improve or replace ordinary passwords now in use pretty much everywhere, including the federal government. He cited figures such as 46 percent — the amount by which network intrusions dropped after the Defense Department ordered employees to use their encrypted ID cards exclusively to log on. Five of six known network attack vectors depend on password hacking, Grant said.
"Without solving the 'dog' issue, you can't put enterprise applications online safely," Grant said, referring to the 18-year-old cartoon showing dogs posing as people on the Internet.
Grant described the eventual management award winner as a convener and secretariat of various groups working on the technology and policies of a trusted identities market. It will also develop an accreditation process for eventual vendors of trusted credentials.
Grant said it's too early to predict what form an eventual trusted credential will take. It might be embedded in a card, like the DOD CAC, a fob, or software burned into a smart phone at the chip level.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.